cyber crime and cyber security

19
PRASHANT KUMAR SHARMA Lecturer CS Department

Upload: prashant-sharma

Post on 16-Apr-2017

407 views

Category:

Engineering


11 download

TRANSCRIPT

Page 1: Cyber Crime And Cyber Security

PRASHANT KUMAR SHARMALecturer

CS Department

Page 2: Cyber Crime And Cyber Security

What is the meaning of Engineering & Engineers

The term Engineering is derived from the Latin word ingenium, meaning "cleverness" .

Engineering is the application of scientific, economic, social, and practical knowledge in order to invent, design, build, maintain, research, and improve structures, machines, devices, systems, materials, and processes.

One who practices engineering is called an engineer.

Page 3: Cyber Crime And Cyber Security

Different branches of engineering• civil engineering - The branch of engineering concerned with the design and

construction of such public works as dams or bridges

• EE, electrical engineering - The branch of engineering science that studies the uses of electricity

and the equipment for power generation and distribution and the control of machines and communication

• computer science - The branch of engineering science that studies (with the aid of computers)

computable processes and structures.

• mechanical engineering - The branch of engineering that deals with the design and construction and of machinery

Page 4: Cyber Crime And Cyber Security

Scope of Computer EngineeringThere are many fields of Computer Engineering.• Software Development.• Designing and Graphics.• Software Testing.• Database Management.• Network Security or Cyber Security.

Page 5: Cyber Crime And Cyber Security
Page 6: Cyber Crime And Cyber Security

Cyber crime• Cyber crime, or computer crime, is any crime that involves a computer and

a network . The computer may have been used in the commission of a crime, or it may be the target

• Net crime is criminal exploitation of the Internet, inherently a cybercrime

• Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. The U.S. Department of Justice expands the definition of cybercrime to include any illegal activity that uses a computer for the storage of evidence.

Page 7: Cyber Crime And Cyber Security

Types of Cyber Attack

Page 8: Cyber Crime And Cyber Security

1. Computer viruses and Worms.

Viruses and worms are computer programs that affect the storage devices of a computer or network, which then replicate information without the knowledge of the user.

2. Spam E-mails. Spam emails are unsolicited emails or junk newsgroup postings. Spam emails are sent

without the consent of the receiver — potentially creating a wide range of problems if they are not filtered appropriately

3. Phishing. Phishing attacks are designed to steal a person’s login and password. For instance, the

phisher can access the victims’ bank accounts or assume control of their social network.

4. Malware Malware is a software that takes control of any individual’s computer to spread a bug

to other people’s devices or social networking profiles. Such software can also be used to create a ‘botnet’— a network of computers controlled remotely by hackers, known as ‘herders,’ — to spread spam or viruses

Page 9: Cyber Crime And Cyber Security

Cyber Threat Evolution

Virus

Breaking Web Sites

Malicious Code

(Melissa)

Advanced Worm / Trojan (I LOVE

YOU)

Identity Theft (Phishing)

Organised CrimeData Theft, DoS /

DDoS

1995 2000 2003-04 2005-06 2007-081977

Page 10: Cyber Crime And Cyber Security

10

Security Incidents reported during 2008

Page 11: Cyber Crime And Cyber Security

Cyber crime Components

Laptop Desktop

PDACell phone

Page 12: Cyber Crime And Cyber Security

Cyber Security• Cyber security is the body of technologies, processes and practices designed

to protect networks, computers, programs and data from attack, damage or unauthorized access.

• Cyber security, also known as Computer security or IT security, this security applied to computers, computer networks, and the data stored

and transmitted over them

Page 13: Cyber Crime And Cyber Security

Tools & Techniques Used in Cyber Security

• Authentication.• Encryption.• Digital Signature.• Anti-virus.• Firewall.

Page 14: Cyber Crime And Cyber Security

Authentication• This fundamental cyber security technique intends to verify the identity of

user based on the credentials stored in the security domain of the system. The most common mode of governance is password technology.

Page 15: Cyber Crime And Cyber Security

Encryption• Encryption renders data undecipherable without application of a proper key to

unlock the same. To combat an encryption, one would be required to undertake solving complicated mathematical problems like factoring large primes that would consume astronomical amount of computing resources and time.

Page 16: Cyber Crime And Cyber Security

Digital Signature• Digital signatures can be erected out of the same mathematical algorithms

that are employed in asymmetric encryption. A user is free to test that he possesses a private key by getting some information encoded with it. Anyone can get the same decrypted by having the public key that will verify the person’s credentials.

Page 17: Cyber Crime And Cyber Security

Anti Virus• The threats of computer viruses or undesirable short programs that trigger

unwanted commands without the explicit consent of user have assumed monstrous proportions. Anti-virus software carries out two functions; it prevents the installation of virus in a system and scans the systems for viruses that are already installed.

Page 18: Cyber Crime And Cyber Security

Firewalls• Firewalls effectively hinders any attempt of unauthorized access to a computer

when it is connected on the internet by hackers directly or via other network connections. Firewalls come bundled up with most operating systems and are turned on by default.

Page 19: Cyber Crime And Cyber Security

Thank YouE-Mail : [email protected]