0
AJAY SINGH
B.TECH EC 3RD YEAR
1006331007
What is Cyberspace And
Cybercrime
Cyberspace
An electronic medium of computer system within which people
can communicate d...
History
-The first recorded cyber crime took place in the year
1820.
-The first spam email took place in 1978 when it was
...
Types of cyber crime
-Hacking
-Child pornography
-Computer vandalism
-DoS attack
-Virus Dissemination
-Software Piracy
-Ne...

Hacking
-Illegal intrusion into a computer system and/or network.
i.e. Unauthorized access
Hacking Tools
• Keyloggers
• ...
 Key loggers are provide
logging which you press on
the keyboard buttons.
 Hackers can steal your
passwords or your per...

 is computer software or computer hardware that can
intercept and log traffic passing over a digital network or
part of...
Child pornography
-Abuse children/teens sexually
-More children would be using the internet and more are the
chances of fa...
DoS attack
-Floods the bandwidth of the victims network or fills his e-
mail box with spam mail depriving him of the servi...

Virus Dissemination
 -Malicious software that attaches itself to other software (virus,
worms, Trojan Horse)
 Computer...
Phishing
-Act of sending an e-mail to a user falsely claiming to be an
established legitimate enterprise in an attempt to ...
Cyber crime threatens national security
-Ex union home minister Shivraj Patil said that the rising level of
cyber crime is...
Cyber security
-Involves protection of sensitive personal & business information
through prevention, detection and respons...

15-441 Networks Fall 2002 16
Why do we need
security?
 Protect vital information while still allowing access
to those w...

17
Who is vulnerable?
 Financial institutions and banks
 Internet service providers
 Pharmaceutical companies
 Gover...
Do’s
-Install a firewall , pop-up blocker
-Ensure your virus definitions are up to date
-Use strong passwords , don’t give...
Conclusion
The only system which is truly secure is one which is switched
off and unplugged.
So , only way to be safe is P...

References
 http://img208.imageshack.us/img208/1195/chart.jpg
 http://www.howdoigetridofspyware.com/wp-
content/upload...

cyber crime and security
cyber crime and security
Upcoming SlideShare
Loading in...5
×

cyber crime and security

1,541

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,541
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
147
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "cyber crime and security"

  1. 1. AJAY SINGH B.TECH EC 3RD YEAR 1006331007
  2. 2. What is Cyberspace And Cybercrime Cyberspace An electronic medium of computer system within which people can communicate do research, or simply window shop. Cybercrime Crime committed using a computer and the internet i.e. where the computer used as an object or subject of crime.
  3. 3. History -The first recorded cyber crime took place in the year 1820. -The first spam email took place in 1978 when it was sent over the Arpanet -The first VIRUS was installed on an Apple computer in 1982
  4. 4. Types of cyber crime -Hacking -Child pornography -Computer vandalism -DoS attack -Virus Dissemination -Software Piracy -Net Extortion -Phishing -Spoofing
  5. 5.  Hacking -Illegal intrusion into a computer system and/or network. i.e. Unauthorized access Hacking Tools • Keyloggers • Sniffers
  6. 6.  Key loggers are provide logging which you press on the keyboard buttons.  Hackers can steal your passwords or your personal informations. Key loggers
  7. 7.   is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network.  Hackers can sniff your packets with some softwares or hardwares and they can steal your creadit card numbers, paswords or e-mails. Sniffers
  8. 8. Child pornography -Abuse children/teens sexually -More children would be using the internet and more are the chances of falling victim to the aggression of pedophiles Computer vandalism -Damaging or destroying data rather than stealing or reusing
  9. 9. DoS attack -Floods the bandwidth of the victims network or fills his e- mail box with spam mail depriving him of the services he is entitled to access Software piracy -Theft of software through the illegal copying of genuine programs
  10. 10.  Virus Dissemination  -Malicious software that attaches itself to other software (virus, worms, Trojan Horse)  Computer viruses can damage your computer software system even cause collapse your system.  İts can delete your files Net extortion -Copying the companies confidential data in order to extort said company for huge amount
  11. 11. Phishing -Act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft Spoofing -Getting one computer on a network to pretend to have the identity off another computer,, usually one with special access privileges ,so as to obtain access to the other computers on the network.
  12. 12. Cyber crime threatens national security -Ex union home minister Shivraj Patil said that the rising level of cyber crime is an indication of an enormous threat to national security. -Everything is being operated through computer and hence the risk increases. -India is at eleventh position , U.S. being the first -Increase in number of cases reported
  13. 13. Cyber security -Involves protection of sensitive personal & business information through prevention, detection and response to different online attacks -Protects from attacks by detecting and preventing
  14. 14.  15-441 Networks Fall 2002 16 Why do we need security?  Protect vital information while still allowing access to those who need it  Trade secrets, medical records, etc.  Provide authentication and access control for resources  Ex: AFS  Guarantee availability of resources  Ex: 5 9’s (99.999% reliability)
  15. 15.  17 Who is vulnerable?  Financial institutions and banks  Internet service providers  Pharmaceutical companies  Government and defense agencies  Contractors to various government agencies  Multinational corporations  ANYONE ON THE NETWORK
  16. 16. Do’s -Install a firewall , pop-up blocker -Ensure your virus definitions are up to date -Use strong passwords , don’t give personal information unless required(not even phone number) -Use secure connections -Disable file sharing , turn off internet when not in use -Use spam filters , delete spam immediately -Use various passwords for various accounts -Don’t believe in everything you read online -Open attachments carefully -Beware of promises to make fast profits -Be smart , don’t act foolish and help in spreading spam
  17. 17. Conclusion The only system which is truly secure is one which is switched off and unplugged. So , only way to be safe is Pay attention and Act smart.
  18. 18.  References  http://img208.imageshack.us/img208/1195/chart.jpg  http://www.howdoigetridofspyware.com/wp- content/uploads/2009/03/isitsafecompressed.jpg  http://computersafetytips.files.wordpress.com/2008/12/comp uter-virus-picturejpg.jpg  http://wwwdelivery.superstock.com/WI/223/1614/PreviewC omp/SuperStock_1614R-10559.jpg  http://www.microsoft.com/protect/images/viruses/diagram. jpg  http://www.gulfnews.com/images/08/09/16/16_bz_atm_ban k_hacker01_5.gif  http://www.terminally-incoherent.com/blog/wp- content/uploads/2007/12/hackers.png
  19. 19.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×