Your SlideShare is downloading. ×
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Cybercrime(this)
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cybercrime(this)

239

Published on

Cyber crime for Information System Risk & Security.

Cyber crime for Information System Risk & Security.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
239
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
27
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Group Members: Danushka Nirmal De Silva(4240138) Ahmad Akmal Afiq(4237323) Yadiy Zakwan(4240960)
  • 2. INTRODUCTION  SUMMARY  DEFINITIONS  HISTORY  TYPES OF CYBERCRIME  STATISTICS  CASE STUDY (1 & 2)  PREVENTION  CONCLUSION
  • 3. SUMMARY The internet is growing rapidly.  Rise in new opportunities in the modern world.  Internet also has its own disadvantages which is : 
  • 4. WHAT IS CYBERCRIME ?  Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs  the computer used as an object or subject of crime
  • 5. HISTORY  Abacus is the earliest and simplest form of computer which dates back about 3500 B.C and was used in some parts of the world such as China  First recorded cyber crime dates back to 1820  Joseph-Marie Jacquard had a textile manufacture introduced the loom  The loom threatened the employees in the firm who then decided to sabotage it in order to discourage Jacquard from further use of the loom
  • 6. Cont’d First spam email took place in 1978 when it was sent over the Arpanet  The first virus was installed on an Apple computer in 1982 
  • 7. TYPES OF CYBERCRIMES Hacking  Child Pornography  Denial of Service(DoS)  Virus Dissemination  Computer Vandalism  Cyber Terrorism  Software Piracy 
  • 8. HACKING Illegal intrusion into a computer system and/or network  Hackers writes or use ready-made computer programs to attack the target computer  Includes breaking into a computer with intention to steal, damage, modify or monitor data or settings within a system 
  • 9. CHILD PORNOGRAPHY The internet is being highly used by its abusers to reach and abuse children sexually, worldwide  Nowadays, more homes have internet access, more children would be using the internet and high chances of falling victim to paedophiles 
  • 10. Denial of Service  The criminal floods the bandwidth of victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide
  • 11. VIRUS DISSEMINITION Malicious software that attaches itself to other software  Circulate themselves to other files and to other computers on a network  Affect the data on a computer, either by altering or deleting it 
  • 12. COMPUTER VANDALISM  An act of damaging or destroying data rather than stealing or misusing them
  • 13. CYBER TERRORISM It is the actual use of computers and internet technology to cause intimidation and destruction  Uses the internet or network to destroy or damage computers for political reasons  Cyber terrorists could hack into a pharmaceutical company’s computers, changing the formula of some essential medication and causing thousands to die 
  • 14. SOFTWARE PIRACY Theft of software through an illegal act of copying a genuine programs or the counterfeiting and distribution of products intended to pass for the original  Copying and using computer programs in violation of copyrights and trade secret laws  Retail revenue losses worldwide are ever increasing due to software piracy 
  • 15. STATISTICS
  • 16. STATISTICS(cont..)
  • 17. CASE STUDY 1 CYBER CRIMINALS TARGET SKYPE, FACEBOOK & WINDOWS USER
  • 18. CASE STUDY 1 Cyber criminals target social network & Windows users with Blackhole malware.  Disuised as Windows licences, Facebook account verification, Skype voicemail notifications & spam messages.  Biggest dangers Internet users face. 
  • 19. Users who click the malicious Blackhole links & downloaded the files were infected with a Trojan virus.  Spam email campaign targeted Facebook users with a message claiming that their account was locked and needed to be re-verified.  The links led to Blackhole exploits and a Zeus Trojan disguised as an Adobe Flash Player download. 
  • 20. Users should verify the source and destination of any link before clicking  they should never run executable files unless they are positive that the source is legitimate 
  • 21. CASE STUDY 2 HACKING OF US DRONE TECHNOLOGY
  • 22. CASE STUDY 2 Chinese hackers increasingly attracted to US drone technology  Hacker group “Comment Crew” hacked US military network stealing classified information of US military drones.  They targeted both large companies, including US military contractors & military firms focused on drone technology. 
  • 23. Chinese drone identical to US Predator drone.  US drone market could be the first victim of Chinese espionage. 
  • 24. PREVENTION Antivirus & Anti Spyware software  Firewalls  Cryptography  Cyber Law & Ethics 
  • 25. Antivirus & Anti Spyware software   to identify and eliminate computer viruses and other malicious software. to restrict backdoor program, trojans and other spywares to be installed on the computer.
  • 26. Firewalls protects a computer network from unauthorized access.  guards an internal computer network against malicious access from outside the network. 
  • 27. Cryptography science of encrypting and decrypting information.  Encryption is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender & the recipient.  A number of cryptographic methods have been developed and some of them are still not cracked. 
  • 28. Cyber Laws & Ethics Responsibility of every individual to follow cyber ethics and cyber laws.  ISP should provide high level security at their severs  Security software as a protection  Essential features in the cyber world today. 
  • 29. CONCLUSION Cybercrimes increase with the rapidly growing internet technology.  It is not possible to eliminate cybercrimes.  It is quite possible to check them.  Awareness is always the first step to protect yourself. 

×