CYBER SECURITY
PRESENTING BY:
KAZI SAZED SALMAN ID: 2015210001045
MUSTARY UMMA ASHA ID: 2015210001029
WHAT IS CYBER SECURITY
Cyber security is the protection of
computer & network systems for
preventing -
• Theft
• Damage to the hardware & software
• Misdirection of the information
WHY CYBER SECURITY IS
IMPORTANT
• To ensure data protection
• Restrict unauthorized users
• Prevent losing data
• Ensuring privacy & confidentiality
• To keep safe from the cyber crime
WHAT IS CYBER CRIME
• Crime committed using a computer and the
internet to steal data or information.
• Illegal imports.
• Malicious programs.
A FEW REMARKABLE HISTORIES
1971 – John Draper builds a ‘blue box’ that
reproduces a 26kHz tone, which allows to
make free calls.
1981 – Ian Murphy, becomes first convict of a
computer crime, broke into a super shop’s
computers and changed the billing clock so
that people receive discounted rates during
normal business hours.
1986 – “Brain” the first standard computer
virus released.
1988 – National Bank of Chicago, first victim
1991 – Kevin Poulsen was captured for selling
military secrets
1994 – A 16 year old UK student, got arrested
for accessing computers at the Korean Atomic
Research Institute, NASA and several US govt.
agencies.
1996 – Russian cracker attempts to extort
$100K from thousands of customers' credit
card numbers
2007 – First cyber warfare in Estonia
2010 – WikiLeaks released Iraq War
documents and Afghan War documents
A FEW REMARKABLE HISTORIES
(CONT.)
CYBERCRIMES IN 2013
RECENT ATTACK IN
BANGLADESH
• In February 2016, US$951 million had been
illegally transferred from Bangladesh Bank.
• Issued via the SWIFT network.
• Withdrawn from a Bangladesh Bank account at
the Federal Reserve Bank of New York.
• $20 million traced in Sri Lanka (since
recovered) and $81 million in the Philippines
(about $18 million recovered).
• The Federal Reserve Bank of NY blocked the
remaining thirty transactions, amounting to
$850 million, at the request of Bangladesh
TYPES OF CYBER CRIME
A.Hacking
B.Theft / Piracy
C.Cyber stalking (spying)
D.Identity theft
E. Malicious program
F. Child soliciting & abuse
HACKING
• A person’s computer is
broken into so that his
personal or sensitive
information can be
accessed.
• A hacker uses a variety
of software to enter a
person’s computer and
the person may not be
aware that his computer
is being accessed from a
THEFT / PIRACY
• Copyright infringement
(piracy) occurs when a
person violates copyrights
and downloads music,
movies, games and
software.
• The owner of the
copyright gets no
monetary value of his
work from the pirated
CYBER STALKING
• This is a kind of online
harassment wherein the
victim is subjected to a
barrage of online
messages, emails &
pictures by the stalker.
• Typically, these stalkers
know their victims and
they use the internet to
stalk & spy.
IDENTITY THEFT
• A criminal accesses data
about a person’s bank
account, credit cards,
Social Security, debit card
and other sensitive
information to withdraw
money or to buy things
online in the victim’s
name.
• It can result in major
MALICIOUS SOFTWARE
• The software is used to
gain access to a system to
steal information or data
or causing damage to
other software or data
present in the system
• These can be Internet-
based software or
programs that are used to
disrupt a network
TYPES OF CYBER ATTACK
Financial fraud: 11%
Sabotage of data/networks: 17%
Theft of proprietary information:
20%
System penetration from the outside:
25%
Denial of service:
27%
Unauthorized access by insiders:
71%
CYBER SECURITY STAGES
Personal
Security
Organiza
tional
Security
National
Security
PERSONAL SECURITY
• Never click on unknown links in emails.
• Do not give out personal information.
• Use recommended antivirus.
• Do not run non-familiar application.
• Keep information private in the social media.
• Keep operating system, browser, anti-virus
and other critical software up to date.
ORGANIZATIONAL SECURITY
• Cloud Backup & Pay for Premium Cloud
Security
• Call in an IT Security Consultant when needed
• Don’t let employees download any software
without permission
• Never share official files in social media
• Use portable drives with care
• Use business level antivirus software
NATIONAL CYBER SECURITY
• Constructing & applying proper laws for cyber
crime
• Confidential files should be shared with high
care
• Protect national bandwidth from being abused
• Taking proper steps to prevent hackers &
piracy
• Giving high priority on the development of IT
sector
THANKS EVERYONE…
IF YOU HAVE ANY QUERY, PLEASE FEEL FREE TO
ASK.

