Cybercrime and security


Published on

Published in: Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cybercrime and security

  1. 1. Seminar Presentation on Cyber Crime And Security By Shishupal Nagar 8CSB-1(95)DEPARTMENT OF COMPUTER SCIENCE &ENGINEERING Jaipur Engineering College & Research Centre Sitapura , Tonk , Road Jaipur
  2. 2. What is Cyber Crime?Reasons for Cyber CrimeCyber CriminalsClassificationTypes of Cyber CrimeSafety tips for Cyber crimeCyber SecurityAdvantage of SecurityConclusionsReferences
  3. 3. Cybercrime is nothing but where the computer used as an object or subject of crime.Crime committed using a computer and the internet to steal a person’s identity.Illegal imports.Malicious programs.
  4. 4. Capacity to store data in comparatively small spaceEasy to accessComplexNegligenceLoss of evidence
  5. 5. Those who are doing crimes by using the computer as an target orobject.Children and adolescents between the age group of 6 – 18 yearsOrganised hackersProfessional hackers / crackersDissatisfied employees
  6. 6. When Computer Is used:-As a Target: using a computer to attack other computers.As a weapon: using a computer to commit real world crimes.
  7. 7. HackingEmail bombingData diddlingSalami attacksEmail spoofingDenial of Service attackVirus / worm attacksLogic bombsSoftware piracy
  8. 8. Hacking in simple terms means an illegal instruction into a computer system and/or network. It is also known as CRACKING.Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage..
  9. 9. Sending huge volumes of e-mailTo an address or server in an attempt to overflow the mailbox or overwhelm the serverZip BombingMethods of email bombing  Mass Mailing  Link Listing
  10. 10. Changing of data before or during entry into the computer systemForging or counterfeiting documents used for data entryExchanging valid disks and tapes with modified replacements.Prevention: Regular Audits Supervising employees
  11. 11. A series of minor attacks that together results in a larger attackUsed for financial crimes in which criminals steal money or resources a bit at a time from a systemPrevention:  Find indications of an attack  Random audits  Dont ignore what appear to be errors in computer- based financial systems.
  12. 12. The sender address and other parts of the e-mail header are altered .From, Return-Path and Reply-To fieldsAlthough the e-mail appears to come from the address indicated in the From field it actually comes from another source.Prevention  Antivirus  Use cryptographic signatures
  13. 13. This is an act by the cyber criminal to make any host network unavailable for the guests.These attacks are mostly done by group of people.This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.
  14. 14. Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network.They usually affect the data on a computer, either by altering or deleting it.Programs that multiply like viruses but spread from computer to computer are called as worms.
  15. 15. If a piece of code intentionally inserted into a software system.That will set off a malicious function when specified conditions are met.Prevention: Monitoring system Application logs are the keys to identifying unwarranted activity
  16. 16. Theft of software through the illegal copying of genuine programs.Distribution of products intended to pass for the original.
  17. 17. Use antivirus software’sInsert firewallsUninstall unnecessary softwareMaintain backupCheck security settingsStay anonymous - choose a genderless screen nameNever give your full name or address to strangers
  18. 18. Avoiding use of Unauthorized software.Avoid opening of unknown email.Use internet filtering software.Data Level Security (Using encrypting softwares).Dont respond to harassing or negative messages.Get out of uncomfortable or hostile situations quickly.Save offending messages.Learn more about Internet privacy.
  19. 19. Internet security is a branch of computer security specifically related to the Internet.Its objective is to establish rules and measure to use against attacks over the Internet.
  20. 20. The cyber security will defend us from critical attacks.It helps us to browse the safe website.Internet security process all the incoming and outgoing data on our computer.Security will defend from hacks and viruses.
  21. 21. It is not possible to eliminate cyber crime from the cyber space.It is quite possible to check them.Awareness is the first step in protecting yourself.So we must pay attention to all those issues and protect the World from Cyber Crime.The IT Act is a historical step in the cyber world.
  22. 22. 