SlideShare a Scribd company logo
1
Course Objective
• To make student know, the essentials of
computer security, also to provide the basic
knowledge of security issues.
• To make students know, different type of security
algorithm, which includes a set of protocol and its
implementation.
• To make students know, the authorization and
authentication in security system.
• To make students know, the general principles of
IP based web security standards.
2
Course Outcomes
• The students will be able to understand the structure
and organization of computer security and cyber
crimes.
• The students will have basic understanding of security
techniques and function.
• The students will have in depth understanding of
network security algorithm.
• The students will be able to understand the basic
concepts of security threats.
• The students will be able to understand the basic
concepts of firewalls; including authentication,
integrity, and system security design challenges.
3
Table of Contents
S. No Topic Slide No.
1 Survey in Cyber Crime 6
2 Cyber Crime 7
3 Hackers 8
4 Principles of Security 9 – 14
5 Types of Attack 15 – 18
6 Computer Viruses 19
7 Phishing 20
8 Spoofing 21
9 Phone Phishing 22
4
Table of Contents
No Topic Slide No.
10 Internet Pharming 23
11 Investment Newsletter 24
12 Credit Card Fraud 25
13 IT Act. 2000 26 – 27
14 Security Tips 28 – 29
15 Text and Reference Book 30
5
Survey in Cyber Crime
• As per the study, during 2011, 2012, 2013 and
2014 years, a total number of cyber crimes
registered were 13,301, 22,060 71,780 and
62,189.
• Currently, the cyber crimes in India is nearly
around 1,49,254 and may likely to cross the
3,00,000 by 2016 growing at compounded annual
growth rate (CAGR) of about 107 per cent.
• As per the findings, every month nearly 12,456
cases registered in India.
6
Cyber Crime
Cyber Crime could be any unlawful act where
computer was used as a tool or target or both.
Cyber terrorists usually use the computer as a
tool, target, or both for their unlawful act
either to gain information which can result in
heavy loss/damage to the owner of that
intangible sensitive information.
7
Hackers
Hacker is computer expert who uses his
knowledge to gain unauthorized access to the
computer network. He’s not any person who
intends to break through the system but also
includes one who has no intent to damage the
system but intends to learn more by using
one’s computer.
8
Principles of Security
• Confiedentiality
Sender A sends a secret message to receiver B.
Interception cause loss of message confidentiality.
9
Principles of Security
• Authentication
The authentication process ensures that the origin of a
electronic message or document is correctly identified.
“Proof of identity”.
Fabrication is possible in absence of proper
authentication.
10
• Integrity
When the contents of a message are changed after the
sender sends it, but before it reaches the intended
recipients, the integrity of the message is lost.
Modification causes loss of message integrity.
11
Principles of Security
• Non-repudiation
Non-repudiation does not allow the sender of a message
to refuge the claim of not sending that message.
12
Principles of Security
• Availibility
The principle of availability states that resources should
be available to authorized parties at all times.
Interruption puts the availability of resource in danger.
13
Principles of Security
Principles of Security
• Access Control
The principle of access control determines “who”
should be able to access “what”.
Access control specifies and control who can
access what.
14
Types of Attack
• Fraud
• Scams
• Destruction
• Identity Theft
• Intellectual Theft
• Brand Theft
15
Types of Attack
• Fraud
It includes manipulation of electronic currency,
credit cards, electronic stock certificates, checks
letters of credit, purchase order, ATM, etc.
• Scams
Various forms of scams includes sale of service,
auction, multi-level marketing scheme, general
merchandise and business opportunities, etc.
People are enticed to send money in return to
great profit.
16
Types of Attack
• Destruction
Grudge is the main motive of such kind of attack. Unhappy
employee attack their own organization, Terrorists strike, etc.
Yahoo!, CNN, eBay, Buy.com, amazon.com where authorised
users of these sites failed to log in or access these sites.
• Identity Theft
“Why steal from someone when you can just become
that person?”
It is easier to manage to get the password of someone else’s
bank account until it gets detected.
17
Types of Attack
• Intellectual Property Theft
It ranges from stealing companies’ trade secrets,
databases, digital music and videos, electronic
documents, and books software and so on.
• Brand theft
Fake Web sites that look like real Web sites.
Causing an identity theft.
18
A) Computer Viruses
Viruses are used by Hackers to infect the user’s
computer and damage data saved on the computer.
Person would be liable under I.T Act only when the
