Cyber security

21
Cyber Security

Transcript of Cyber security

Page 1: Cyber security

Cyber Security

Page 2: Cyber security

Contents

Page 3: Cyber security

What is cyber crime?

Cyber crime refers to any crime that involves a computer/mobile and a network. The computer may have been used in the commission of a crime, or it may be the target.

Cyber hackers apply all sorts of techniques (hacking, use of malware for intercepting data, etc.) in stealing personal or financial data from their victims, generally from their computers.

Page 4: Cyber security

History The first spam email took place in 1978 when it was sent

out over the ARPANET (Advanced Research Projects

Agency Network).

The first virus was installed on an Apple computer by a

high school student, Rich Skrenta in the year 1982.

Page 5: Cyber security

CYBER THREAT EVOLUTION

Page 6: Cyber security

Computer as a tool When the individual is the main target of the crime the computer can be

considered as a tool rather than target.

These crimes are not done by technical experts.

Eg: Spam, cyber stalking , cyber theft etc.

Page 7: Cyber security

Computer as a target These crimes are committed by a selected

group of people with technical knowledge.

Destruction of information in the computer by spreading virus.

Eg : Defacement, cyber terrorism etc.

Defacement

Page 8: Cyber security

Computer as an instrumentality The crime is committed by manipulating the contents of computer

systems.

With the advent of computer the criminal have started using the technology as an aid for its perpetuation.

Eg: money laundering.

Page 9: Cyber security

Crime associated with prevalence of computers Copyright violation

Material copied from sources that are not public domain or compatibly licensed without the permission of copyright holder.

Copyright violation causes legal issues.

Page 10: Cyber security

Types of cyber crime

• Financial crimes• IP spoofing • Trojan • Web jacking• Session Hijacking• Mail bombing• Key loggers

Page 11: Cyber security

Types Of crime• Financial crime includes credit card frauds, money

laundering, Forgery etc• Money laundering is the process by which large amount of

illegally obtained money is given the appearance of having originated from a legitimate source

Page 12: Cyber security

IP Spoofing – Source Routing Definition:

Attacker spoofs the address of another machine and inserts itself between the attacked machine and the spoofed machine to

intercept replies

Replies sent back to 10.10.20.30

Spoofed Address10.10.20.30

Attacker10.10.50.50

John10.10.5.5

From Address: 10.10.20.30To Address: 10.10.5.5

Attacker intercepts packetsas they go to 10.10.20.30

Page 13: Cyber security

Trojan & Web Jacking

• Trojan Horse-A Trojan as this program is aptly called, is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing.

• Web jacking-This occurs when someone forcefully takes control of a website (by cracking the password ). The actual owner of the website does not have any more control over what appears on that website.

Page 14: Cyber security

Attacker can monitor the session

periodically inject commands into sessionlaunch passive and active attacks from the session

Session Hijacking Bob telnets to Server

Bob authenticates to Server

Bob

Attacker

Server

Die! Hi! I am Bob

Page 15: Cyber security

Mail Bombing• A mail bomb is the sending of a massive amount of e-mail to a

specific person or system. A huge amount of mail may simply

fill up the recipient's disk space on the server or, in some cases,

may be too much for a server to handle and may cause the

server to stop functioning.

Page 16: Cyber security

Clickjacking• Clickjacking is a form of cyber attack where the hacker uses an invisible layer over the

embedded web content (this could be an image, video or button) to intercept and

‘hijack’ you to a mirror website and mine information from you.

Page 17: Cyber security

Keyloggers

• Keyloggers are regularly used in computers to log all the strokes a victim makes on the

keyboard.

Page 18: Cyber security

Cyber security• It is not possible to eliminate cyber crime from the cyber

space. It is quite possible to check them. • Awareness is the first step in protecting yourself.• Invest in Anti-virus, Firewall, and SPAM blocking software

for your PC. • Change passwords on a regular basis • Use complex passwords (include numbers and special

characters)

Page 19: Cyber security

Cyber security• Do not automatically check boxes before reading the

contents of any agreement of the software. • Avoiding use of unauthorized software.• Avoid opening of unknown emails. • Use internet filtering software.• Data Level Security Using encrypting software's • Disable remote connectivity (such as Bluetooth)

Page 20: Cyber security

ADVANTAGES OF CYBER SECURITY• Defend us from critical attacks.• Browse the safe website. • Internet security process all the incoming

and outgoing data on our computer.

Page 21: Cyber security

Conclusion Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.