Cybercrime and Security
Team Members
Maliha Rahman (2014-3-50-007)
Noushad Hasan Jabin (2014-3-50-
025)
Sauradip Roy (2014-3-50-008)
Topics will be covered
 Introduction
 History of cybercrime
 Authenticity,Security,Privacy
 Database security
 Social Engineering & protection
 Database security
 Different cyber attacking methods
 Security tips
 What we covered
 References
Introduction
ā—‡Cyber crime is Harmful or unlawful
acts wherein the computer is either a
tool or target or both.
ā—‡Online or Internet-based illegal acts.
History of Cyber Crime
 The first recorded cyber crime took place
in the year 1820.
 The first spam email took place in 1978
when it was sent over the Arpanet.
 The first VIRUS was installed on an
Apple computer in 1982.
Authenticity, Security,
Privacy
Authenticity is assurance that a message, transaction,
or other exchange of information is from the source it
claims to be from. Authenticity involves proof of
identity.
Different Authentications:
1. Digital certificates
2. USB token
3. Password based Authentication
4. Biometric authentications (Fingerprints, Retina
Scans)
Security
Security simply refers to the term
Cyber security.
Cybersecurity is the technologies &
processes which protects networks,
computers, programs and data
from attack, damage or
unauthorized access.
Place your screenshot here
Privacy
ā—‡Privacy is your right to control
what happens with personal
information about you.
ā—‡Using Internet may affects
someones personal data &
Identity.
Social Engineering
ā—‡Social engineering is the art of manipulating
people so they give up confidential information
such as password and the control over their
computers.
ā—‡Protections:
ā—First & foremost is user consciousness
ā—Avoid installing third party softwares
ā—System firewall is turned on
ā—2 step authentication for log into account
ā—Code generator
ā—Trusted Contacts
Database
Security
DATABASE SECURITY
FEATURES
ļæ­Digital Certificate is a unique identifier given to an entity
to provide authentication of a computer, document, or
webpage.
ļæ­Encryptions alter the data so unauthorized users cannot
view data information.
ļæ­Firewalls protect a network from unauthorized access
from the internet.
ļæ­Proxy Servers shield the requests between the client
computers inside a private network and the internet.
ļæ­Security Socket Layer connects and transmits encrypted
data.
ļæ­S-HTTP (secure hypertext transport protocol) transmits
web pages securely.
RESPONSIBLITIES OF THE
DATABASE ADMINISTRATOR
ā—‡Always keep in mind that whenever a system has
internet and network connections attached to a DBMS,
security breaches may occur.
ā—‡Perform routine backup recovery procedures incase
of electrical outage and intruder attacks that can
damage the DBMS.
Built in Database Protection
ā—‡They create built in solutions such
as:
ļæ­Password Controls
ļæ­Data access based on roles and profiles
ļæ­IP restrictions for off site access
ļæ­Auditing capabilities of who has run what reports
ļæ­Security logging
Different Cyber Attacking
Methods
Cyber attacks
ā—‡Trojan horse attack
ā—‡Backdoors
ā—‡Keyloggers
ā—‡DDoS Attack
ā—‡Man in the Middle attack
Trojan Horse Attack
Trojan Horse
arrives via email
or software like
free games.
Trojan Horse is
activated when
the software or
attachment is
executed.
Trojan Horse releases
virus, monitors
computer activity,
installs backdoor, or
transmits information
to hacker.
BackDoors
ā—‡A backdoor is a technique in
which a system security
mechanism is bypassed
undetectably to access a computer
or its data.
ā—‡The backdoor access method is
sometimes written by the
programmer who develops a
program.
KeyLoggers
ā—‡A keylogger is a type
of software(Spyware)
that records every
keystrokes in a log file
by encrypting this and
sends it to the hackers
email.
DDoS(Distributed denial of
service)
ā—‡A
distributed (DDoS) attack o
ccurs when a group of
attacker use multiple
systems to flood the
bandwidth or resources of a
targeted system, usually one
or more web servers.
Man in the middle attack
ā—‡In this attack a
Hacker inserts
himself as a middle
man between the
two parties or
mostly between the
network router an
its connected
devices to catch
their packets and
credentials.
Safety Tips:
ā—‡Use antivirus software
ā—‡Insert firewalls , pop up blocker
ā—‡Uninstall unnecessary software
ā—‡Maintain backup
 Check security settings
 Use secure connection
 Open attachments carefully
 Use strong passwords ,
don’t give personal
information unless required
References
ā—‡https://www.scribd.com/doc/71120466/The-First-
Recorded-Cyber-Crime-Took-Place-in-the-Year-1820
Thanks!
Any questions?
SlidesCarnival icons are editable shapes.
This means that you can:
ā— Resize them without losing quality.
ā— Change fill color and opacity.
ā— Change line color, width and style.
Isn’t that nice? :)
Examples:
Now you can use any emoji as an icon!
And of course it resizes without losing quality and you can change the
color.
How? Follow Google instructions
https://twitter.com/googledocs/status/730087240156643328
āœ‹šŸ‘†šŸ‘‰šŸ‘šŸ‘¤šŸ‘¦šŸ‘§šŸ‘ØšŸ‘©šŸ‘ŖšŸ’ƒšŸƒšŸ’‘ā¤šŸ˜‚
šŸ˜‰šŸ˜‹šŸ˜’šŸ˜­šŸ‘¶šŸ˜øšŸŸšŸ’šŸ”šŸ’£šŸ“ŒšŸ“–šŸ”ØšŸŽƒšŸŽˆ
šŸŽØšŸˆšŸ°šŸŒšŸ”ŒšŸ”‘ and many more...
