This document discusses cyber security and cyber crimes. It begins by defining cyber security and the need for it due to increasing cyber crimes like phishing, hacking, vishing and cyber stalking. It then examines global attack trends in different regions like Asia, America, Europe, Africa and Australia. It discusses information technology security techniques used and terminologies like malicious codes and scam. It explores overcoming cyber crimes through security policies, law enforcement, research and international collaboration. Finally, it concludes that cyber security is about managing future risks and incidents through a standardized model and coordinated international efforts.
Cyber crime, or computer related crime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. ... Cyber crime may threaten a person or a nation's security and financial health.
The basic fundamental of cybersecurity and how can it be used for unethical purposes.
For this type of presentations (customised), you can contact me here : rishav.sadhu11@gmail.com
Introduction
What is Cyber Crime?
Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
What is Cyber Security?
C
yber security, also known as computer security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection and due to malpractice by operators,whether intentional, accidental, or due to them being tricked into deviating from secure procedures.
The field is of growing importance due to the increasing reliance on computer systems in most societies and the growth of "smart" devices,including smartphones, televisions and tiny devices as part of the Internet of Things – and of the Internet and wireless network such as Bluetooth and Wi-Fi.
Some organizations are turning to big data platforms, such as Apache Hadoop, to extend data accessibility and machine learning to detect advanced persistent threats.
Vulnerabilities and Attacks
Vulnerability is a system susceptibility or flaw, and much vulnerability are documented in the Common Vulnerabilities and Exposures (CVE) database and vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities as they are discovered.
An exploitable vulnerability is one for which at least one working attack or "exploit" exists.
To secure a computer system, it is important to understand the attacks that can be made against it, and these threats can typically be classified into one of the categories below.
Cyber crime, or computer related crime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. ... Cyber crime may threaten a person or a nation's security and financial health.
The basic fundamental of cybersecurity and how can it be used for unethical purposes.
For this type of presentations (customised), you can contact me here : rishav.sadhu11@gmail.com
Introduction
What is Cyber Crime?
Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
What is Cyber Security?
C
yber security, also known as computer security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection and due to malpractice by operators,whether intentional, accidental, or due to them being tricked into deviating from secure procedures.
The field is of growing importance due to the increasing reliance on computer systems in most societies and the growth of "smart" devices,including smartphones, televisions and tiny devices as part of the Internet of Things – and of the Internet and wireless network such as Bluetooth and Wi-Fi.
Some organizations are turning to big data platforms, such as Apache Hadoop, to extend data accessibility and machine learning to detect advanced persistent threats.
Vulnerabilities and Attacks
Vulnerability is a system susceptibility or flaw, and much vulnerability are documented in the Common Vulnerabilities and Exposures (CVE) database and vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities as they are discovered.
An exploitable vulnerability is one for which at least one working attack or "exploit" exists.
To secure a computer system, it is important to understand the attacks that can be made against it, and these threats can typically be classified into one of the categories below.
Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
Short Presentation On Cyber Crime And Security which includes Cyber crime introduction and types , Hacking and its types, different Threats , and in last Prevention for Hacks and Threats.
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
Designated IT security experts in Europe and Asia have been interviewed by RadarServices, the European market leader for managed security services, with regards to future IT security trends and challenges. They shared their views concerning the development of cyber attacks and security technologies until 2025.
Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
Short Presentation On Cyber Crime And Security which includes Cyber crime introduction and types , Hacking and its types, different Threats , and in last Prevention for Hacks and Threats.
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
Designated IT security experts in Europe and Asia have been interviewed by RadarServices, the European market leader for managed security services, with regards to future IT security trends and challenges. They shared their views concerning the development of cyber attacks and security technologies until 2025.
With mega-breaches like Anthem, OPM, IRS, Ashley Madison, UCLA Health and TalkTalk all within the past 12 months, chances are your data has been targeted. What does this mean for 2016?
Review this presentation and learn:
• Why cyber attacks continue to increase in sophistication, magnitude and velocity
• What trends will have the largest and smallest impact on cyber security in 2016
• Why cloud-based apps and the Internet of Things have transformed cyber security
• How you can protect your organization from attacks from the inside
Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
View on-demand presentation: http://securityintelligence.com/events/ibm-2015-cyber-security-intelligence-index/
The cyber threat landscape is increasing in complexity and frequency. Organizations that have historically not been the target of cyber attacks now make headline news with large data losses and compromised transactions. Organizations need a clear point of view on how to respond to these threats, and one that incorporates not only the relevant technology but also the organizational changes needed.
