SlideShare a Scribd company logo
1 of 19
DIYTP 2009
What is Cybercrime?
 Using the Internet to commit a crime.
 Identity Theft
 Hacking
 Viruses
 Facilitation of traditional criminal activity
 Stalking
 Stealing information
 Child Pornography
Cybercrime Components
 Computers
 Cell Phones
 PDA’s
 Game Consoles
High-Profile Cybercrime-
related Cases
 TJ Maxx data breach
 45 million credit and debit card numbers stolen
 Kwame Kilpatrick
 Cell phone text messages
 BTK Serial Killer
 Kevin Mitnick
Computer Security
 Confidentiality
 Only those authorized to view information
 Integrity
 Information is correct and hasn’t been altered by
unauthorized users or software
 Availability
 Data is accessible to authorized users
Computer Security
Figure 1.0 – CIA Triangle
Computer Security - Threats
 Malware
 Software that has a malicious purpose
 Viruses
 Trojan horse
 Spyware
Computer Security - Threats
 Intrusions
 Any attempt to gain unauthorized access to a
system
 Cracking
 Hacking
 Social Engineering
 War-driving
Computer Security - Threats
 Denial-of-Service (DOS)
 Prevention of legitimate access to systems
 Also Distributed-Denial-of-Service (DDoS)
 Different types:
 Ping-of-Death
 Teardrop
 Smurf
 SYN
Computer Security - Threats
Figure 1.1 – DoS and DDoS Models
Computer Security -
Terminology
 People
 Hackers
 White Hat – Good guys. Report hacks/vulnerabilities
to appropriate people.
 Black Hat – Only interested in personal goals,
regardless of impact.
 Gray Hat – Somewhere in between.
Computer Security -
Terminology
 Script Kiddies
 Someone that calls themselves a ‘hacker’ but
really isn’t
 Ethical Hacker
 Someone hired to hack a system to find
vulnerabilities and report on them.
 Also called a ‘sneaker’
Computer Security -
Terminology
 Security Devices
 Firewall
 Barrier between network and the outside world.
 Proxy server
 Sits between users and server. Two main functions
are to improve performance and filter requests.
 Intrusion Detection Systems (IDS)
 Monitors network traffic for suspicious activity.
Computer Security -
Terminology
 Activities
 Phreaking
 Breaking into telephone systems (used in
conjunction with war-dialing)
 Authentication
 Determines whether credentials are authorized to
access a resource
 Auditing
 Reviewing logs, records, or procedures for
compliance with standards
Computer Security - Careers
 Information Security Analyst
US National Average Salary
Figure 1.2 – Median salary courtesy cbsalary.com
Computer Security -
Certifications
 Entry-level
 Security+
http://www.comptia.org/certifications/listed/security.
aspx
 CIW Security Analyst www.ciwcertified.com
 Intermediate
 MSCE Security
http://www.microsoft.com/learning/en/us/certification
/mcse.aspx#tab3
 Professional
 CISSP www.isc2.org
 SANS www.sans.org
Computer Security - Education
 Community-college
 Washtenaw Community College
 Computer Systems Security
http://www4.wccnet.edu/academicinfo/creditofferin
gs/programs/degree.php?code=APCSS
 Computer Forensics
http://www4.wccnet.edu/academicinfo/creditofferin
gs/programs/degree.php?code=APDRAD
Computer Security - Education
 4-Year College
 Eastern Michigan University
 Information Assurance
 Applied
 Network
 Cryptography
 Management
 http://www.emich.edu/ia/undergraduate.html
Cybercrime

More Related Content

What's hot

3 f6 security
3 f6 security3 f6 security
3 f6 securityop205
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterpriseAbha Damani
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data ProtectionCreatorsCircle
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber securityankit gandharkar
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Securing information system
Securing information systemSecuring information system
Securing information systemTanjim Rasul
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)BPalmer13
 
Malicion software
Malicion softwareMalicion software
Malicion softwareA. Shamel
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E CommerceEamonnORagh
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systemsOmid Aminzadeh Gohari
 

What's hot (20)

3 f6 security
3 f6 security3 f6 security
3 f6 security
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterprise
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
 
E business security
E business securityE business security
E business security
 
Computer security
Computer securityComputer security
Computer security
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Information security
Information securityInformation security
Information security
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
E-commerce Security and Payment
E-commerce Security and PaymentE-commerce Security and Payment
E-commerce Security and Payment
 
Malicion software
Malicion softwareMalicion software
Malicion software
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E Commerce
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
 

Viewers also liked

Islamic holiday packages
Islamic holiday packagesIslamic holiday packages
Islamic holiday packagesawaytomakkah
 
