cyber crime and security

Post on 14-Jul-2015

149 views 3 download

Tags:

Transcript of cyber crime and security

3/22/2015 1

3/22/2015 2

what Is ….CYBER

CRIME.

HiStory of Cyber Crime.

Cyber Criminals.

tYpes of Cyber Crimes.

saFEty tips for Cyber Crime.

Cyber security.

cYBer seCUrity gLOSsarY TeRMs.

aDvanTages anD dIsadvAnTAges of Security.

ConclUSions.

rEferenCes…

.

3/22/2015 3

• Encompasses Criminal Act.

• Dealing with Computers and Networks.

• Also called COMPUTER CRIME.

Eg.-> Internet fraud, credit card account thefts etc.

3/22/2015 4

• The first recorded cyber crime took place in year 1820.

• The first spam email took place in 1978 when it was send over the

Arpanet.

•The first VIRUS was installed on an Apple computer in 1982.

…HISTORY OF CYBER

CRIME…

3/22/2015 5

3/22/2015 6

1. INTRUSION.2. CYBER STALKING.3. IDENTITY THEFT.4. SOCIAL ENGINEERING.5. CYBER PORNOGRAPHY.6. PHREAKING.7. WEB JACKING etc.

3/22/2015 7

PROTECT YOUR E-IDENTIY.

BE SOCIAL MEDIA SAVVY.

CAUTIOUSLY TREAT UNSOLICITED E-MAILS.

REPORT SUSPICIOUS ACTIVITIES.

LOCK YOUR COMPUTER.

KEEP PRIVATE INFORMATION

PRIVATE.

CHECK SECURITY SETTINGS.

3/22/2015 8

3/22/2015 9

3/22/2015 10

Access −

The ability and means to communicate with asystem.

Active Attack −

An actual assault perpetrated by an intentionalthreat source.

3/22/2015 11

Blacklist −

A list of entities that are blocked or deniedprivileges or access.

Bot −

A computer connected to the Internet that hasbeen secretly compromised with malicious logic.

3/22/2015 12

Critical Infrastructure −

The systems and assets, whether physical orvirtual, so vital to society that the destruction mayhave a debilitating impact.

Cryptography −

The use of mathematical techniques to provide security services, such as confidentiality.

3/22/2015 13

Cyber Space −

The interdependent network of informationtechnology infrastructures.

Data Breach −

The disclosure of sensitive information to a party,usually outside the organization, that is notauthorized to have or see the information.

3/22/2015 14

Intrusion Detection −

The process and methods for analyzinginformation from networks and informationsystems .

Key −

The numerical value used to controlcryptographic operations.

3/22/2015 15

Defend us from Critical Attacks.

Protects system against viruses, worms, spyware and

other unwanted programs.

Protection against data from theft.

Protects the computer from being hacked.

Minimizes computer freezing and crashes.

Gives privacy to users.

3/22/2015 16

Firewalls can be difficult to configure correctly.

Incorrectly configured firewalls may block usersfrom performing certain actions on the Internet,until the firewall configured correctly.

Makes the system slower than before.

Need to keep updating the new software in orderto keep security up to date.

Could be costly for average user.

3/22/2015 17

3/22/2015 18

3/22/2015 19

... “ILLUSION OF IDEAS LEADS TO

BETTER INNOVATION

BUT MISUSING IT ALWAYS MOVE IT IN

DIRECTION OF DESTRUCTION”…

3/22/2015 20

www.bovill.com

CYBER FORENSICS.

-BY: ALBERT G.MARCELLA.

DIGITAL FORENSICS AND CYBER CRIMES .

-BY: SPYRINGER.

www.ehow .com

www.timesofindia.com

www.hackersnews.com

www.opentech.com

www.intergraphgovsolutions.com

3/22/2015 21

3/22/2015 22

3/22/2015 23