consent of the owner is not taken before inserting
virus in his system.
19
Methods of Attacks
B) Phishing
By using e-mail messages which completely
resembles the original mail messages of
customers, hackers can ask for verification of
certain information, like account numbers or
passwords etc. here customer might not have
knowledge that the e-mail messages are
deceiving and would fail to identify the originality
of the messages, this results in huge financial loss
when the hackers use that information for
fraudulent acts like withdrawing money from
customers account without him having
knowledge of it.
20
C) Spoofing
This is carried on by use of deceiving Websites
or e-mails. These sources mimic the original
websites so well by use of logos, names,
graphics and even the code of real bank’s site.
21
D) Phone Phishing
Is done by use of in-voice messages by the
hackers where the customers are asked to
reveal their account identification, and
passwords to file a complaint for any problems
regarding their accounts with banks etc.
22
E) Internet Pharming
Hacker here aims at redirecting
the website used by the
customer to another bogus
website by hijacking the victim’s
DNS server (they are computers
responsible for resolving internet
names into real addresses -
“signposts of internet), and
changing his I.P address to fake
website by manipulating DNS
server. This redirects user’s
original website to a false
misleading website to gain
unauthorised information.
23
(F) Investment Newsletter
We usually get newsletter providing us free
information recommending that investment in
which field would be profitable. These may
sometimes be a fraud and may cause us huge
loss if relied upon. False information can be
spread by this method about any company
and can cause huge inconvenience or loss
through junk mails online.
24
(H) Credit Card Fraud
Huge loss may cause to the victim due to this
kind of fraud. This is done by publishing false
digital signatures. Most of the people lose
credit cards on the way of delivery to the
recipient or its damaged or defective,
misrepresented etc.
25
Information Technology Act, 2000.
26
Noteworthy Provisions Under The
Information Technology Act, 2000.
No Act Punishment
1 Sec.43 Damage to Computer system etc. Compensation for Rupees 1crore.
2 Sec.66 Hacking (with intent or knowledge) Fine of 2 lakh rupees, and
imprisonment for 3 years.
3 Sec.67 Publication of obscene material in e-form Fine of 1 lakh rupees, and
imprisonment of 5 years, and double
conviction on second offence
4 Sec.68 Not complying with directions of
controller
Fine upto 2 lakh and imprisonment of
3 years.
5 Sec.70 attempting or securing access to
computer
Imprisonment upto 10 years.
6 Sec.72 For breaking confidentiality of the
information of computer
Fine upto 1 lakh and imprisonment
upto 2 years
7 Sec.73 Publishing false digital signatures, false in
certain particulars
Fine of 1 lakh, or imprisonment of 2
years or both.
8 Sec.74 Publication of Digital Signatures for
fraudulent purpose
Imprisonment for the term of 2 years
and fine for 1 lakh rupees. 27
Security Tips
• Avoid online banking, shopping, entering credit card details,
etc. if the network is not properly secured
• Check your online account frequently and make sure all listed
transactions are valid
• Be extremely wary of e-mails asking for confidential
information. Never ever click on a link given in a spam e-mail
• Always delete spam e-mails immediately and empty the trash
box to prevent clicking on the same link accidentally
• Beware of lotteries that charge a fee prior to delivery of your
prize
• While using a credit card for making payments online, check if
the website is secure as the CVV will also be required for the
payment
28
• Notify your bank/credit card issuer if you do not receive the
monthly credit card statement on time. If a credit card is
misplaced or lost, get it cancelled immediately
• Do not respond to lottery messages or call on the numbers
provided in the text messages
• Do not provide photocopies of both sides of the credit card to
anyone. The card verification value (CVV), which is required
for online transactions, is printed on the reverse. Anyone can
use the card for online purchases if they get that information
• Do not click on links in e-mails seeking details of your account,
they could be phishing e-mails from fraudsters. Most reputed
companies will ask you to visit their website directly
• Do not give any information to people seeking credit card
details over the phone
Security Tips
29
• Text Book:
1. Cryptography abd Network Security, William
Stalling, PHI
2. Cryptography abd Network Security, Atul Kahate,
Tata McGraw Hill, 2003.
3. Cyber Security Policy Guidebook, Jinnifer, Jason,
Paul Marcus, Jeffery, Joseph, Willey publication,
2012
• Reference Books:
1. Network Security: The complete Reference, Robertra
Bragg, Tata McGraw Hill.
2. Cyber Security Essentials, James Graham, Richard, Ryan,
CRC press, 2011.
30
31

