SlideShare a Scribd company logo
1 of 40
Download to read offline
Security and
Privacy
Recognize Different Types of Cybercrime
What is Cybercrime?
• Cybercrime is defined as a crime where a computer
is the object of the crime or is used as a tool to
commit an offense. A cybercriminal may use a
device to access a user’s personal information,
confidential business information, government
information, or disable a device. It is also
a cybercrime to sell or elicit the above information
online.
Categories of Cyber Crime
Cybercrime:
• Harassment
✓Cyberbullying: between two minors
✓Cyber-harassment: between adults
✓Cyber-stalking:
• More serious in nature
• Stalker demonstrates a pattern of harassment
• Poses a credible threat of harm
Cybercrime:
• Phishing
✓Email messages and IMs
✓Appear to be from someone with
whom you do business
✓Designed to trick you into providing
usernames and passwords
• Pharming
✓Redirects you to a phony website even if you type the URL
✓Hijacks a company’s domain name
Cybercrime: Social Network Attacks (1 of 4)
• Adware and other malware
• Suspicious emails and notifications
Appear to be from a site administrator
• Asking for your password
• Threatening to suspend your account
• Phishing and "Please send money" scams
Cybercrime:– Social Network Attacks (2 of 4)
• Clickjacking
Clicking on a link allows this malware to post unwanted links
on your page
• Malicious script scams
You copy and paste some text into your address bar
It might execute a malicious script
 Creates pages and events
 Sends spam out to your friends
Cybercrime: Social Network Attacks (3 of 4)
• Fraud
Schemes that convince you to give money or property to a
person
Shill bidding is fake bidding to drive up the price of an item
Cybercrime: Social Network Attacks (4 of 4)
• Identity theft
The use of your name, Social Security number, or bank or credit
cards for financial gain
Keyloggers
• Programs or devices that
capture what is typed
Cybercrime: Cybercrime Against Organizations (1 of
2)
• Hacking
White-hat or “sneakers”
• Attempt to find security holes in a system to prevent future hacking
Black-hat or “crackers”
• Malicious intent
Gray-hat
• Illegal but not malicious intent
Cybercrime: Cybercrime Against Organizations (2 of
2)
• Hacktivism
Hacking to make a political statement
• Data breach
Sensitive data is stolen or viewed by someone not authorized
• Cyber-terrorism
Differentiate between Various Types of Malware
Malware:Spam and Cookies (1 of 3)
• Includes different types of programs designed to be
harmful or malicious
Spam
Adware and spyware
Viruses
Worms
Trojan horses
Rootkits
Malware:Spam and Cookies (2 of 3)
• Spam
✓Spamming is sending mass unsolicited emails
✓Messages are called spam
✓Other forms:
• Fax spam
• IM spam
• Text spam
Malware:Spam and Cookies (3 of 3)
• Cookies
✓Installed without your
permission
✓Help websites identify you
when you return
 Track websites and pages
you visit to better target ads
 May collect information you don’t
want to share
Malware:Adware andSpyware(1of 2)
• Adware
✓Pop-ups or banner ads
✓Generate income
✓Use CPU cycles and Internet bandwidth
✓Reduce PC performance
Malware:Adware andSpyware(2of 2)
• Spyware
✓Malware
✓Secretly gathers personal information
✓Usually installed by accident
✓Browser hijacker
Malware– Viruses, Worms, Trojans, and Rootkits (1 of
5)
• Virus - a program that replicates itself and infects
computers
Needs a host file
May use an email program to infect
other computers
The attack is called the payload
Check to see if message is a hoax
Malware:– Viruses, Worms, Trojans, and Rootkits (2 of
5)
• Logic Bomb
✓Behaves like a virus
✓Performs malicious act
✓Does not replicate
✓Attacks when certain conditions are met
• Time Bomb
✓A logic bomb with a trigger that is a specific time or date
 April Fool’s Day
 Friday the 13th
Malware:– Viruses, Worms, Trojans, and Rootkits (3 of
5)
• Worms
✓Self-replicating
✓Do not need a host to travel
