Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber Crime and Security


Published on

Various Types of Cyber Attacks and ways to secure our system from those attacks.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Cyber Crime and Security

  1. 1.  What is Cyber Crime Categorize of Cyber Crime Types of Cyber Attacks Security Personal Measures
  2. 2.  Criminal acts using Computers and networks as tools or targets. Cybercrime can be directed towards persons, companies, or government authorities.
  4. 4.  Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Motive behind the crime : Adventure, Revenge, Greed, Desire to access forbidden information, Publicity. Government websites are the hot targets of the hackers due to the press coverage it receives.
  5. 5.  This is an act that ceases the functioning of a service or program by sending malicious datagrams that can even cause the network connections to fail. For example: The criminal fills victim’s e-mail box with spam mail depriving him of the services he is entitled to access or provide.
  6. 6.  Damaging or destroying data rather than stealing or misusing them by making malicious software termed as Malwares. People who make malicious software are called Malware writers. Types of Malwares are Viruses,Worms,Trojan Horse.
  7. 7.  Targeted attacks on military installations, power plants, air traffic control, banks, telecommunication networks. Cyber terrorism is an attractive option for modern terrorists for several reasons: 1) Cheaper and more anonymous than traditional terrorist methods. 2) Variety and number of targets are enormous. 3) Crime can be conducted remotely. 4) Has the potential to affect directly a larger number of people.
  8. 8. Theft of software through the illegalcopying of genuine programs Orthe counterfeiting and distributionof products intended to pass for theoriginal.
  9. 9.  Use virus detection software that is regularly updated. Password protected screen savers. Secure physical set-up that is not open to the public or unmonitored. Require network logins if you are on a network. Standardize the desktop so as to limit what an end-user can and cannot do.
  10. 10.  The server should be kept in a locked and restricted area. Administrative passwords and equivalencies should be given to a minimal number of people. Administrative passwords should be changed regularly. Users should only be given access to file systems that they will actually need to use. Use of virus detection software that is regularly updated.
  11. 11.  Use of Firewalls :Firewalls are a system or combination ofsystems that supports an access controlpolicy between two networks. A firewall can limit the types oftransactions that enter a system, as well as thetypes of transactions that leave a system. Use of powerful Encryption Techniques:Provides secured transactions over theinternet. Ex: Public Key Cryptography
  12. 12. Uninstall unnecessary software .Check security settings.Use a powerful antivirus software and update it regularly.Back-up your computer data on disks or CDs often.Keep your operating system up to date with critical securityupdates .
  13. 13. While using Internet:Log-out and login on your accounts each day.Disable unused accounts.Change passwords of your accounts at least every 30 days.Never give your full name or address to strangers on Internet.Avoid sending any photograph online particularly to strangers.Dont open emails or attachments from unknown sources.Never send your credit card number to any site that is not secure.