cyber crime and cyber security

Post on 16-Apr-2017

407 Views

Category:

Engineering

11 Downloads

Preview:

Click to see full reader

TRANSCRIPT

PRASHANT KUMAR SHARMALecturer

CS Department

What is the meaning of Engineering & Engineers

The term Engineering is derived from the Latin word ingenium, meaning "cleverness" .

Engineering is the application of scientific, economic, social, and practical knowledge in order to invent, design, build, maintain, research, and improve structures, machines, devices, systems, materials, and processes.

One who practices engineering is called an engineer.

Different branches of engineering• civil engineering - The branch of engineering concerned with the design and

construction of such public works as dams or bridges

• EE, electrical engineering - The branch of engineering science that studies the uses of electricity

and the equipment for power generation and distribution and the control of machines and communication

• computer science - The branch of engineering science that studies (with the aid of computers)

computable processes and structures.

• mechanical engineering - The branch of engineering that deals with the design and construction and of machinery

Scope of Computer EngineeringThere are many fields of Computer Engineering.• Software Development.• Designing and Graphics.• Software Testing.• Database Management.• Network Security or Cyber Security.

Cyber crime• Cyber crime, or computer crime, is any crime that involves a computer and

a network . The computer may have been used in the commission of a crime, or it may be the target

• Net crime is criminal exploitation of the Internet, inherently a cybercrime

• Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. The U.S. Department of Justice expands the definition of cybercrime to include any illegal activity that uses a computer for the storage of evidence.

Types of Cyber Attack

1. Computer viruses and Worms.

Viruses and worms are computer programs that affect the storage devices of a computer or network, which then replicate information without the knowledge of the user.

2. Spam E-mails. Spam emails are unsolicited emails or junk newsgroup postings. Spam emails are sent

without the consent of the receiver — potentially creating a wide range of problems if they are not filtered appropriately

3. Phishing. Phishing attacks are designed to steal a person’s login and password. For instance, the

phisher can access the victims’ bank accounts or assume control of their social network.

4. Malware Malware is a software that takes control of any individual’s computer to spread a bug

to other people’s devices or social networking profiles. Such software can also be used to create a ‘botnet’— a network of computers controlled remotely by hackers, known as ‘herders,’ — to spread spam or viruses

Cyber Threat Evolution

Virus

Breaking Web Sites

Malicious Code

(Melissa)

Advanced Worm / Trojan (I LOVE

YOU)

Identity Theft (Phishing)

Organised CrimeData Theft, DoS /

DDoS

1995 2000 2003-04 2005-06 2007-081977

10

Security Incidents reported during 2008

Cyber crime Components

Laptop Desktop

PDACell phone

Cyber Security• Cyber security is the body of technologies, processes and practices designed

to protect networks, computers, programs and data from attack, damage or unauthorized access.

• Cyber security, also known as Computer security or IT security, this security applied to computers, computer networks, and the data stored

and transmitted over them

Tools & Techniques Used in Cyber Security

• Authentication.• Encryption.• Digital Signature.• Anti-virus.• Firewall.

Authentication• This fundamental cyber security technique intends to verify the identity of

user based on the credentials stored in the security domain of the system. The most common mode of governance is password technology.

Encryption• Encryption renders data undecipherable without application of a proper key to

unlock the same. To combat an encryption, one would be required to undertake solving complicated mathematical problems like factoring large primes that would consume astronomical amount of computing resources and time.

Digital Signature• Digital signatures can be erected out of the same mathematical algorithms

that are employed in asymmetric encryption. A user is free to test that he possesses a private key by getting some information encoded with it. Anyone can get the same decrypted by having the public key that will verify the person’s credentials.

Anti Virus• The threats of computer viruses or undesirable short programs that trigger

unwanted commands without the explicit consent of user have assumed monstrous proportions. Anti-virus software carries out two functions; it prevents the installation of virus in a system and scans the systems for viruses that are already installed.

Firewalls• Firewalls effectively hinders any attempt of unauthorized access to a computer

when it is connected on the internet by hackers directly or via other network connections. Firewalls come bundled up with most operating systems and are turned on by default.

Thank YouE-Mail : santhab.prashant@gmail.com

top related