โครงการปลูกต้นไม้สวยงาม (Mobile)
โครงการปลูกต้นไม้สวยงาม (Mobile)โครงการปลูกต้นไม้สวยงาม (Mobile)
โครงการปลูกต้นไม้สวยงาม (Mobile)Mimmyhang Circle
 
Hajj travel packages
Hajj travel packagesHajj travel packages
Hajj travel packagesawaytomakkah
 
Five star hajj packages
Five star hajj packagesFive star hajj packages
Five star hajj packagesawaytomakkah
 
Infografik zu Digital HR - digitale Transformation im Personalmanagement
Infografik zu Digital HR - digitale Transformation im PersonalmanagementInfografik zu Digital HR - digitale Transformation im Personalmanagement
Infografik zu Digital HR - digitale Transformation im PersonalmanagementCompetence Books
 
Analysing a tv drama
Analysing a tv dramaAnalysing a tv drama
Analysing a tv dramaCaitlinDay
 
Textual analysis of se7en
Textual analysis of se7enTextual analysis of se7en
Textual analysis of se7enCaitlinDay
 
Zeit & Zutritt Kompakt - für Lösungen für Sicherheit und Steuerbarkeit für da...
Zeit & Zutritt Kompakt - für Lösungen für Sicherheit und Steuerbarkeit für da...Zeit & Zutritt Kompakt - für Lösungen für Sicherheit und Steuerbarkeit für da...
Zeit & Zutritt Kompakt - für Lösungen für Sicherheit und Steuerbarkeit für da...Competence Books
 
Digital HR als Digitalisierung und Neudenken des Personalmanagements (Compete...
Digital HR als Digitalisierung und Neudenken des Personalmanagements (Compete...Digital HR als Digitalisierung und Neudenken des Personalmanagements (Compete...
Digital HR als Digitalisierung und Neudenken des Personalmanagements (Compete...Competence Books
 
第2弾リリース 20151123
第2弾リリース 20151123第2弾リリース 20151123
第2弾リリース 20151123shiofw23
 
第3弾リリース 20161207
第3弾リリース 20161207第3弾リリース 20161207
第3弾リリース 20161207shiofw23
 
Photonics market data on sensors, date centers, detectors, lighting (LED and ...
Photonics market data on sensors, date centers, detectors, lighting (LED and ...Photonics market data on sensors, date centers, detectors, lighting (LED and ...
Photonics market data on sensors, date centers, detectors, lighting (LED and ...Carlos Lee
 
Priscilla_Lynn_CV AUGUST 2016
Priscilla_Lynn_CV AUGUST 2016Priscilla_Lynn_CV AUGUST 2016
Priscilla_Lynn_CV AUGUST 2016Priscilla Lynn
 

Viewers also liked (15)

Islamic holiday packages
Islamic holiday packagesIslamic holiday packages
Islamic holiday packages
 
โครงการปลูกต้นไม้สวยงาม (Mobile)
โครงการปลูกต้นไม้สวยงาม (Mobile)โครงการปลูกต้นไม้สวยงาม (Mobile)
โครงการปลูกต้นไม้สวยงาม (Mobile)
 
Hajj travel packages
Hajj travel packagesHajj travel packages
Hajj travel packages
 
Five star hajj packages
Five star hajj packagesFive star hajj packages
Five star hajj packages
 
Infografik zu Digital HR - digitale Transformation im Personalmanagement
Infografik zu Digital HR - digitale Transformation im PersonalmanagementInfografik zu Digital HR - digitale Transformation im Personalmanagement
Infografik zu Digital HR - digitale Transformation im Personalmanagement
 
Analysing a tv drama
Analysing a tv dramaAnalysing a tv drama
Analysing a tv drama
 
Textual analysis of se7en
Textual analysis of se7enTextual analysis of se7en
Textual analysis of se7en
 
Zeit & Zutritt Kompakt - für Lösungen für Sicherheit und Steuerbarkeit für da...
Zeit & Zutritt Kompakt - für Lösungen für Sicherheit und Steuerbarkeit für da...Zeit & Zutritt Kompakt - für Lösungen für Sicherheit und Steuerbarkeit für da...
Zeit & Zutritt Kompakt - für Lösungen für Sicherheit und Steuerbarkeit für da...
 
Digital HR als Digitalisierung und Neudenken des Personalmanagements (Compete...
Digital HR als Digitalisierung und Neudenken des Personalmanagements (Compete...Digital HR als Digitalisierung und Neudenken des Personalmanagements (Compete...
Digital HR als Digitalisierung und Neudenken des Personalmanagements (Compete...
 
