SlideShare a Scribd company logo
INTRODUCTION TO
CYBERCRIME AND
SECURITY
BY PANKAJ R. KUMAWAT
WHAT IS CYBERCRIME?
• USING THE INTERNET TO COMMIT A CRIME.
• IDENTITY THEFT
• HACKING
• VIRUSES
• FACILITATION OF TRADITIONAL CRIMINAL ACTIVITY
• STALKING
• STEALING INFORMATION
• CHILD PORNOGRAPHY
CYBERCRIME COMPONENTS
• COMPUTERS
• CELL PHONES
• PDA’S
• GAME CONSOLES
HIGH-PROFILE CYBERCRIME-
RELATED CASES
• TJ MAXX DATA BREACH
• 45 MILLION CREDIT AND DEBIT CARD NUMBERS STOLEN
• KWAME KILPATRICK
• CELL PHONE TEXT MESSAGES
• BTK SERIAL KILLER
• KEVIN MITNICK
COMPUTER SECURITY
• CONFIDENTIALITY
• ONLY THOSE AUTHORIZED TO VIEW INFORMATION
• INTEGRITY
• INFORMATION IS CORRECT AND HASN’T BEEN ALTERED BY UNAUTHORIZED USERS OR
SOFTWARE
• AVAILABILITY
• DATA IS ACCESSIBLE TO AUTHORIZED USERS
COMPUTER SECURITY
Figure 1.0 – CIA Triangle
COMPUTER SECURITY - THREATS
• MALWARE
• SOFTWARE THAT HAS A MALICIOUS PURPOSE
• VIRUSES
• TROJAN HORSE
• SPYWARE
COMPUTER SECURITY - THREATS
• INTRUSIONS
• ANY ATTEMPT TO GAIN UNAUTHORIZED ACCESS TO A SYSTEM
• CRACKING
• HACKING
• SOCIAL ENGINEERING
• WAR-DRIVING
COMPUTER SECURITY - THREATS
• DENIAL-OF-SERVICE (DOS)
• PREVENTION OF LEGITIMATE ACCESS TO SYSTEMS
• ALSO DISTRIBUTED-DENIAL-OF-SERVICE (DDOS)
• DIFFERENT TYPES:
• PING-OF-DEATH
• TEARDROP
• SMURF
• SYN
COMPUTER SECURITY - THREATS
Figure 1.1 – DoS and DDoS Models
COMPUTER SECURITY - TERMINOLOGY
• PEOPLE
• HACKERS
• WHITE HAT – GOOD GUYS. REPORT HACKS/VULNERABILITIES TO APPROPRIATE
PEOPLE.
• BLACK HAT – ONLY INTERESTED IN PERSONAL GOALS, REGARDLESS OF IMPACT.
• GRAY HAT – SOMEWHERE IN BETWEEN.
COMPUTER SECURITY - TERMINOLOGY
• SCRIPT KIDDIES
• SOMEONE THAT CALLS THEMSELVES A ‘HACKER’ BUT REALLY ISN’T
• ETHICAL HACKER
• SOMEONE HIRED TO HACK A SYSTEM TO FIND VULNERABILITIES AND REPORT ON
THEM.
• ALSO CALLED A ‘SNEAKER’
COMPUTER SECURITY - TERMINOLOGY
• SECURITY DEVICES
• FIREWALL
• BARRIER BETWEEN NETWORK AND THE OUTSIDE WORLD.
• PROXY SERVER
• SITS BETWEEN USERS AND SERVER. TWO MAIN FUNCTIONS ARE TO IMPROVE
PERFORMANCE AND FILTER REQUESTS.
• INTRUSION DETECTION SYSTEMS (IDS)
• MONITORS NETWORK TRAFFIC FOR SUSPICIOUS ACTIVITY.
COMPUTER SECURITY - TERMINOLOGY
• ACTIVITIES
• PHREAKING
• BREAKING INTO TELEPHONE SYSTEMS (USED IN CONJUNCTION WITH WAR-DIALING)
• AUTHENTICATION
• DETERMINES WHETHER CREDENTIALS ARE AUTHORIZED TO ACCESS A RESOURCE
• AUDITING
• REVIEWING LOGS, RECORDS, OR PROCEDURES FOR COMPLIANCE WITH STANDARDS
COMPUTER SECURITY - CAREERS
• INFORMATION SECURITY ANALYST
US NATIONAL AVERAGE SALARY
Figure 1.2 – Median salary courtesy cbsalary.com
COMPUTER SECURITY -
CERTIFICATIONS
• ENTRY-LEVEL
• SECURITY+ HTTP://WWW.COMPTIA.ORG/CERTIFICATIONS/LISTED/SECURITY.ASPX
• CIW SECURITY ANALYST WWW.CIWCERTIFIED.COM
• INTERMEDIATE
• MSCE SECURITY
HTTP://WWW.MICROSOFT.COM/LEARNING/EN/US/CERTIFICATION/MCSE.ASPX#TAB3
• PROFESSIONAL
• CISSP WWW.ISC2.ORG
• SANS WWW.SANS.ORG
COMPUTER SECURITY - EDUCATION
• COMMUNITY-COLLEGE
• WASHTENAW COMMUNITY COLLEGE
• COMPUTER SYSTEMS SECURITY
HTTP://WWW4.WCCNET.EDU/ACADEMICINFO/CREDITOFFERINGS/PROGRAMS/DEG
REE.PHP?CODE=APCSS
• COMPUTER FORENSICS
HTTP://WWW4.WCCNET.EDU/ACADEMICINFO/CREDITOFFERINGS/PROGRAMS/DEG
REE.PHP?CODE=APDRAD
COMPUTER SECURITY - EDUCATION
• 4-YEAR COLLEGE
• EASTERN MICHIGAN UNIVERSITY
• INFORMATION ASSURANCE
• APPLIED
• NETWORK
• CRYPTOGRAPHY
• MANAGEMENT
• HTTP://WWW.EMICH.EDU/IA/UNDERGRADUATE.HTML
Any Queries ????
THANK YOU !!THANK YOU !!