Cyber Crime and Cyber Security

  • 1.
    CYBER SECURITY PRESENTING BY: KAZISAZED SALMAN ID: 2015210001045 MUSTARY UMMA ASHA ID: 2015210001029
  • 2.
    WHAT IS CYBERSECURITY Cyber security is the protection of computer & network systems for preventing - • Theft • Damage to the hardware & software • Misdirection of the information
  • 3.
    WHY CYBER SECURITYIS IMPORTANT • To ensure data protection • Restrict unauthorized users • Prevent losing data • Ensuring privacy & confidentiality • To keep safe from the cyber crime
  • 4.
    WHAT IS CYBERCRIME • Crime committed using a computer and the internet to steal data or information. • Illegal imports. • Malicious programs.
  • 5.
    A FEW REMARKABLEHISTORIES 1971 – John Draper builds a ‘blue box’ that reproduces a 26kHz tone, which allows to make free calls. 1981 – Ian Murphy, becomes first convict of a computer crime, broke into a super shop’s computers and changed the billing clock so that people receive discounted rates during normal business hours. 1986 – “Brain” the first standard computer virus released. 1988 – National Bank of Chicago, first victim
  • 6.
    1991 – KevinPoulsen was captured for selling military secrets 1994 – A 16 year old UK student, got arrested for accessing computers at the Korean Atomic Research Institute, NASA and several US govt. agencies. 1996 – Russian cracker attempts to extort $100K from thousands of customers' credit card numbers 2007 – First cyber warfare in Estonia 2010 – WikiLeaks released Iraq War documents and Afghan War documents A FEW REMARKABLE HISTORIES (CONT.)
  • 7.
  • 8.
    RECENT ATTACK IN BANGLADESH •In February 2016, US$951 million had been illegally transferred from Bangladesh Bank. • Issued via the SWIFT network. • Withdrawn from a Bangladesh Bank account at the Federal Reserve Bank of New York. • $20 million traced in Sri Lanka (since recovered) and $81 million in the Philippines (about $18 million recovered). • The Federal Reserve Bank of NY blocked the remaining thirty transactions, amounting to $850 million, at the request of Bangladesh
  • 9.
    TYPES OF CYBERCRIME A.Hacking B.Theft / Piracy C.Cyber stalking (spying) D.Identity theft E. Malicious program F. Child soliciting & abuse
  • 10.
    HACKING • A person’scomputer is broken into so that his personal or sensitive information can be accessed. • A hacker uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a
  • 11.
    THEFT / PIRACY •Copyright infringement (piracy) occurs when a person violates copyrights and downloads music, movies, games and software. • The owner of the copyright gets no monetary value of his work from the pirated
  • 12.
    CYBER STALKING • Thisis a kind of online harassment wherein the victim is subjected to a barrage of online messages, emails & pictures by the stalker. • Typically, these stalkers know their victims and they use the internet to stalk & spy.
  • 13.
    IDENTITY THEFT • Acriminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to withdraw money or to buy things online in the victim’s name. • It can result in major
  • 14.
    MALICIOUS SOFTWARE • Thesoftware is used to gain access to a system to steal information or data or causing damage to other software or data present in the system • These can be Internet- based software or programs that are used to disrupt a network
  • 15.
    TYPES OF CYBERATTACK Financial fraud: 11% Sabotage of data/networks: 17% Theft of proprietary information: 20% System penetration from the outside: 25% Denial of service: 27% Unauthorized access by insiders: 71%
  • 16.
  • 17.
    PERSONAL SECURITY • Neverclick on unknown links in emails. • Do not give out personal information. • Use recommended antivirus. • Do not run non-familiar application. • Keep information private in the social media. • Keep operating system, browser, anti-virus and other critical software up to date.
  • 18.
    ORGANIZATIONAL SECURITY • CloudBackup & Pay for Premium Cloud Security • Call in an IT Security Consultant when needed • Don’t let employees download any software without permission • Never share official files in social media • Use portable drives with care • Use business level antivirus software
  • 19.
    NATIONAL CYBER SECURITY •Constructing & applying proper laws for cyber crime • Confidential files should be shared with high care • Protect national bandwidth from being abused • Taking proper steps to prevent hackers & piracy • Giving high priority on the development of IT sector
  • 20.
    THANKS EVERYONE… IF YOUHAVE ANY QUERY, PLEASE FEEL FREE TO ASK.