cyber crime and security
TRANSCRIPT
![Page 1: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/1.jpg)
3/22/2015 1
![Page 2: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/2.jpg)
3/22/2015 2
![Page 3: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/3.jpg)
what Is ….CYBER
CRIME.
HiStory of Cyber Crime.
Cyber Criminals.
tYpes of Cyber Crimes.
saFEty tips for Cyber Crime.
Cyber security.
cYBer seCUrity gLOSsarY TeRMs.
aDvanTages anD dIsadvAnTAges of Security.
ConclUSions.
rEferenCes…
.
3/22/2015 3
![Page 4: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/4.jpg)
• Encompasses Criminal Act.
• Dealing with Computers and Networks.
• Also called COMPUTER CRIME.
Eg.-> Internet fraud, credit card account thefts etc.
3/22/2015 4
![Page 5: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/5.jpg)
• The first recorded cyber crime took place in year 1820.
• The first spam email took place in 1978 when it was send over the
Arpanet.
•The first VIRUS was installed on an Apple computer in 1982.
…HISTORY OF CYBER
CRIME…
3/22/2015 5
![Page 6: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/6.jpg)
3/22/2015 6
![Page 7: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/7.jpg)
1. INTRUSION.2. CYBER STALKING.3. IDENTITY THEFT.4. SOCIAL ENGINEERING.5. CYBER PORNOGRAPHY.6. PHREAKING.7. WEB JACKING etc.
3/22/2015 7
![Page 8: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/8.jpg)
PROTECT YOUR E-IDENTIY.
BE SOCIAL MEDIA SAVVY.
CAUTIOUSLY TREAT UNSOLICITED E-MAILS.
REPORT SUSPICIOUS ACTIVITIES.
LOCK YOUR COMPUTER.
KEEP PRIVATE INFORMATION
PRIVATE.
CHECK SECURITY SETTINGS.
3/22/2015 8
![Page 9: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/9.jpg)
3/22/2015 9
![Page 10: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/10.jpg)
3/22/2015 10
![Page 11: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/11.jpg)
Access −
The ability and means to communicate with asystem.
Active Attack −
An actual assault perpetrated by an intentionalthreat source.
3/22/2015 11
![Page 12: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/12.jpg)
Blacklist −
A list of entities that are blocked or deniedprivileges or access.
Bot −
A computer connected to the Internet that hasbeen secretly compromised with malicious logic.
3/22/2015 12
![Page 13: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/13.jpg)
Critical Infrastructure −
The systems and assets, whether physical orvirtual, so vital to society that the destruction mayhave a debilitating impact.
Cryptography −
The use of mathematical techniques to provide security services, such as confidentiality.
3/22/2015 13
![Page 14: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/14.jpg)
Cyber Space −
The interdependent network of informationtechnology infrastructures.
Data Breach −
The disclosure of sensitive information to a party,usually outside the organization, that is notauthorized to have or see the information.
3/22/2015 14
![Page 15: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/15.jpg)
Intrusion Detection −
The process and methods for analyzinginformation from networks and informationsystems .
Key −
The numerical value used to controlcryptographic operations.
3/22/2015 15
![Page 16: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/16.jpg)
Defend us from Critical Attacks.
Protects system against viruses, worms, spyware and
other unwanted programs.
Protection against data from theft.
Protects the computer from being hacked.
Minimizes computer freezing and crashes.
Gives privacy to users.
3/22/2015 16
![Page 17: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/17.jpg)
Firewalls can be difficult to configure correctly.
Incorrectly configured firewalls may block usersfrom performing certain actions on the Internet,until the firewall configured correctly.
Makes the system slower than before.
Need to keep updating the new software in orderto keep security up to date.
Could be costly for average user.
3/22/2015 17
![Page 18: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/18.jpg)
3/22/2015 18
![Page 19: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/19.jpg)
3/22/2015 19
![Page 20: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/20.jpg)
... “ILLUSION OF IDEAS LEADS TO
BETTER INNOVATION
BUT MISUSING IT ALWAYS MOVE IT IN
DIRECTION OF DESTRUCTION”…
3/22/2015 20
![Page 21: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/21.jpg)
www.bovill.com
CYBER FORENSICS.
-BY: ALBERT G.MARCELLA.
DIGITAL FORENSICS AND CYBER CRIMES .
-BY: SPYRINGER.
www.ehow .com
www.timesofindia.com
www.hackersnews.com
www.opentech.com
www.intergraphgovsolutions.com
3/22/2015 21
![Page 22: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/22.jpg)
3/22/2015 22
![Page 23: cyber crime and security](https://reader034.vdocuments.site/reader034/viewer/2022051617/55a513211a28ab432d8b47c6/html5/thumbnails/23.jpg)
3/22/2015 23