2. Team Members
Maliha Rahman (2014-3-50-007)
Noushad Hasan Jabin (2014-3-50-
025)
Sauradip Roy (2014-3-50-008)
3. Topics will be covered
Introduction
History of cybercrime
Authenticity,Security,Privacy
Database security
Social Engineering & protection
Database security
Different cyber attacking methods
Security tips
What we covered
References
4. Introduction
◇Cyber crime is Harmful or unlawful
acts wherein the computer is either a
tool or target or both.
◇Online or Internet-based illegal acts.
5. History of Cyber Crime
The first recorded cyber crime took place
in the year 1820.
The first spam email took place in 1978
when it was sent over the Arpanet.
The first VIRUS was installed on an
Apple computer in 1982.
6. Authenticity, Security,
Privacy
Authenticity is assurance that a message, transaction,
or other exchange of information is from the source it
claims to be from. Authenticity involves proof of
identity.
Different Authentications:
1. Digital certificates
2. USB token
3. Password based Authentication
4. Biometric authentications (Fingerprints, Retina
Scans)
7. Security
Security simply refers to the term
Cyber security.
Cybersecurity is the technologies &
processes which protects networks,
computers, programs and data
from attack, damage or
unauthorized access.
8. Place your screenshot here
Privacy
◇Privacy is your right to control
what happens with personal
information about you.
◇Using Internet may affects
someones personal data &
Identity.
9. Social Engineering
◇Social engineering is the art of manipulating
people so they give up confidential information
such as password and the control over their
computers.
◇Protections:
●First & foremost is user consciousness
●Avoid installing third party softwares
●System firewall is turned on
●2 step authentication for log into account
●Code generator
●Trusted Contacts
11. DATABASE SECURITY
FEATURES
■Digital Certificate is a unique identifier given to an entity
to provide authentication of a computer, document, or
webpage.
■Encryptions alter the data so unauthorized users cannot
view data information.
■Firewalls protect a network from unauthorized access
from the internet.
■Proxy Servers shield the requests between the client
computers inside a private network and the internet.
■Security Socket Layer connects and transmits encrypted
data.
■S-HTTP (secure hypertext transport protocol) transmits
web pages securely.
12. RESPONSIBLITIES OF THE
DATABASE ADMINISTRATOR
◇Always keep in mind that whenever a system has
internet and network connections attached to a DBMS,
security breaches may occur.
◇Perform routine backup recovery procedures incase
of electrical outage and intruder attacks that can
damage the DBMS.
13. Built in Database Protection
◇They create built in solutions such
as:
■Password Controls
■Data access based on roles and profiles
■IP restrictions for off site access
■Auditing capabilities of who has run what reports
■Security logging
16. Trojan Horse Attack
Trojan Horse
arrives via email
or software like
free games.
Trojan Horse is
activated when
the software or
attachment is
executed.
Trojan Horse releases
virus, monitors
computer activity,
installs backdoor, or
transmits information
to hacker.
17. BackDoors
◇A backdoor is a technique in
which a system security
mechanism is bypassed
undetectably to access a computer
or its data.
◇The backdoor access method is
sometimes written by the
programmer who develops a
program.
18.
19. KeyLoggers
◇A keylogger is a type
of software(Spyware)
that records every
keystrokes in a log file
by encrypting this and
sends it to the hackers
email.
20. DDoS(Distributed denial of
service)
◇A
distributed (DDoS) attack o
ccurs when a group of
attacker use multiple
systems to flood the
bandwidth or resources of a
targeted system, usually one
or more web servers.
21. Man in the middle attack
◇In this attack a
Hacker inserts
himself as a middle
man between the
two parties or
mostly between the
network router an
its connected
devices to catch
their packets and
credentials.
22. Safety Tips:
◇Use antivirus software
◇Insert firewalls , pop up blocker
◇Uninstall unnecessary software
◇Maintain backup
Check security settings
Use secure connection
Open attachments carefully
Use strong passwords ,
don’t give personal
information unless required
25. SlidesCarnival icons are editable shapes.
This means that you can:
● Resize them without losing quality.
● Change fill color and opacity.
● Change line color, width and style.
Isn’t that nice? :)
Examples:
26. Now you can use any emoji as an icon!
And of course it resizes without losing quality and you can change the
color.
How? Follow Google instructions
https://twitter.com/googledocs/status/730087240156643328
✋👆👉👍👤👦👧👨👩👪💃🏃💑❤😂
😉😋😒😭👶😸🐟🍒🍔💣📌📖🔨🎃🎈
🎨🏈🏰🌏🔌🔑 and many more...
😉