2. C O N T E X T
1. Introduction
1. Definitions
2. The Perpetrators
1. Hackers
2. Crackers
2. Why People Hack?
1. Hacktivism
2. Employees
3. Recreational Hackers
4. Web site Administrators and Web Page
3. 4. Types of Cyber Crime
1. Malicious Code – Viruses , Worms and Trojans
2. Denial of Service (DOS)
3. Cyberstalking
4. Financial Crimes
5. Cyber Pornography
6. Sale of Illegal Articles
7. Online Gambling
8. Intellectual Property Crimes
9. Email Spoofing
10. Forgery
4. 5. Importance of Cyber Security in Cyber Crimes
6. The Concept of Cyber Prevention and Detection
1. Prevention Tips
7. What to do if you are a Victim?
8. Recent Trends in Security
9. Conclusion
5. I N T R O D U C T I O N
• What is Cyber Crime?
• The Perpetrators
• Terminologies Related to Cyber Crime
• Hacker
• Cracker
6. W H Y P E O P L E H A C K ?
• Hacktivism
• Employees
• Recreational Hackers
• Web Site Administrators
7. T Y P E S O F C Y B E R C R I M E
• Malicious Code
• Viruses
• Worms
• Trojans
• Denial of Service
• Cyberstalking
• Financial Crimes
• Cyber Pornography
• Sale of Illegal Articles
9. I M P O R T A N C E O F C Y B E R S E C U R I
T Y
• Who is behind such Attacks?
• Types of Computer Security – An Overview
• Internet and Network Security
• Standalone Computer Security
• Data Loss by Accidents
• Protect your Computer with Security Software
• Protect your Personal Information
10. C Y B E R P R E V E N T I O N A N D D E T E C
T I O N
• User Account
User account access controls and cryptography can protect system files and data, respectively.
• Firewalls
Firewalls are by far the most common prevention systems from a network security perspective as they
can shield access to internal network services, and block certain kinds of attacks through packet filtering.
• Intrusion Detection Systems
IDSs are designed to detect network attacks in progress assist in post-attack forensics,
11. Prevention Tips :
A. Keep your computer current with the latest patches and updates.
B. Make sure your computer is configured securely.
C. Choose strong password s and keep them safe.
12. WHAT TO DO IF YOU ARE A VICTIM?
• Disconnect Immediately . Unplug the network cable, phone or cable
line from your machine. This can prevent data from being leaked back
to the attacker.
• Scan your computer with up-to-date antivirus program such as
Norton Antivirus or Norton Internet Security.
• Back up your critical information. Sensitive data may be leaked by
crime ware and it also may be inadvertently destroyed or lost during
the clean-up effort. If you have back –up software installed, make a
copy of your valuable files.
13. • Consider re-installing the operating system of your computer (e.g.
Microsoft Windows) or using back-up software.
• Close affected accounts immediately and File a police report.
• Contact Government agencies. If your driver’s license or social
security number have been stolen.
14. R E C E N T T R E N D S I N S E C U R I T Y
• Windows Hello Waves Off Passwords
• No need to Waste Brain Space on Yahoo Passwords
• Advantages of Two-Factor Authentication
• Facebook Launches ThreatExchnge to Stymie Cybercrime