cyber crime and cyber security
Post on 16-Apr-2017
407 Views
Preview:
TRANSCRIPT
PRASHANT KUMAR SHARMALecturer
CS Department
What is the meaning of Engineering & Engineers
The term Engineering is derived from the Latin word ingenium, meaning "cleverness" .
Engineering is the application of scientific, economic, social, and practical knowledge in order to invent, design, build, maintain, research, and improve structures, machines, devices, systems, materials, and processes.
One who practices engineering is called an engineer.
Different branches of engineering• civil engineering - The branch of engineering concerned with the design and
construction of such public works as dams or bridges
• EE, electrical engineering - The branch of engineering science that studies the uses of electricity
and the equipment for power generation and distribution and the control of machines and communication
• computer science - The branch of engineering science that studies (with the aid of computers)
computable processes and structures.
• mechanical engineering - The branch of engineering that deals with the design and construction and of machinery
Scope of Computer EngineeringThere are many fields of Computer Engineering.• Software Development.• Designing and Graphics.• Software Testing.• Database Management.• Network Security or Cyber Security.
Cyber crime• Cyber crime, or computer crime, is any crime that involves a computer and
a network . The computer may have been used in the commission of a crime, or it may be the target
• Net crime is criminal exploitation of the Internet, inherently a cybercrime
• Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. The U.S. Department of Justice expands the definition of cybercrime to include any illegal activity that uses a computer for the storage of evidence.
Types of Cyber Attack
1. Computer viruses and Worms.
Viruses and worms are computer programs that affect the storage devices of a computer or network, which then replicate information without the knowledge of the user.
2. Spam E-mails. Spam emails are unsolicited emails or junk newsgroup postings. Spam emails are sent
without the consent of the receiver — potentially creating a wide range of problems if they are not filtered appropriately
3. Phishing. Phishing attacks are designed to steal a person’s login and password. For instance, the
phisher can access the victims’ bank accounts or assume control of their social network.
4. Malware Malware is a software that takes control of any individual’s computer to spread a bug
to other people’s devices or social networking profiles. Such software can also be used to create a ‘botnet’— a network of computers controlled remotely by hackers, known as ‘herders,’ — to spread spam or viruses
Cyber Threat Evolution
Virus
Breaking Web Sites
Malicious Code
(Melissa)
Advanced Worm / Trojan (I LOVE
YOU)
Identity Theft (Phishing)
Organised CrimeData Theft, DoS /
DDoS
1995 2000 2003-04 2005-06 2007-081977
10
Security Incidents reported during 2008
Cyber crime Components
Laptop Desktop
PDACell phone
Cyber Security• Cyber security is the body of technologies, processes and practices designed
to protect networks, computers, programs and data from attack, damage or unauthorized access.
• Cyber security, also known as Computer security or IT security, this security applied to computers, computer networks, and the data stored
and transmitted over them
Tools & Techniques Used in Cyber Security
• Authentication.• Encryption.• Digital Signature.• Anti-virus.• Firewall.
Authentication• This fundamental cyber security technique intends to verify the identity of
user based on the credentials stored in the security domain of the system. The most common mode of governance is password technology.
Encryption• Encryption renders data undecipherable without application of a proper key to
unlock the same. To combat an encryption, one would be required to undertake solving complicated mathematical problems like factoring large primes that would consume astronomical amount of computing resources and time.
Digital Signature• Digital signatures can be erected out of the same mathematical algorithms
that are employed in asymmetric encryption. A user is free to test that he possesses a private key by getting some information encoded with it. Anyone can get the same decrypted by having the public key that will verify the person’s credentials.
Anti Virus• The threats of computer viruses or undesirable short programs that trigger
unwanted commands without the explicit consent of user have assumed monstrous proportions. Anti-virus software carries out two functions; it prevents the installation of virus in a system and scans the systems for viruses that are already installed.
Firewalls• Firewalls effectively hinders any attempt of unauthorized access to a computer
when it is connected on the internet by hackers directly or via other network connections. Firewalls come bundled up with most operating systems and are turned on by default.
Thank YouE-Mail : santhab.prashant@gmail.com
top related