• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Cybercrime and security
 

Cybercrime and security

on

  • 1,110 views

 

Statistics

Views

Total Views
1,110
Views on SlideShare
1,110
Embed Views
0

Actions

Likes
2
Downloads
164
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Cybercrime and security Cybercrime and security Presentation Transcript

    • Seminar Presentation on Cyber Crime And Security By Shishupal Nagar 8CSB-1(95)DEPARTMENT OF COMPUTER SCIENCE &ENGINEERING Jaipur Engineering College & Research Centre Sitapura , Tonk , Road Jaipur
    • What is Cyber Crime?Reasons for Cyber CrimeCyber CriminalsClassificationTypes of Cyber CrimeSafety tips for Cyber crimeCyber SecurityAdvantage of SecurityConclusionsReferences
    • Cybercrime is nothing but where the computer used as an object or subject of crime.Crime committed using a computer and the internet to steal a person’s identity.Illegal imports.Malicious programs.
    • Capacity to store data in comparatively small spaceEasy to accessComplexNegligenceLoss of evidence
    • Those who are doing crimes by using the computer as an target orobject.Children and adolescents between the age group of 6 – 18 yearsOrganised hackersProfessional hackers / crackersDissatisfied employees
    • When Computer Is used:-As a Target: using a computer to attack other computers.As a weapon: using a computer to commit real world crimes.
    • HackingEmail bombingData diddlingSalami attacksEmail spoofingDenial of Service attackVirus / worm attacksLogic bombsSoftware piracy
    • Hacking in simple terms means an illegal instruction into a computer system and/or network. It is also known as CRACKING.Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage..
    • Sending huge volumes of e-mailTo an address or server in an attempt to overflow the mailbox or overwhelm the serverZip BombingMethods of email bombing  Mass Mailing  Link Listing
    • Changing of data before or during entry into the computer systemForging or counterfeiting documents used for data entryExchanging valid disks and tapes with modified replacements.Prevention: Regular Audits Supervising employees
    • A series of minor attacks that together results in a larger attackUsed for financial crimes in which criminals steal money or resources a bit at a time from a systemPrevention:  Find indications of an attack  Random audits  Dont ignore what appear to be errors in computer- based financial systems.
    • The sender address and other parts of the e-mail header are altered .From, Return-Path and Reply-To fieldsAlthough the e-mail appears to come from the address indicated in the From field it actually comes from another source.Prevention  Antivirus  Use cryptographic signatures
    • This is an act by the cyber criminal to make any host network unavailable for the guests.These attacks are mostly done by group of people.This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.
    • Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network.They usually affect the data on a computer, either by altering or deleting it.Programs that multiply like viruses but spread from computer to computer are called as worms.
    • If a piece of code intentionally inserted into a software system.That will set off a malicious function when specified conditions are met.Prevention: Monitoring system Application logs are the keys to identifying unwarranted activity
    • Theft of software through the illegal copying of genuine programs.Distribution of products intended to pass for the original.
    • Use antivirus software’sInsert firewallsUninstall unnecessary softwareMaintain backupCheck security settingsStay anonymous - choose a genderless screen nameNever give your full name or address to strangers
    • Avoiding use of Unauthorized software.Avoid opening of unknown email.Use internet filtering software.Data Level Security (Using encrypting softwares).Dont respond to harassing or negative messages.Get out of uncomfortable or hostile situations quickly.Save offending messages.Learn more about Internet privacy.
    • Internet security is a branch of computer security specifically related to the Internet.Its objective is to establish rules and measure to use against attacks over the Internet.
    • The cyber security will defend us from critical attacks.It helps us to browse the safe website.Internet security process all the incoming and outgoing data on our computer.Security will defend from hacks and viruses.
    • It is not possible to eliminate cyber crime from the cyber space.It is quite possible to check them.Awareness is the first step in protecting yourself.So we must pay attention to all those issues and protect the World from Cyber Crime.The IT Act is a historical step in the cyber world.
    •  http://www.computerhope.com/jargon/d http://www.slideshare.com/ www.google.com/ http://seminarsonly.com/ http://1000projects.com/