Nick Bradley, Practice Leader of the IBM Threat Research Group and the X-Force Threat Analysis Team, and Nick Coleman, Global Head Cyber Security Intelligence Services outline what organizations need to do now and in the future to stay ahead of the growing cyber security threat.
Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most cybercrime is committed by cybercriminals or hackers who want to make money. However, occasionally cybercrime aims to damage computers or networks for reasons other than profit.
CETPA provides cyber security training in Noida . CETPA provide best Cyber Security training institute in Delhi NCR. Cyber Security means a set of methods used to protect systems, data, and network from cyber-attacks. Its main motive is to ensure a system s reliability, integrity and privacy of data. CETPA also provides Cyber Security online course in Noida.
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
Pat Pather, Chief Executive Officer at Forensic Sciences Institute, delivered a presentation on Cyber Security Unchartered: Vigilance, Innovation and Adaptability- Exploring the Depths of Cybersecurity, at Public Sector Cybersecurity Summit 2023 on the 3rd of October 2023. #PublicSec2023 #Conference #Cybersecurity #PublicSector
This is the PowerPoint presentation of Cybersecurity for Research Paper or Seminar. For more details go to my YouTube channel and watch this video:-
https://youtu.be/ldrOSxIRW2w
Thank You!!
Cyber Security is a crucial and rising part of concern in the present age with a rapid increase in the graph of digitization. And with an increase in the activities in cyberspace, there is also an increase in the cyber-crimes. Handling the huge volumes of data with security has become an inevitable need of the hour. Antivirus software, Firewalls, and other technological solutions help to secure this data but are not sufficient enough to prevent the cybercrooks from destructing the network and stealing confidential information. This paper mainly focuses on the issues and challenges faced by cybersecurity. It also discusses the risks, cybersecurity techniques to curb cyber-crime, cyber ethics, and cyber trends.
Time is now changing faster, it was started with Green Revolution, White Revolution and now it’s time for Data Revolutions. It means Cyber War; in today’s world AI is replacing human beings. A research says that more than 80% work is depending upon AI. Due to this cyber crimes and threats are also increased.
1. CYBER SECURITY
Jumanne Rajabu Mtambalike
Bsc.Computer
science and electronics,Dayanandasagar College
Bangalore University,India
mtambalike@yahoo.co.uk
jrmhza@gmail.com
Web
technologies.
Bangalore,India
www.webtechjr.blogspot.com
Abstract— Cyber crime is emerging as serious threat. To the Vishing is the criminal practice of using social engineering
world of computer technology, governments, police and Voice over IP (VoIP) to gain access to private personal,
intelligence units are acting toward the issue closely. Different information from the public for the purpose of financial
strategies are put into action. The effort is done to educate reward. The term is the combination of Voice and Phishing.
people and to expose them to the idea that it is not safe
D. Cyber stalking.
anymore to navigate in the cyber world without security. This
report is based on different research done by people and The term refers to the act of online stalking which involve
Organization about cyber security. online harassment and abuse. It involves vandalizing property,
threatening behaviours and message or objects which disturb
Keywords— cyber-security, cyber-crime, Phishing and Hacking.
the user of the Internet or cyber technologies.
I. INTRODUCTION
Cyber Security, techniques developed to safeguard III. GLOBAL ATTACK TREND.
information and information systems stored on computers.
Potential threats include the destruction of computer hardware Cyber security is a collective concern that is comprehensive in
and software and the loss, modification, theft, unauthorized scope—the Internet has no National boundaries. Whereas
use, observation, or disclosure of computer data. security is typically regulated at the government level, cyber
security is at once national, international and private
concerned.
II. TYPES OF CYBERCRIME
A. Asia.
The need of cyber security is due to the increase of cyber
The entire Asian continent is in the blink of cyber wars for
crimes or online crimes. In recent years several new method
example hostile cyber actions have taken place in the past
and ways of practicing these crimes has been established
between India and Pakistan, Azerbaijan and Armenia, and
including:
Japan and the People’s Republic of China. This indicates the
A. Phishing. need and essentialness of cyber security around the word.
It is among the internet fraud involving getting financial With every new application, newer vulnerabilities crop up,
information illegally online spam e-mail pretending to be from posing immense challenges to those who are mandated to
bank or any institution concerning with the user of the account protect the IT assets.
asking him to send account number or password for
verification while the original aim is to use the privacy of the B. America
user for illegal activities.
America and Canada especially North America are the
most affected areas with cyber crimes due to the huge number
B. Hacking. of computer literate people. In recent days teenagers are
Hacking is the crime involves invading systems and extremely exposed into cybercrimes making add for the law
gaining unauthorized access to the data stored in them. A enforcers to enforce the law.
hacker refers to someone who secretively invades other’s
computers, inspecting or tampering with the programs or data
stored on them. INFORMATION TECHNOLOGY SECURITY TECHNIQUES.
