Your SlideShare is downloading. ×
0
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cyber Crime: Stay Safe Online

679

Published on

Portfolio 1 citizen Prof Madya Azizi

Portfolio 1 citizen Prof Madya Azizi

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
679
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Motives:Before 2000: Experimentation, ego, pranks2000 - 2003: Political, social, or economic statements (dawn of "hacktivism")2003 - 2005: All about the $$$, hactivism becomes extortion and espionage2005 to present: Organized large scale crimeOrganizationalBefore 2000: Individuals2000 - 2003: "Loose confederations of individuals with unique abilities", two or three friends with common underground interests2003 - 2005: Criminal gangs with a dozen or more members2005 to present: Constellations of large groups who specialize in one or more criminal enterprises, working together in strategic alliances to dilute risk and foster their industryEconomic GainBefore 2000: Personal satisfaction, perceived elevated status in the herd ("haXor ch1xz!")2000 - 2003: A few hundred to a few thousand dollars for custom code, services, stolen credit card numbers2003 - 2005: A career, $10,000 to $100,000 per year in ransom, rental of botnets, stolen identities2005 to present: $1+ million proven, tens or hundreds of millions attempted
  • Transcript

    • 1. STAY SAFE ONLINE
    • 2. What is Cyber Crime?Cyber Crime is an online or Internet-basedillegal act 2
    • 3. Contemporary Security Challenges and Vulnerabilities
    • 4. Criminal Criminal$1,200,000 Lone Ranger Friends Gangs $12,000 Organizations$1,000,000 $10,000 $800,000 $8,000 $600,000 $6,000 $400,000 $4,000 $200,000 $2,000 Criminal Gains Victim Loss $0 $0 Before 2000 2000 - 2003 2003 - 2005 2005 to Present
    • 5. Script Hackers Crackers KiddiesCyberextortionists Cyberterrorists
    • 6. Phishing Pharming TappingSniffing Identity theft Spoofing
    • 7.  A firewall is hardware and/or software that protects a network’s resources from intrusion 11
    • 8. Intrusion detection software • Analyzes all network traffic • Assesses system vulnerabilities • Identifies any unauthorized intrusions • Notifies network administrators of suspicious behavior patterns or security breachesHoneypot • Vulnerable computer that is set up to entice an intruder to break into itPage 564 Discovering Computers 2010: Living in a Digital World Chapter 11 12
    • 9. Protect Your Personal Information. Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site. Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password. Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals. Write it down and keep it safe: Everyone can forget a password. Keep a list thats stored in a safe, secure place away from your computer. Own your online presence: When available, set the privacy and security settings on websites to your comfort level for information sharing. Its ok to limit who you share information with.

    ×