Your SlideShare is downloading. ×
  • Like
Cyber Crime: Stay Safe Online
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Cyber Crime: Stay Safe Online


Portfolio 1 citizen Prof Madya Azizi

Portfolio 1 citizen Prof Madya Azizi

Published in Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On SlideShare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide
  • Motives:Before 2000: Experimentation, ego, pranks2000 - 2003: Political, social, or economic statements (dawn of "hacktivism")2003 - 2005: All about the $$$, hactivism becomes extortion and espionage2005 to present: Organized large scale crimeOrganizationalBefore 2000: Individuals2000 - 2003: "Loose confederations of individuals with unique abilities", two or three friends with common underground interests2003 - 2005: Criminal gangs with a dozen or more members2005 to present: Constellations of large groups who specialize in one or more criminal enterprises, working together in strategic alliances to dilute risk and foster their industryEconomic GainBefore 2000: Personal satisfaction, perceived elevated status in the herd ("haXor ch1xz!")2000 - 2003: A few hundred to a few thousand dollars for custom code, services, stolen credit card numbers2003 - 2005: A career, $10,000 to $100,000 per year in ransom, rental of botnets, stolen identities2005 to present: $1+ million proven, tens or hundreds of millions attempted


  • 2. What is Cyber Crime?Cyber Crime is an online or Internet-basedillegal act 2
  • 3. Contemporary Security Challenges and Vulnerabilities
  • 4. Criminal Criminal$1,200,000 Lone Ranger Friends Gangs $12,000 Organizations$1,000,000 $10,000 $800,000 $8,000 $600,000 $6,000 $400,000 $4,000 $200,000 $2,000 Criminal Gains Victim Loss $0 $0 Before 2000 2000 - 2003 2003 - 2005 2005 to Present
  • 5. Script Hackers Crackers KiddiesCyberextortionists Cyberterrorists
  • 6. Phishing Pharming TappingSniffing Identity theft Spoofing
  • 7.  A firewall is hardware and/or software that protects a network’s resources from intrusion 11
  • 8. Intrusion detection software • Analyzes all network traffic • Assesses system vulnerabilities • Identifies any unauthorized intrusions • Notifies network administrators of suspicious behavior patterns or security breachesHoneypot • Vulnerable computer that is set up to entice an intruder to break into itPage 564 Discovering Computers 2010: Living in a Digital World Chapter 11 12
  • 9. Protect Your Personal Information. Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site. Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password. Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals. Write it down and keep it safe: Everyone can forget a password. Keep a list thats stored in a safe, secure place away from your computer. Own your online presence: When available, set the privacy and security settings on websites to your comfort level for information sharing. Its ok to limit who you share information with.