More Related Content

What's hot

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Eng. Shuaib ibrahim
 
Cyber security
Cyber securityCyber security
Cyber security
abithajayavel
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
Ashesh R
 
advantages and disadvantages of internet
advantages and disadvantages of internetadvantages and disadvantages of internet
advantages and disadvantages of internet
Ali Şahin
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
Coder Tech
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
Nitesh Dubey
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
Shishupal Nagar
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
Chandan Jha
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
chrispaul8676
 
مشروع الامن السيبراني
مشروع الامن السيبرانيمشروع الامن السيبراني
مشروع الامن السيبراني
meshalalmrwani
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
Will Adams
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
WonderingAriana
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
VaishnaviPalkar
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
EILLEN IVY PORTUGUEZ
 

What's hot (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
advantages and disadvantages of internet
advantages and disadvantages of internetadvantages and disadvantages of internet
advantages and disadvantages of internet
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
مشروع الامن السيبراني
مشروع الامن السيبرانيمشروع الامن السيبراني
مشروع الامن السيبراني
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Network security
Network securityNetwork security
Network security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Network security
Network security Network security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 

Viewers also liked

Mi presentación
Mi presentaciónMi presentación
Mi presentación
Sary Sanz
 
[QPT] 9 سورة الشعراء 78-82
[QPT] 9  سورة الشعراء 78-82[QPT] 9  سورة الشعراء 78-82
[QPT] 9 سورة الشعراء 78-82
TimAisyah
 
Transporte 1°h (1)
Transporte 1°h (1)Transporte 1°h (1)
Transporte 1°h (1)
SamanthaRamos7
 
Framework for Karlovy Vary Film Festival
Framework for Karlovy Vary Film FestivalFramework for Karlovy Vary Film Festival
Framework for Karlovy Vary Film Festival
markreid1895
 
001 cuadernillo-lógico-matemática
001 cuadernillo-lógico-matemática001 cuadernillo-lógico-matemática
001 cuadernillo-lógico-matemática
adriana delgado
 
сведения о задолженности по ущербу
сведения о задолженности по ущербусведения о задолженности по ущербу
сведения о задолженности по ущербуvirtualtaganrog
 
sample worksheet
sample worksheetsample worksheet
sample worksheet
chrisyu727
 
GRUPO - 8
GRUPO  - 8GRUPO  - 8
GRUPO - 8
aimeleon6
 
How to decline a noun
How to decline a nounHow to decline a noun
How to decline a noun
Robyn Pratt
 
Computer_Networking_and_Data_Communications_Day2_AM
Computer_Networking_and_Data_Communications_Day2_AMComputer_Networking_and_Data_Communications_Day2_AM
Computer_Networking_and_Data_Communications_Day2_AM
Elias Choka
 
Professional Profile - Robyn Varley 2016 Feb v1 0
Professional Profile - Robyn Varley 2016 Feb v1 0Professional Profile - Robyn Varley 2016 Feb v1 0
Professional Profile - Robyn Varley 2016 Feb v1 0
Robyn Varley
 
Fp me reporte 1 aplicación.lucy suarez
Fp me reporte 1 aplicación.lucy suarezFp me reporte 1 aplicación.lucy suarez
Fp me reporte 1 aplicación.lucy suarez
Lucy Suarez R
 
Media literacy 9.12.14 V Tokarski
Media literacy 9.12.14 V TokarskiMedia literacy 9.12.14 V Tokarski
Media literacy 9.12.14 V Tokarski
mrbleazard
 
CCAJ Paris climate training session 02
CCAJ Paris climate training session 02CCAJ Paris climate training session 02
CCAJ Paris climate training session 02
markreid1895
 
Worksheet 7th
Worksheet 7thWorksheet 7th
Worksheet 7th
Marlin Sanchez
 
Implementation and evaluation of Space Time Alarm Clock
Implementation and evaluation of Space Time Alarm ClockImplementation and evaluation of Space Time Alarm Clock
Implementation and evaluation of Space Time Alarm Clock
Adrian C. Prelipcean
 

