What is Cyberspace And
An electronic medium of computer system within which people
can communicate do research, or simply window shop.
Crime committed using a computer and the internet i.e.
where the computer used as an object or subject of crime.
-The first recorded cyber crime took place in the year
-The first spam email took place in 1978 when it was
sent over the Arpanet
-The first VIRUS was installed on an Apple computer in
-Illegal intrusion into a computer system and/or network.
i.e. Unauthorized access
Key loggers are provide
logging which you press on
the keyboard buttons.
Hackers can steal your
passwords or your personal
is computer software or computer hardware that can
intercept and log traffic passing over a digital network or
part of a network.
Hackers can sniff your packets with some softwares or
hardwares and they can steal your creadit card
numbers, paswords or e-mails.
-Abuse children/teens sexually
-More children would be using the internet and more are the
chances of falling victim to the aggression of pedophiles
-Damaging or destroying data rather than stealing or reusing
-Floods the bandwidth of the victims network or fills his e-
mail box with spam mail depriving him of the services he is
entitled to access
-Theft of software through the illegal copying of genuine
-Malicious software that attaches itself to other software (virus,
worms, Trojan Horse)
Computer viruses can damage your computer software system
even cause collapse your system.
İts can delete your files
-Copying the companies confidential data in order to extort said
company for huge amount
-Act of sending an e-mail to a user falsely claiming to be an
established legitimate enterprise in an attempt to scam the user into
surrendering private information that will be used for identity theft
-Getting one computer on a network to pretend to have the identity
off another computer,, usually one with special access privileges ,so
as to obtain access to the other computers on the network.
Cyber crime threatens national security
-Ex union home minister Shivraj Patil said that the rising level of
cyber crime is an indication of an enormous threat to national
-Everything is being operated through computer and hence the risk
-India is at eleventh position , U.S. being the first
-Increase in number of cases reported
-Involves protection of sensitive personal & business information
through prevention, detection and response to different online
-Protects from attacks by detecting and preventing
15-441 Networks Fall 2002 16
Why do we need
Protect vital information while still allowing access
to those who need it
Trade secrets, medical records, etc.
Provide authentication and access control for
Guarantee availability of resources
Ex: 5 9’s (99.999% reliability)
Who is vulnerable?
Financial institutions and banks
Internet service providers
Government and defense agencies
Contractors to various government agencies
ANYONE ON THE NETWORK
-Install a firewall , pop-up blocker
-Ensure your virus definitions are up to date
-Use strong passwords , don’t give personal information unless
required(not even phone number)
-Use secure connections
-Disable file sharing , turn off internet when not in use
-Use spam filters , delete spam immediately
-Use various passwords for various accounts
-Don’t believe in everything you read online
-Open attachments carefully
-Beware of promises to make fast profits
-Be smart , don’t act foolish and help in spreading spam
The only system which is truly secure is one which is switched
off and unplugged.
So , only way to be safe is Pay attention and