Shuaib Ibrahim Adam
ME. Telecommunication Engineering
Nanjing University of Posts & Telecommunications
Out Line
• Introduction
• Definition
• History
• Categories of Cyber crime
• Types of Cyber Crime
• Reason for Cyber crime
• Security of Cyber
• Advantages of Cyber Security
• Prevention tips for cyber security
• Conclusion
TO Understand
What is the
CYBER
CRIMES
Why we need cyber
security
What are the security
problems in Cyber
field
How to implement
and maintain
Security of a
Cyber field around
us.
introduction
The internet is growing rapidly. It has given rise to new
opportunities in every field we can think of be it
entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own
disadvantages is Cyber crime- illegal activity committed on
the internet.
Cyber crime is an activity done using computers and
internet. We can say that it is an unlawful acts wherein the
computer either a tool or target or both.
definition of cyber crime
• Cybercrime is nothing but where the computer used as an
object or subject of crime!
• Crime committed using a computer and the internet to steal
a person’s identity!!
• Illegal imports
• Malicious programs
History of cyber crime
• The first recorded cyber crime took place in 1920.
• India, Japan and China, the era of modern computer,
however, began with the analytical engine of Charles
Babbage.
• The first spam email took place in 1976 when it was sent
out over the ARPANT.
• The first virus was installed on an Apple computer in 1982
when a high school student, Rich skrenta, developed the
EIK Cloner.
Categorization of cyber crime
 The Computer as a Target:-using a computer to attack
other computers. E.g. Hacking, Virus/Worm attacks, DOS
attack etc.
The computer as a weapon:-using a computer to commit
real world crimes. E.g. Cyber Terrorism, IPR violations,
Credit card frauds, EFT frauds, Pornography etc. Cyber
Crime regulated by Cyber Laws or Internet Laws.
types of cyber crime
 The Hacking
 Denial of service attack
 Virus Dissemination
 Computer Vandalism
 Cyber Terrorism
 Software Piracy
types of cyber crime
Web
Jacking
Reason for cyber crime
1. Easy to Access: - The problem encountered in guarding a computer
system from unauthorized access is that there is every possibility of
breach not due to human error but due to the complex technology.
2. Complex: - The computers work on operating systems and these
operating systems in turn are composed of millions of codes. Human
mind is fallible and it is not possible that there might not be a lapse at
any stage.
3. Negligence: - Negligence is very closely connected with human
conduct. It is therefore very probable that while protecting the
computer system there might be any negligence, which in turn
provides a cyber-criminal to gain access and control over the computer
system.
4. Loss of Evidence: - Loss of evidence is a very common & obvious
problem as all the data are routinely destroyed.
security
What is cyber security
Cyber security is a branch of computer security
specifically related to the internet.
It’s objectives is to establish rules and measure to use
against attacks over the internet.
Advantages of Cyber security
The cyber security will defend us from critical attacks.
 It helps us to browse the site, website.
Internet Security process all the incoming and outgoing
data on your computer.
It will defend us from hacks and virus.
Application of cyber security used in our PC needs update
every week
Cybercrime prevention
• Cybercrime prevention can be straight-forward - when
armed with a little technical advice and common sense,
many attacks can be avoided.
• In general, online criminals are trying to make their money
as quickly and easily as possible. The more difficult you
make their job, the more likely they are to leave you alone
and move on to an easier target.
Safety tips for cyber crime
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a genderless screen name.
• Never give your full name or address to strangers.
• Learn more about Internet privacy.
• Make Sure your Computer is configured securely
• Choose Strong Passwords and Keep them Safe.
Conclusion
 The Computer Security is a continuous battle
◦ As computer security gets tighter hackers are
getting smarter!!!
◦ Computer and information security continue to
grow in importance
◦ Nobody ever said this was going to be easy!
◦ Neglecting security is the worst thing you can
do!!
Cyber security is everyone’s responsibility
Cyber crime and security
Cyber crime and security

Cyber crime and security

  • 1.
    Shuaib Ibrahim Adam ME.Telecommunication Engineering Nanjing University of Posts & Telecommunications
  • 2.
    Out Line • Introduction •Definition • History • Categories of Cyber crime • Types of Cyber Crime • Reason for Cyber crime • Security of Cyber • Advantages of Cyber Security • Prevention tips for cyber security • Conclusion
  • 3.
    TO Understand What isthe CYBER CRIMES Why we need cyber security What are the security problems in Cyber field How to implement and maintain Security of a Cyber field around us.
  • 4.
    introduction The internet isgrowing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet. Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 5.
    definition of cybercrime • Cybercrime is nothing but where the computer used as an object or subject of crime! • Crime committed using a computer and the internet to steal a person’s identity!! • Illegal imports • Malicious programs
  • 6.
    History of cybercrime • The first recorded cyber crime took place in 1920. • India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. • The first spam email took place in 1976 when it was sent out over the ARPANT. • The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 7.
    Categorization of cybercrime  The Computer as a Target:-using a computer to attack other computers. E.g. Hacking, Virus/Worm attacks, DOS attack etc. The computer as a weapon:-using a computer to commit real world crimes. E.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc. Cyber Crime regulated by Cyber Laws or Internet Laws.
  • 8.
    types of cybercrime  The Hacking  Denial of service attack  Virus Dissemination  Computer Vandalism  Cyber Terrorism  Software Piracy
  • 9.
    types of cybercrime Web Jacking
  • 10.
    Reason for cybercrime 1. Easy to Access: - The problem encountered in guarding a computer system from unauthorized access is that there is every possibility of breach not due to human error but due to the complex technology. 2. Complex: - The computers work on operating systems and these operating systems in turn are composed of millions of codes. Human mind is fallible and it is not possible that there might not be a lapse at any stage. 3. Negligence: - Negligence is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber-criminal to gain access and control over the computer system. 4. Loss of Evidence: - Loss of evidence is a very common & obvious problem as all the data are routinely destroyed.
  • 11.
  • 12.
    What is cybersecurity Cyber security is a branch of computer security specifically related to the internet. It’s objectives is to establish rules and measure to use against attacks over the internet.
  • 13.
    Advantages of Cybersecurity The cyber security will defend us from critical attacks.  It helps us to browse the site, website. Internet Security process all the incoming and outgoing data on your computer. It will defend us from hacks and virus. Application of cyber security used in our PC needs update every week
  • 14.
    Cybercrime prevention • Cybercrimeprevention can be straight-forward - when armed with a little technical advice and common sense, many attacks can be avoided. • In general, online criminals are trying to make their money as quickly and easily as possible. The more difficult you make their job, the more likely they are to leave you alone and move on to an easier target.
  • 15.
    Safety tips forcyber crime • Use antivirus software’s. • Insert firewalls. • Uninstall unnecessary software • Maintain backup. • Check security settings. • Stay anonymous - choose a genderless screen name. • Never give your full name or address to strangers. • Learn more about Internet privacy. • Make Sure your Computer is configured securely • Choose Strong Passwords and Keep them Safe.
  • 16.
    Conclusion  The ComputerSecurity is a continuous battle ◦ As computer security gets tighter hackers are getting smarter!!! ◦ Computer and information security continue to grow in importance ◦ Nobody ever said this was going to be easy! ◦ Neglecting security is the worst thing you can do!!
  • 17.
    Cyber security iseveryone’s responsibility