NO. Information security management system.
Country ISO 9000 27001
C. Vishing.
1 WORLD 951486 77326
2. 2 CHINA 210773 146
3 ITALY 115309 148
4 JAPAN 731766 276
5 SPAIN 5112 93
6 INDIA 46091 94
7 USA 36192
8
Due to the concern of cyber security United States try to
allied with the Asian countries for example India try to
counteract the problem of Cyber security.
Fig 1 Global Attack Trend.
C. Europe
Headings . Fig. 1 shows the intensity of the situation according to
different locations and areas on the earth surface .The
1) Level-1 Heading: A level-1 heading must be in Small
situation is bad and critical in areas were a lot of people are
Caps, centred and numbered using uppercase Roman
computer literate and exposed to the networking word.
numerals. For example, see heading “III. Page Style” of
Although the effort has been done the unified effort is must.
this document. The two level-1 headings which must not
be numbered are “Acknowledgment” and “References”.
• The RED colour is for areas between (0.32-94.92)%
2) Level-2 Heading: A level-2 heading must be in Italic, • The YELLOW colour for areas between (0.03-0.24)%
left-justified and numbered using an uppercase alphabetic • The BLUE colour for areas between (0.01-0.02)%
letter followed by a period. For example, see heading “C.
Section Headings” above. E. Australia.
3) Level-3 Heading: A level-3 heading must be indented, In Australia some countries around the area the effect has
been seen also in recent days were the number of junk mails
in Italic and numbered with an Arabic numeral followed by
a right parenthesis. The level-3 heading must end with a and online hackers has been increase tremendously.
colon. The body of the level-3 section immediately follows
the level-3 heading in the same paragraph. For example,
this paragraph begins with a level-3 heading. IV. TERMINOLOGIES.
D. Africa. A. Malicious Codes.
In Africa the situation is not very bad because few people
are exposed to the vulnerability due to limited number of
resources and networking facilities. Although in countries like
Nigeria were they are famous for online spam mails to the
online computer users are still not under control and their
number increase day after day. Some effort has been done to
counteract the situation by law enforcers but still not enough.
Fig. 2 System Administrators in action protecting the server security.
3. VI. OVERCOMING CYBERCRIMES.
Overcoming the cyber crimes is the main aim of cyber
security in order to do that several aspects of has to be
considered including.
1) Security policy and legal framework: The security policy
must be kept tight to prevent law breakers from committing
cyber crimes. The legal framework especially must analyse
the system to create more opportunities for law enforcers to
prevent cyber criminals to commit their crimes.
2) Law enforcement: The laws established to guide the
right of privacy and ownership of product should be
Fig 4 Percentage of cyber incidents 2008
practiced by every government and privacy agency and
should be enforced by law so that to protect the rights of
properties online.
3) Research and development: Worldwide research on
cyber security should be implemented so as to face the new
threat in the cyber world. The new ways of protection and
encryption should be developed to overcome the tactics of
experienced and more powerful hackers.
4) International Collaboration: International cooperation
is the most important thing if the war has to be won sharing
the ideas and opinions on how to overcome the problem of
cyber-crimes by establishing worldwide organisations to
deal with the situation.
Fig 3 Percentage of cyber incidents 2009
VII.CONCLUSIONS
Cyber security is essentially about managing future risk and
responding to current and past incidents and attacks. This
B. Scam.
report has offered a highly standardized and clear model for
All the activities involving tricking people online by processing risk-management information about critical
making them to believe in something and sending money or information infrastructures, one that can be applied at both the
valuable item is considered to be scam. Scam is totally illegal international and national levels. The urgent task ahead is to
and serious punishment is applied to the offender. identify the key information flows that are required for cyber
C. Intrusion. security and to establish linkages among the various
organizational entities that can best collect and use this
An illegal entry via online into someone server or PC often information.
by force and penetrating through the system security without
the permission of the user is considered to be Intrusion and it ACKNOWLEDGMENT
is a cyber crime. It has been a tremendous achievement to accomplish this
report. I would like to thank the administration for what I have
D. Cyber-terrorism achieved, the department of Computer science in
Terrorism involving the use of computer especially in Dayanandasagar College and my class teacher Prathima.Also I
military operation is considered to be cyber terrorism in recent would like to recognize the sources such as Microsoft Encarta
days there has been pressure between countries complaining for the support.
one country has tried to obtain their military secret operation
using illegal computer activities.
V.