Viewers also liked (20)

Mi presentación
Mi presentaciónMi presentación
Mi presentación
 
Video2
Video2Video2
Video2
 
[QPT] 9 سورة الشعراء 78-82
[QPT] 9  سورة الشعراء 78-82[QPT] 9  سورة الشعراء 78-82
[QPT] 9 سورة الشعراء 78-82
 
Transporte 1°h (1)
Transporte 1°h (1)Transporte 1°h (1)
Transporte 1°h (1)
 
Framework for Karlovy Vary Film Festival
Framework for Karlovy Vary Film FestivalFramework for Karlovy Vary Film Festival
Framework for Karlovy Vary Film Festival
 
certificate_of_completion
certificate_of_completioncertificate_of_completion
certificate_of_completion
 
001 cuadernillo-lógico-matemática
001 cuadernillo-lógico-matemática001 cuadernillo-lógico-matemática
001 cuadernillo-lógico-matemática
 
сведения о задолженности по ущербу
сведения о задолженности по ущербусведения о задолженности по ущербу
сведения о задолженности по ущербу
 
sample worksheet
sample worksheetsample worksheet
sample worksheet
 
Katalog13
Katalog13Katalog13
Katalog13
 
GRUPO - 8
GRUPO  - 8GRUPO  - 8
GRUPO - 8
 
file share susu
file share susufile share susu
file share susu
 
How to decline a noun
How to decline a nounHow to decline a noun
How to decline a noun
 
Computer_Networking_and_Data_Communications_Day2_AM
Computer_Networking_and_Data_Communications_Day2_AMComputer_Networking_and_Data_Communications_Day2_AM
Computer_Networking_and_Data_Communications_Day2_AM
 
Professional Profile - Robyn Varley 2016 Feb v1 0
Professional Profile - Robyn Varley 2016 Feb v1 0Professional Profile - Robyn Varley 2016 Feb v1 0
Professional Profile - Robyn Varley 2016 Feb v1 0
 
Fp me reporte 1 aplicación.lucy suarez
Fp me reporte 1 aplicación.lucy suarezFp me reporte 1 aplicación.lucy suarez
Fp me reporte 1 aplicación.lucy suarez
 
Media literacy 9.12.14 V Tokarski
Media literacy 9.12.14 V TokarskiMedia literacy 9.12.14 V Tokarski
Media literacy 9.12.14 V Tokarski
 
CCAJ Paris climate training session 02
CCAJ Paris climate training session 02CCAJ Paris climate training session 02
CCAJ Paris climate training session 02
 
Worksheet 7th
Worksheet 7thWorksheet 7th
Worksheet 7th
 
Implementation and evaluation of Space Time Alarm Clock
Implementation and evaluation of Space Time Alarm ClockImplementation and evaluation of Space Time Alarm Clock
Implementation and evaluation of Space Time Alarm Clock
 

Similar to Cyber Security

Cyber.ppt
Cyber.pptCyber.ppt
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
ssuser8b4eb21
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
Clichesin
 
security threats.pptx
security threats.pptxsecurity threats.pptx
security threats.pptx
Surajsingh809614
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
Sanil Shrivastava
 
IB Fraud
IB FraudIB Fraud
Introduction to Computer Forensics & Cyber Security
Introduction to Computer Forensics & Cyber SecurityIntroduction to Computer Forensics & Cyber Security
Introduction to Computer Forensics & Cyber Security
pivisoc989
 
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdfday-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
swatigairola2017
 
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdfday-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
swatigairola2017
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
Deepak Kumar
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
santhuana sg
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Varshil Patel
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
Diane M. Metcalf
 
Data security
Data securityData security
Data security
Hitesh Kumar
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
Aalbert Albert
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
OmprakashRaut
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
Yogesh Lolge
 

Similar to Cyber Security (20)

Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
security threats.pptx
security threats.pptxsecurity threats.pptx
security threats.pptx
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Introduction to Computer Forensics & Cyber Security
Introduction to Computer Forensics & Cyber SecurityIntroduction to Computer Forensics & Cyber Security
Introduction to Computer Forensics & Cyber Security
 
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdfday-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
 
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdfday-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
Data security
Data securityData security
Data security
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 

