Cyber Crime and Social Media Security

2,424 views

Published on

Published in: Technology
0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,424
On SlideShare
0
From Embeds
0
Number of Embeds
12
Actions
Shares
0
Downloads
155
Comments
0
Likes
5
Embeds 0
No embeds

No notes for slide
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • co-conspirators: members of secret agreements
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  • Cyber Crime and Social Media Security

    1. 1. Cyber Crime - Prime College
    2. 2. Presenter’s Profile Hem Sagar Pokhrel MSP 2013 Prime College Volunteer, Youth Action Nepal Anamnagar, Kathmandu-Nepal @NepaliSagar www.facebook.com/geeksag ar
    3. 3. WHAT IS CYBER CRIME ?  Computer crime or cybercrime is a form of crime where the Internet or computers are used as a medium to commit crime.
    4. 4. National Research Council, "Computers at Risk", 1991. "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb".
    5. 5. TYPES OF CYBER CRIME 1. Cybercrimes against persons. 2. Cybercrimes against property. 3. Cybercrimes against government.
    6. 6. 1.AGAINST PERSON Includes various harassment of anyone with the use of a computer such as e-mail. E.g.:- The Melissa virus first appeared on the internet in March of 1999. It spread rapidly throughout computer systems in the United States and Europe. It is estimated that the virus caused 80 million dollars in damages to computers worldwide.
    7. 7. AGAINST PERSON contd.. oCyber harassment is a distinct Cybercrime. oHarassment can be sexual, racial, religious, or other. Persons perpetuating such harassment are also guilty of cybercrimes. oCyber harassment as a crime also brings us to another related area of violation of privacy of citizens. oNo one likes any other person invading the invaluable and extremely touchy area of his or her own privacy which the medium of internet grants to the citizen.
    8. 8. 2.AGAINST PROPERTY  Include computer vandalism (destruction of others' property), transmission of harmful programmes.  E.g. : A Mumbai-based upstart engineering company lost a say and much money in the business when the rival company, an industry major, stole the technical database from their computers with the help of a corporate cyber spy.
    9. 9. 3.AGAINST GOVERNMENT  An individual "cracks" into a government or military maintained website or systems.  This crime manifests itself into terrorism .  E.g. Group like  LUZSEC  Anonymous
    10. 10. Why learn about CYBER CRIME ?  Everybody is using COMPUTERS.  New generation is growing up with computers  Terrorist targeted the teenagers.  Conventional crimes like Forgery,, extortion,, kidnapping are being committed with the help of computers.  MOST IMPORTANT - Monetary transactions are moving on to the INTERNET
    11. 11. IN SHORT  Cyber CRIME is any crime where Computer is a target.  Computer is a tool of crime  Computer is incidental to crime
    12. 12. VICTIMS  Desperados and greedy people  Unskilled & Inexperienced  Unlucky people
    13. 13. Hacker and Cracker  A Hacker is a person who just wants to know the inner workings of computer systems, helping to improve them if they detect flaws in their security.  A Cracker is a person with high skills in computer systems (the same way that hackers), these skills are regularly used for personal benefit or for harm.
    14. 14. HACKING  Illegal intrusion into a computer system without the permission of the computer owner/user.  Types 1. Ethical hacking & 2. Non- ethical hacking
    15. 15. VIRUS DISSEMINATIO N Malicious software that attaches itself to other software. e.g.:- 1. Virus, worms, 2. Trojan Horse, 3. Time bomb, 4. Logic Bomb,
    16. 16. SOFTWARE PRIVACY  Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.  Retail revenue losses worldwide are ever increasing due to this crime Can be done in various ways  E.g.:-End user copying, Hard disk loading, Counterfeiting,  Illegal downloads from the internet etc.
    17. 17. INTERNET RELAY CHAT  Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other.  Criminals use it for meeting co-conspirators.  Hackers use it for discussing their exploits / sharing the techniques.
    18. 18. DDOS ATTACK  malicious action typically taken against a computer system such as a server or webpage host.  Server Flooding is achieved by causing a server to attempt to respond to an excessive number of users simultaneously  Server crashing is typically achieved through a malicious piece of software that uses a flaw or weakness in the server programming to cause the server to crash and be inaccessible until restarted.
    19. 19. Email Bombing  Form of denial of service attack that floods an inbox and mail server with messages.  This type of attack can be a nuisance on a low level, but it can also become a serious problem.  There are a variety of techniques that can be used to address email bombing. Maintaining -multiple email addresses for different activities can help.
    20. 20. NET EXTORTION Copying the company’s confidential data in order to extort paid company for huge amount.
    21. 21. CYBER DEFAMATION  The Criminal sends emails containing defamatory matters to all concerned off the victim or post the defamatory matters on a website..  E.g.:-(disgruntled employee may do this against boss,, ex-boys friend against girl,, divorced husband against wife etc.)
    22. 22. PHISHING It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means.
    23. 23. PHISHING It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means.
    24. 24. PHISHING It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means.
    25. 25. How to be secure then .??? 1. Enabled the “Always use HTTPS” setting for Facebook, Twitter, Outlook, Gmail, Google and all the other online services. 2. Offers via an unknown person or offers that are too good to be true should be suspect. 3. Don’t click the links in emails. Always go to the source or manually type in the address in your web browser. 4. Don’t use a debit card online. If your debit card is compromised that’s money out of your bank account. Credit cards provide more protection and less liability.
    26. 26. How to be secure then .??? 5. Secure your PC. Update your critical security patches and anti- virus and only shop from a secured Internet connection. 6. Change your password often and use combination of Uppercase, Lowercase, Special characters and characters as password.
    27. 27.  Do take advantage of privacy settings and encourage your friends to do the same  Do ask questions before clicking a link.  Do accept friend requests with caution.D  Don’t include too much identifying information.  Don’t automatically trust everyone. Facebook Security
    28. 28.  Stay Updated  Secure Web Hosts  Moderate the comment  Backups Twitter Security
    29. 29.  Never share personal information  Don’t be too specific  Link your twitter account  Don’t spit excessive personal information, this is about as dangerous on any other social network. if necessary. Twitter Security  Don’t tweet about moving servers, changing passwords or any other type of situation where your security could be compromised more easily.  Review applications that use your twitter account with other networking sites like Facebook only
    30. 30. •Stay Updated •Secure Web Hosts •Moderate the comment •Backups How To Secure Your Blog
    31. 31.  Malware bytes' Anti-Malware  True Crypt  CCleaner  Flash Cookie Remover Offline Protection
    32. 32. Security Tips | Smartphone Users  Install anti-virus software, and keep it updated.  Use a PIN code or pattern lock on your phone.  Turn off geo-tagging, or turn off photo auto-uploads.  Avoid location "check-ins.“  Don't store passwords on the phone.  Enable remote 'wiping' of data.  Encrypt public Wi-Fi transmissions.
    33. 33. Our Expectation Now Onwards  Conscious about Electronic Transaction act 2064  Don't edit images in unwanted manner and also do not like, share ,tag and post such edited images in any Social Networking sites.  Do not keep multi accounts of same sites | delete if you already have.  Use privacy setting to avoid cyber theft.  Hide your Geographical Location as far as practicable.
    34. 34. References facebook.com/security fass10012041.wordpress.com forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-DNS en.wikipedia.org/wiki/ f-secure.com/weblog/ totaldefense.com/securityblog.aspx twitter.com/safety
    35. 35. THANK YOU

    ×