šŸ˜‰

Cybercrime and Security

  • 1.
  • 2.
    Team Members Maliha Rahman(2014-3-50-007) Noushad Hasan Jabin (2014-3-50- 025) Sauradip Roy (2014-3-50-008)
  • 3.
    Topics will becovered  Introduction  History of cybercrime  Authenticity,Security,Privacy  Database security  Social Engineering & protection  Database security  Different cyber attacking methods  Security tips  What we covered  References
  • 4.
    Introduction ā—‡Cyber crime isHarmful or unlawful acts wherein the computer is either a tool or target or both. ā—‡Online or Internet-based illegal acts.
  • 5.
    History of CyberCrime  The first recorded cyber crime took place in the year 1820.  The first spam email took place in 1978 when it was sent over the Arpanet.  The first VIRUS was installed on an Apple computer in 1982.
  • 6.
    Authenticity, Security, Privacy Authenticity isassurance that a message, transaction, or other exchange of information is from the source it claims to be from. Authenticity involves proof of identity. Different Authentications: 1. Digital certificates 2. USB token 3. Password based Authentication 4. Biometric authentications (Fingerprints, Retina Scans)
  • 7.
    Security Security simply refersto the term Cyber security. Cybersecurity is the technologies & processes which protects networks, computers, programs and data from attack, damage or unauthorized access.
  • 8.
    Place your screenshothere Privacy ā—‡Privacy is your right to control what happens with personal information about you. ā—‡Using Internet may affects someones personal data & Identity.
  • 9.
    Social Engineering ā—‡Social engineeringis the art of manipulating people so they give up confidential information such as password and the control over their computers. ā—‡Protections: ā—First & foremost is user consciousness ā—Avoid installing third party softwares ā—System firewall is turned on ā—2 step authentication for log into account ā—Code generator ā—Trusted Contacts
  • 10.
  • 11.
    DATABASE SECURITY FEATURES ļæ­Digital Certificateis a unique identifier given to an entity to provide authentication of a computer, document, or webpage. ļæ­Encryptions alter the data so unauthorized users cannot view data information. ļæ­Firewalls protect a network from unauthorized access from the internet. ļæ­Proxy Servers shield the requests between the client computers inside a private network and the internet. ļæ­Security Socket Layer connects and transmits encrypted data. ļæ­S-HTTP (secure hypertext transport protocol) transmits web pages securely.
  • 12.
    RESPONSIBLITIES OF THE DATABASEADMINISTRATOR ā—‡Always keep in mind that whenever a system has internet and network connections attached to a DBMS, security breaches may occur. ā—‡Perform routine backup recovery procedures incase of electrical outage and intruder attacks that can damage the DBMS.
  • 13.
    Built in DatabaseProtection ā—‡They create built in solutions such as: ļæ­Password Controls ļæ­Data access based on roles and profiles ļæ­IP restrictions for off site access ļæ­Auditing capabilities of who has run what reports ļæ­Security logging
  • 14.
  • 15.
    Cyber attacks ā—‡Trojan horseattack ā—‡Backdoors ā—‡Keyloggers ā—‡DDoS Attack ā—‡Man in the Middle attack
  • 16.
    Trojan Horse Attack TrojanHorse arrives via email or software like free games. Trojan Horse is activated when the software or attachment is executed. Trojan Horse releases virus, monitors computer activity, installs backdoor, or transmits information to hacker.
  • 17.
    BackDoors ā—‡A backdoor isa technique in which a system security mechanism is bypassed undetectably to access a computer or its data. ā—‡The backdoor access method is sometimes written by the programmer who develops a program.
  • 19.
    KeyLoggers ā—‡A keylogger isa type of software(Spyware) that records every keystrokes in a log file by encrypting this and sends it to the hackers email.
  • 20.
    DDoS(Distributed denial of service) ā—‡A distributed(DDoS) attack o ccurs when a group of attacker use multiple systems to flood the bandwidth or resources of a targeted system, usually one or more web servers.
  • 21.
    Man in themiddle attack ā—‡In this attack a Hacker inserts himself as a middle man between the two parties or mostly between the network router an its connected devices to catch their packets and credentials.
  • 22.
    Safety Tips: ā—‡Use antivirussoftware ā—‡Insert firewalls , pop up blocker ā—‡Uninstall unnecessary software ā—‡Maintain backup  Check security settings  Use secure connection  Open attachments carefully  Use strong passwords , don’t give personal information unless required
  • 23.
  • 24.
  • 25.
    SlidesCarnival icons areeditable shapes. This means that you can: ā— Resize them without losing quality. ā— Change fill color and opacity. ā— Change line color, width and style. Isn’t that nice? :) Examples:
  • 26.
    Now you canuse any emoji as an icon! And of course it resizes without losing quality and you can change the color. How? Follow Google instructions https://twitter.com/googledocs/status/730087240156643328 āœ‹šŸ‘†šŸ‘‰šŸ‘šŸ‘¤šŸ‘¦šŸ‘§šŸ‘ØšŸ‘©šŸ‘ŖšŸ’ƒšŸƒšŸ’‘ā¤šŸ˜‚ šŸ˜‰šŸ˜‹šŸ˜’šŸ˜­šŸ‘¶šŸ˜øšŸŸšŸ’šŸ”šŸ’£šŸ“ŒšŸ“–šŸ”ØšŸŽƒšŸŽˆ šŸŽØšŸˆšŸ°šŸŒšŸ”ŒšŸ”‘ and many more... šŸ˜‰