✓Travel over networks to infect other machines
✓Conficker worm
 First released in 2008
 Reemerged in 2010 with new behaviors
Malware:– Viruses, Worms, Trojans, and Rootkits (4 of
5)
• Botnet
Network of computer zombies or bots controlled by a master
Fake security notifications
Denial-of-service attacks
• Cripple a server or network by sending out excessive traffic
• Trojan horse
Appears to be legitimate program
Actually malicious
Might install adware, a toolbar, a keylogger, or open a
backdoor
Malware:– Viruses, Worms, Trojans, and Rootkits (5 of
5)
• Ransomware
Malware that prevents you from using your computer until you
pay a fine or fee
Bitcoin is an anonymous, digital, encrypted currency
• Rootkit
Set of programs
Allows someone to gain control over system
Hides the fact that the computer has been compromised
Nearly impossible to detect
Masks behavior of other malware
How to Secure a Computer
Shield’s Up – Software (1 of 2)
• Drive-by download
A visited website installs a program in the background without
your knowledge
• Firewall
Hardware device that blocks
access to your network
Software that blocks access
to an individual machine
Shield’s Up – Software (2 of 2)
• Antivirus program
Protects against viruses, Trojans, worms, spyware
Windows 10 includes Windows Defender
• An antispyware program that performs both real-time protection
and system scanning
• Antispyware software
Prevents adware and spyware from installing
• Security suite
Package of security software
Combination of features
Shield’s Up – Hardware (1 of 2)
• Router
Connects two or more networks together
Home router acts like firewall
• Network address translation (NAT)
Security feature of a router
Shields devices on private network from
the public network
Shield’s Up – Hardware (2 of 2)
• SSID (Service Set Identifier)
Wireless network name
• Wireless encryption
Adds security by encrypting transmitted data
Wi-Fi Protected Setup (WPS) is one option
Shield’s Up – Operating System
• Most important piece of
security software
• Keep patched and
up-to-date
Practice Safe Computing
User Accounts
• Three user account types
Standard
Administrator
Guest
• User Account Control (UAC) notifies you prior to changes
made to your computer
Do not turn this feature off
Always read message before clicking Yes
• Malware tricks users into clicking fake Windows
notifications
Passwords
Encryption
• Converts plain text into ciphertext
• Must have a key to decrypt it
Safely Installing Software
• Copies files to the computer
• Alters settings
Updating and Installing Software
• Protect yourself from downloading problems
Only download from reliable sources
• Zero-day exploit
Attack that occurs on the day an exploit is discovered
before the publisher can fix it
• Bugs
Flaws in the programming of software
Patch or hotfix
Service pack
Discuss Laws Related toComputer Security andPrivacy
Summary: Types of Cybercrime
• DDoS Attacks
• Botnets
• Identity Theft
• Cyberstalking
• Social Engineering
• Potentially Unwanted
Programs
• Phishing
• Prohibited/Illegal Content
• Online Scams
Cyber crime in India - statistics & facts
• India has over 400 million internet users as of 2018, making it
the second-largest internet population in the world.
• In 2018, there were over 27 thousand cases of cyber crimes
recorded in the country
• While the nature of crimes ranges from petty online frauds to lottery
scams and sexual harassment, the most targeted crimes seem to be
in the banking and finance sector.
Cyber Vulnerabilities
• -private sectors
• - One such security breach was that involving India’s unique citizen identification
system- the Aadhaar, which got hacked in early 2018, compromising extensive
personal information including bank details, address and biometrics of over a
billion Indians
• - Responsibility for abusive behavior on social media lay with both the users as
well as social media platforms.
• - Lack of awareness