第2弾リリース 20151123
第2弾リリース 20151123第2弾リリース 20151123
第2弾リリース 20151123
 
第3弾リリース 20161207
第3弾リリース 20161207第3弾リリース 20161207
第3弾リリース 20161207
 
Photonics market data on sensors, date centers, detectors, lighting (LED and ...
Photonics market data on sensors, date centers, detectors, lighting (LED and ...Photonics market data on sensors, date centers, detectors, lighting (LED and ...
Photonics market data on sensors, date centers, detectors, lighting (LED and ...
 
Priscilla_Lynn_CV AUGUST 2016
Priscilla_Lynn_CV AUGUST 2016Priscilla_Lynn_CV AUGUST 2016
Priscilla_Lynn_CV AUGUST 2016
 
Nasir_CV
Nasir_CVNasir_CV
Nasir_CV
 
Nasir cv
Nasir cvNasir cv
Nasir cv
 

Similar to Cybercrime

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hackingchakrekevin
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxarnoldmeredith47041
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdfPhD Assistance
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-bBbAOC
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityIllumeo
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingMuhammad FAHAD
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber securityJetking
 
cyber secuirty.pptx
cyber secuirty.pptxcyber secuirty.pptx
cyber secuirty.pptxGodwin585235
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxtanyamudgal4
 

Similar to Cybercrime (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ch01 Introduction to Security
Ch01 Introduction to SecurityCh01 Introduction to Security
Ch01 Introduction to Security
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
cyber secuirty.pptx
cyber secuirty.pptxcyber secuirty.pptx
cyber secuirty.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 

Recently uploaded

定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 

Cybercrime

  • 2. What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity  Stalking  Stealing information  Child Pornography
  • 3. Cybercrime Components  Computers  Cell Phones  PDA’s  Game Consoles
  • 4. High-Profile Cybercrime- related Cases  TJ Maxx data breach  45 million credit and debit card numbers stolen  Kwame Kilpatrick  Cell phone text messages  BTK Serial Killer  Kevin Mitnick
  • 5. Computer Security  Confidentiality  Only those authorized to view information  Integrity  Information is correct and hasn’t been altered by unauthorized users or software  Availability  Data is accessible to authorized users
  • 6. Computer Security Figure 1.0 – CIA Triangle
  • 7. Computer Security - Threats  Malware  Software that has a malicious purpose  Viruses  Trojan horse  Spyware
  • 8. Computer Security - Threats  Intrusions  Any attempt to gain unauthorized access to a system  Cracking  Hacking  Social Engineering  War-driving
  • 9. Computer Security - Threats  Denial-of-Service (DOS)  Prevention of legitimate access to systems  Also Distributed-Denial-of-Service (DDoS)  Different types:  Ping-of-Death  Teardrop  Smurf  SYN
  • 10. Computer Security - Threats Figure 1.1 – DoS and DDoS Models
  • 11. Computer Security - Terminology  People  Hackers  White Hat – Good guys. Report hacks/vulnerabilities to appropriate people.  Black Hat – Only interested in personal goals, regardless of impact.  Gray Hat – Somewhere in between.
  • 12. Computer Security - Terminology  Script Kiddies  Someone that calls themselves a ‘hacker’ but really isn’t  Ethical Hacker  Someone hired to hack a system to find vulnerabilities and report on them.  Also called a ‘sneaker’
  • 13. Computer Security - Terminology  Security Devices  Firewall  Barrier between network and the outside world.  Proxy server  Sits between users and server. Two main functions are to improve performance and filter requests.  Intrusion Detection Systems (IDS)  Monitors network traffic for suspicious activity.
  • 14. Computer Security - Terminology  Activities  Phreaking  Breaking into telephone systems (used in conjunction with war-dialing)  Authentication  Determines whether credentials are authorized to access a resource  Auditing  Reviewing logs, records, or procedures for compliance with standards
  • 15. Computer Security - Careers  Information Security Analyst US National Average Salary Figure 1.2 – Median salary courtesy cbsalary.com
  • 16. Computer Security - Certifications  Entry-level  Security+ http://www.comptia.org/certifications/listed/security. aspx  CIW Security Analyst www.ciwcertified.com  Intermediate  MSCE Security http://www.microsoft.com/learning/en/us/certification /mcse.aspx#tab3  Professional  CISSP www.isc2.org  SANS www.sans.org
  • 17. Computer Security - Education  Community-college  Washtenaw Community College  Computer Systems Security http://www4.wccnet.edu/academicinfo/creditofferin gs/programs/degree.php?code=APCSS  Computer Forensics http://www4.wccnet.edu/academicinfo/creditofferin gs/programs/degree.php?code=APDRAD
  • 18. Computer Security - Education  4-Year College  Eastern Michigan University  Information Assurance  Applied  Network  Cryptography  Management  http://www.emich.edu/ia/undergraduate.html