More Related Content

What's hot

Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarian
Rupesh Verma
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
OWASP Delhi
 
Homeland Security workshop
Homeland Security workshopHomeland Security workshop
Homeland Security workshop
Candice Martinez
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
harshitakhandelwal26
 
From Strategy To Tactics - Targeting And Protecting Privileged Accounts
From Strategy To Tactics - Targeting And Protecting Privileged AccountsFrom Strategy To Tactics - Targeting And Protecting Privileged Accounts
From Strategy To Tactics - Targeting And Protecting Privileged Accounts
Lavi Lazarovitz
 
Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)
Abhinav Biswas
 
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
North Texas Chapter of the ISSA
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
PECB
 
NTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic FailuresNTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic Failures
North Texas Chapter of the ISSA
 
Wireless Keyboard Threats
Wireless Keyboard ThreatsWireless Keyboard Threats
Wireless Keyboard Threats
Will Hatcher
 
Building powerful apps with ArangoDB & KeyLines
Building powerful apps with ArangoDB & KeyLinesBuilding powerful apps with ArangoDB & KeyLines
Building powerful apps with ArangoDB & KeyLines
Cambridge Intelligence
 
Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)
Tanja Drca
 
How to transition from selling security products to selling profitable securi...
How to transition from selling security products to selling profitable securi...How to transition from selling security products to selling profitable securi...
How to transition from selling security products to selling profitable securi...
Richard Tubb
 
Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?
Antonio Sanz Alcober
 
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
COIICV
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
noornabi16
 
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Abhinav Biswas
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Abhinav Biswas
 
Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Cyber Attacks: How to Ninja-Proof Your Data - Centre TechnologiesCyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Centre Technologies
 
Security and ethical hacking initiative first session
Security and ethical hacking initiative   first sessionSecurity and ethical hacking initiative   first session
Security and ethical hacking initiative first session
Sithira Pathirana
 

What's hot (20)

Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarian
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
 
Homeland Security workshop
Homeland Security workshopHomeland Security workshop
Homeland Security workshop
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
From Strategy To Tactics - Targeting And Protecting Privileged Accounts
From Strategy To Tactics - Targeting And Protecting Privileged AccountsFrom Strategy To Tactics - Targeting And Protecting Privileged Accounts
From Strategy To Tactics - Targeting And Protecting Privileged Accounts
 
Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)
 
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
NTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic FailuresNTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - A Brief History of Cryptographic Failures
 
Wireless Keyboard Threats
Wireless Keyboard ThreatsWireless Keyboard Threats
Wireless Keyboard Threats
 
Building powerful apps with ArangoDB & KeyLines
Building powerful apps with ArangoDB & KeyLinesBuilding powerful apps with ArangoDB & KeyLines
Building powerful apps with ArangoDB & KeyLines
 
Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)Mobile #Infosec hackathon for journalists(2)
Mobile #Infosec hackathon for journalists(2)
 
How to transition from selling security products to selling profitable securi...
How to transition from selling security products to selling profitable securi...How to transition from selling security products to selling profitable securi...
How to transition from selling security products to selling profitable securi...
 
Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?
 
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Cyber Attacks: How to Ninja-Proof Your Data - Centre TechnologiesCyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
 
Security and ethical hacking initiative first session
Security and ethical hacking initiative   first sessionSecurity and ethical hacking initiative   first session
Security and ethical hacking initiative first session
 

Viewers also liked

Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 

Viewers also liked (8)

Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 

Similar to Cyber crime

2 cyber security challenges in io t
2 cyber security challenges in io t2 cyber security challenges in io t
2 cyber security challenges in io t
Chintan Patel
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
dhumaletiku
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
primeteacher32
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
Parag Deodhar
 
Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...
IT Arena
 
Internet of Things - Overview
Internet of Things - OverviewInternet of Things - Overview
Internet of Things - Overview
Thanuja Seneviratne
 
Ransomware: History, Analysis, & Mitigation
Ransomware: History, Analysis, & MitigationRansomware: History, Analysis, & Mitigation
Ransomware: History, Analysis, & Mitigation
WhiskeyNeon
 
Ethical hacking (legal)
Ethical hacking (legal)Ethical hacking (legal)
Ethical hacking (legal)
Thangaraj Murugananthan
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
S.M. Towhidul Islam
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
Er Mahendra Yadav
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Varshil Patel
 
introtomalware
introtomalwareintrotomalware
introtomalware
Alexander Rivera
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
Charles Cline
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
AfreenYousaf
 
Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8
Ajeet Choudhary
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yours
MotherGuardians
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
chauhananand17
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
Faizan Janjua
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
ST_World
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
Aravind R
 

Similar to Cyber crime (20)

2 cyber security challenges in io t
2 cyber security challenges in io t2 cyber security challenges in io t
2 cyber security challenges in io t
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...
 
Internet of Things - Overview
Internet of Things - OverviewInternet of Things - Overview
Internet of Things - Overview
 
Ransomware: History, Analysis, & Mitigation
Ransomware: History, Analysis, & MitigationRansomware: History, Analysis, & Mitigation
Ransomware: History, Analysis, & Mitigation
 
Ethical hacking (legal)
Ethical hacking (legal)Ethical hacking (legal)
Ethical hacking (legal)
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
introtomalware
introtomalwareintrotomalware
introtomalware
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yours
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 

More from Pankaj Kumawat

Firewall
FirewallFirewall
Firewall
Pankaj Kumawat
 
Antivirus
AntivirusAntivirus
Antivirus
Pankaj Kumawat
 
Android system
Android systemAndroid system
Android system
Pankaj Kumawat
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
Pankaj Kumawat
 
Sisth sense technology
Sisth sense technologySisth sense technology
Sisth sense technology
Pankaj Kumawat
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
Pankaj Kumawat
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Pankaj Kumawat
 

More from Pankaj Kumawat (7)

Firewall
FirewallFirewall
Firewall
 
Antivirus
AntivirusAntivirus
Antivirus
 
Android system
Android systemAndroid system
Android system
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
Sisth sense technology
Sisth sense technologySisth sense technology
Sisth sense technology
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