Cyber Security

  • 1. 1
  • 2. Course Objective • To make student know, the essentials of computer security, also to provide the basic knowledge of security issues. • To make students know, different type of security algorithm, which includes a set of protocol and its implementation. • To make students know, the authorization and authentication in security system. • To make students know, the general principles of IP based web security standards. 2
  • 3. Course Outcomes • The students will be able to understand the structure and organization of computer security and cyber crimes. • The students will have basic understanding of security techniques and function. • The students will have in depth understanding of network security algorithm. • The students will be able to understand the basic concepts of security threats. • The students will be able to understand the basic concepts of firewalls; including authentication, integrity, and system security design challenges. 3
  • 4. Table of Contents S. No Topic Slide No. 1 Survey in Cyber Crime 6 2 Cyber Crime 7 3 Hackers 8 4 Principles of Security 9 – 14 5 Types of Attack 15 – 18 6 Computer Viruses 19 7 Phishing 20 8 Spoofing 21 9 Phone Phishing 22 4
  • 5. Table of Contents No Topic Slide No. 10 Internet Pharming 23 11 Investment Newsletter 24 12 Credit Card Fraud 25 13 IT Act. 2000 26 – 27 14 Security Tips 28 – 29 15 Text and Reference Book 30 5
  • 6. Survey in Cyber Crime • As per the study, during 2011, 2012, 2013 and 2014 years, a total number of cyber crimes registered were 13,301, 22,060 71,780 and 62,189. • Currently, the cyber crimes in India is nearly around 1,49,254 and may likely to cross the 3,00,000 by 2016 growing at compounded annual growth rate (CAGR) of about 107 per cent. • As per the findings, every month nearly 12,456 cases registered in India. 6
  • 7. Cyber Crime Cyber Crime could be any unlawful act where computer was used as a tool or target or both. Cyber terrorists usually use the computer as a tool, target, or both for their unlawful act either to gain information which can result in heavy loss/damage to the owner of that intangible sensitive information. 7
  • 8. Hackers Hacker is computer expert who uses his knowledge to gain unauthorized access to the computer network. He’s not any person who intends to break through the system but also includes one who has no intent to damage the system but intends to learn more by using one’s computer. 8
  • 9. Principles of Security • Confiedentiality Sender A sends a secret message to receiver B. Interception cause loss of message confidentiality. 9
  • 10. Principles of Security • Authentication The authentication process ensures that the origin of a electronic message or document is correctly identified. “Proof of identity”. Fabrication is possible in absence of proper authentication. 10
  • 11. • Integrity When the contents of a message are changed after the sender sends it, but before it reaches the intended recipients, the integrity of the message is lost. Modification causes loss of message integrity. 11 Principles of Security
  • 12. • Non-repudiation Non-repudiation does not allow the sender of a message to refuge the claim of not sending that message. 12 Principles of Security
  • 13. • Availibility The principle of availability states that resources should be available to authorized parties at all times. Interruption puts the availability of resource in danger. 13 Principles of Security
  • 14. Principles of Security • Access Control The principle of access control determines “who” should be able to access “what”. Access control specifies and control who can access what. 14
  • 15. Types of Attack • Fraud • Scams • Destruction • Identity Theft • Intellectual Theft • Brand Theft 15
  • 16. Types of Attack • Fraud It includes manipulation of electronic currency, credit cards, electronic stock certificates, checks letters of credit, purchase order, ATM, etc. • Scams Various forms of scams includes sale of service, auction, multi-level marketing scheme, general merchandise and business opportunities, etc. People are enticed to send money in return to great profit. 16
  • 17. Types of Attack • Destruction Grudge is the main motive of such kind of attack. Unhappy employee attack their own organization, Terrorists strike, etc. Yahoo!, CNN, eBay, Buy.com, amazon.com where authorised users of these sites failed to log in or access these sites. • Identity Theft “Why steal from someone when you can just become that person?” It is easier to manage to get the password of someone else’s bank account until it gets detected. 17
  • 18. Types of Attack • Intellectual Property Theft It ranges from stealing companies’ trade secrets, databases, digital music and videos, electronic documents, and books software and so on. • Brand theft Fake Web sites that look like real Web sites. Causing an identity theft. 18
  • 19. A) Computer Viruses Viruses are used by Hackers to infect the user’s computer and damage data saved on the computer. Person would be liable under I.T Act only when the consent of the owner is not taken before inserting virus in his system. 19 Methods of Attacks
  • 20. B) Phishing By using e-mail messages which completely resembles the original mail messages of customers, hackers can ask for verification of certain information, like account numbers or passwords etc. here customer might not have knowledge that the e-mail messages are deceiving and would fail to identify the originality of the messages, this results in huge financial loss when the hackers use that information for fraudulent acts like withdrawing money from customers account without him having knowledge of it. 20
  • 21. C) Spoofing This is carried on by use of deceiving Websites or e-mails. These sources mimic the original websites so well by use of logos, names, graphics and even the code of real bank’s site. 21
  • 22. D) Phone Phishing Is done by use of in-voice messages by the hackers where the customers are asked to reveal their account identification, and passwords to file a complaint for any problems regarding their accounts with banks etc. 22
  • 23. E) Internet Pharming Hacker here aims at redirecting the website used by the customer to another bogus website by hijacking the victim’s DNS server (they are computers responsible for resolving internet names into real addresses - “signposts of internet), and changing his I.P address to fake website by manipulating DNS server. This redirects user’s original website to a false misleading website to gain unauthorised information. 23
  • 24. (F) Investment Newsletter We usually get newsletter providing us free information recommending that investment in which field would be profitable. These may sometimes be a fraud and may cause us huge loss if relied upon. False information can be spread by this method about any company and can cause huge inconvenience or loss through junk mails online. 24
  • 25. (H) Credit Card Fraud Huge loss may cause to the victim due to this kind of fraud. This is done by publishing false digital signatures. Most of the people lose credit cards on the way of delivery to the recipient or its damaged or defective, misrepresented etc. 25
  • 27. Noteworthy Provisions Under The Information Technology Act, 2000. No Act Punishment 1 Sec.43 Damage to Computer system etc. Compensation for Rupees 1crore. 2 Sec.66 Hacking (with intent or knowledge) Fine of 2 lakh rupees, and imprisonment for 3 years. 3 Sec.67 Publication of obscene material in e-form Fine of 1 lakh rupees, and imprisonment of 5 years, and double conviction on second offence 4 Sec.68 Not complying with directions of controller Fine upto 2 lakh and imprisonment of 3 years. 5 Sec.70 attempting or securing access to computer Imprisonment upto 10 years. 6 Sec.72 For breaking confidentiality of the information of computer Fine upto 1 lakh and imprisonment upto 2 years 7 Sec.73 Publishing false digital signatures, false in certain particulars Fine of 1 lakh, or imprisonment of 2 years or both. 8 Sec.74 Publication of Digital Signatures for fraudulent purpose Imprisonment for the term of 2 years and fine for 1 lakh rupees. 27
  • 28. Security Tips • Avoid online banking, shopping, entering credit card details, etc. if the network is not properly secured • Check your online account frequently and make sure all listed transactions are valid • Be extremely wary of e-mails asking for confidential information. Never ever click on a link given in a spam e-mail • Always delete spam e-mails immediately and empty the trash box to prevent clicking on the same link accidentally • Beware of lotteries that charge a fee prior to delivery of your prize • While using a credit card for making payments online, check if the website is secure as the CVV will also be required for the payment 28
  • 29. • Notify your bank/credit card issuer if you do not receive the monthly credit card statement on time. If a credit card is misplaced or lost, get it cancelled immediately • Do not respond to lottery messages or call on the numbers provided in the text messages • Do not provide photocopies of both sides of the credit card to anyone. The card verification value (CVV), which is required for online transactions, is printed on the reverse. Anyone can use the card for online purchases if they get that information • Do not click on links in e-mails seeking details of your account, they could be phishing e-mails from fraudsters. Most reputed companies will ask you to visit their website directly • Do not give any information to people seeking credit card details over the phone Security Tips 29
  • 30. • Text Book: 1. Cryptography abd Network Security, William Stalling, PHI 2. Cryptography abd Network Security, Atul Kahate, Tata McGraw Hill, 2003. 3. Cyber Security Policy Guidebook, Jinnifer, Jason, Paul Marcus, Jeffery, Joseph, Willey publication, 2012 • Reference Books: 1. Network Security: The complete Reference, Robertra Bragg, Tata McGraw Hill. 2. Cyber Security Essentials, James Graham, Richard, Ryan, CRC press, 2011. 30
  • 31. 31