Cyber crime

  • 2. WHAT IS CYBERCRIME? • USING THE INTERNET TO COMMIT A CRIME. • IDENTITY THEFT • HACKING • VIRUSES • FACILITATION OF TRADITIONAL CRIMINAL ACTIVITY • STALKING • STEALING INFORMATION • CHILD PORNOGRAPHY
  • 3. CYBERCRIME COMPONENTS • COMPUTERS • CELL PHONES • PDA’S • GAME CONSOLES
  • 4. HIGH-PROFILE CYBERCRIME- RELATED CASES • TJ MAXX DATA BREACH • 45 MILLION CREDIT AND DEBIT CARD NUMBERS STOLEN • KWAME KILPATRICK • CELL PHONE TEXT MESSAGES • BTK SERIAL KILLER • KEVIN MITNICK
  • 5. COMPUTER SECURITY • CONFIDENTIALITY • ONLY THOSE AUTHORIZED TO VIEW INFORMATION • INTEGRITY • INFORMATION IS CORRECT AND HASN’T BEEN ALTERED BY UNAUTHORIZED USERS OR SOFTWARE • AVAILABILITY • DATA IS ACCESSIBLE TO AUTHORIZED USERS
  • 6. COMPUTER SECURITY Figure 1.0 – CIA Triangle
  • 7. COMPUTER SECURITY - THREATS • MALWARE • SOFTWARE THAT HAS A MALICIOUS PURPOSE • VIRUSES • TROJAN HORSE • SPYWARE
  • 8. COMPUTER SECURITY - THREATS • INTRUSIONS • ANY ATTEMPT TO GAIN UNAUTHORIZED ACCESS TO A SYSTEM • CRACKING • HACKING • SOCIAL ENGINEERING • WAR-DRIVING
  • 9. COMPUTER SECURITY - THREATS • DENIAL-OF-SERVICE (DOS) • PREVENTION OF LEGITIMATE ACCESS TO SYSTEMS • ALSO DISTRIBUTED-DENIAL-OF-SERVICE (DDOS) • DIFFERENT TYPES: • PING-OF-DEATH • TEARDROP • SMURF • SYN
  • 10. COMPUTER SECURITY - THREATS Figure 1.1 – DoS and DDoS Models
  • 11. COMPUTER SECURITY - TERMINOLOGY • PEOPLE • HACKERS • WHITE HAT – GOOD GUYS. REPORT HACKS/VULNERABILITIES TO APPROPRIATE PEOPLE. • BLACK HAT – ONLY INTERESTED IN PERSONAL GOALS, REGARDLESS OF IMPACT. • GRAY HAT – SOMEWHERE IN BETWEEN.
  • 12. COMPUTER SECURITY - TERMINOLOGY • SCRIPT KIDDIES • SOMEONE THAT CALLS THEMSELVES A ‘HACKER’ BUT REALLY ISN’T • ETHICAL HACKER • SOMEONE HIRED TO HACK A SYSTEM TO FIND VULNERABILITIES AND REPORT ON THEM. • ALSO CALLED A ‘SNEAKER’
  • 13. COMPUTER SECURITY - TERMINOLOGY • SECURITY DEVICES • FIREWALL • BARRIER BETWEEN NETWORK AND THE OUTSIDE WORLD. • PROXY SERVER • SITS BETWEEN USERS AND SERVER. TWO MAIN FUNCTIONS ARE TO IMPROVE PERFORMANCE AND FILTER REQUESTS. • INTRUSION DETECTION SYSTEMS (IDS) • MONITORS NETWORK TRAFFIC FOR SUSPICIOUS ACTIVITY.
  • 14. COMPUTER SECURITY - TERMINOLOGY • ACTIVITIES • PHREAKING • BREAKING INTO TELEPHONE SYSTEMS (USED IN CONJUNCTION WITH WAR-DIALING) • AUTHENTICATION • DETERMINES WHETHER CREDENTIALS ARE AUTHORIZED TO ACCESS A RESOURCE • AUDITING • REVIEWING LOGS, RECORDS, OR PROCEDURES FOR COMPLIANCE WITH STANDARDS
  • 15. COMPUTER SECURITY - CAREERS • INFORMATION SECURITY ANALYST US NATIONAL AVERAGE SALARY Figure 1.2 – Median salary courtesy cbsalary.com
  • 16. COMPUTER SECURITY - CERTIFICATIONS • ENTRY-LEVEL • SECURITY+ HTTP://WWW.COMPTIA.ORG/CERTIFICATIONS/LISTED/SECURITY.ASPX • CIW SECURITY ANALYST WWW.CIWCERTIFIED.COM • INTERMEDIATE • MSCE SECURITY HTTP://WWW.MICROSOFT.COM/LEARNING/EN/US/CERTIFICATION/MCSE.ASPX#TAB3 • PROFESSIONAL • CISSP WWW.ISC2.ORG • SANS WWW.SANS.ORG
  • 17. COMPUTER SECURITY - EDUCATION • COMMUNITY-COLLEGE • WASHTENAW COMMUNITY COLLEGE • COMPUTER SYSTEMS SECURITY HTTP://WWW4.WCCNET.EDU/ACADEMICINFO/CREDITOFFERINGS/PROGRAMS/DEG REE.PHP?CODE=APCSS • COMPUTER FORENSICS HTTP://WWW4.WCCNET.EDU/ACADEMICINFO/CREDITOFFERINGS/PROGRAMS/DEG REE.PHP?CODE=APDRAD
  • 18. COMPUTER SECURITY - EDUCATION • 4-YEAR COLLEGE • EASTERN MICHIGAN UNIVERSITY • INFORMATION ASSURANCE • APPLIED • NETWORK • CRYPTOGRAPHY • MANAGEMENT • HTTP://WWW.EMICH.EDU/IA/UNDERGRADUATE.HTML