More Related Content

Similar to Security and Privacy.PDF

Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptxAmeyBarbade1
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-systemSouman Guha
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber CrimeDr Raghu Khimani
 
Introduction To Malware
Introduction To MalwareIntroduction To Malware
Introduction To MalwareMichael Carthy
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 

Similar to Security and Privacy.PDF (20)

Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-system
 
Computer security
Computer securityComputer security
Computer security
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Malware
MalwareMalware
Malware
 
Introduction To Malware
Introduction To MalwareIntroduction To Malware
Introduction To Malware
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 

More from Chetanmalviya8

More from Chetanmalviya8 (7)

Keyloggers.ppt
Keyloggers.pptKeyloggers.ppt
Keyloggers.ppt
 
Botnet.pptx
Botnet.pptxBotnet.pptx
Botnet.pptx
 
WirelessLANs.pptx
WirelessLANs.pptxWirelessLANs.pptx
WirelessLANs.pptx
 
OOAD PRESENTATION.pptx
OOAD PRESENTATION.pptxOOAD PRESENTATION.pptx
OOAD PRESENTATION.pptx
 
Graph Coloring
Graph ColoringGraph Coloring
Graph Coloring
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Monitors.ppt
Monitors.pptMonitors.ppt
Monitors.ppt
 

Recently uploaded

How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdfkeithzhangding
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 

Recently uploaded (20)

How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 

Security and Privacy.PDF

  • 3. What is Cybercrime? • Cybercrime is defined as a crime where a computer is the object of the crime or is used as a tool to commit an offense. A cybercriminal may use a device to access a user’s personal information, confidential business information, government information, or disable a device. It is also a cybercrime to sell or elicit the above information online.
  • 4.
  • 6. Cybercrime: • Harassment ✓Cyberbullying: between two minors ✓Cyber-harassment: between adults ✓Cyber-stalking: • More serious in nature • Stalker demonstrates a pattern of harassment • Poses a credible threat of harm
  • 7. Cybercrime: • Phishing ✓Email messages and IMs ✓Appear to be from someone with whom you do business ✓Designed to trick you into providing usernames and passwords • Pharming ✓Redirects you to a phony website even if you type the URL ✓Hijacks a company’s domain name
  • 8. Cybercrime: Social Network Attacks (1 of 4) • Adware and other malware • Suspicious emails and notifications Appear to be from a site administrator • Asking for your password • Threatening to suspend your account • Phishing and "Please send money" scams
  • 9. Cybercrime:– Social Network Attacks (2 of 4) • Clickjacking Clicking on a link allows this malware to post unwanted links on your page • Malicious script scams You copy and paste some text into your address bar It might execute a malicious script  Creates pages and events  Sends spam out to your friends
  • 10. Cybercrime: Social Network Attacks (3 of 4) • Fraud Schemes that convince you to give money or property to a person Shill bidding is fake bidding to drive up the price of an item
  • 11. Cybercrime: Social Network Attacks (4 of 4) • Identity theft The use of your name, Social Security number, or bank or credit cards for financial gain Keyloggers • Programs or devices that capture what is typed
  • 12. Cybercrime: Cybercrime Against Organizations (1 of 2) • Hacking White-hat or “sneakers” • Attempt to find security holes in a system to prevent future hacking Black-hat or “crackers” • Malicious intent Gray-hat • Illegal but not malicious intent
  • 13. Cybercrime: Cybercrime Against Organizations (2 of 2) • Hacktivism Hacking to make a political statement • Data breach Sensitive data is stolen or viewed by someone not authorized • Cyber-terrorism
  • 14. Differentiate between Various Types of Malware
  • 15. Malware:Spam and Cookies (1 of 3) • Includes different types of programs designed to be harmful or malicious Spam Adware and spyware Viruses Worms Trojan horses Rootkits
  • 16. Malware:Spam and Cookies (2 of 3) • Spam ✓Spamming is sending mass unsolicited emails ✓Messages are called spam ✓Other forms: • Fax spam • IM spam • Text spam
  • 17. Malware:Spam and Cookies (3 of 3) • Cookies ✓Installed without your permission ✓Help websites identify you when you return  Track websites and pages you visit to better target ads  May collect information you don’t want to share
  • 18. Malware:Adware andSpyware(1of 2) • Adware ✓Pop-ups or banner ads ✓Generate income ✓Use CPU cycles and Internet bandwidth ✓Reduce PC performance
  • 19. Malware:Adware andSpyware(2of 2) • Spyware ✓Malware ✓Secretly gathers personal information ✓Usually installed by accident ✓Browser hijacker
  • 20. Malware– Viruses, Worms, Trojans, and Rootkits (1 of 5) • Virus - a program that replicates itself and infects computers Needs a host file May use an email program to infect other computers The attack is called the payload Check to see if message is a hoax
  • 21. Malware:– Viruses, Worms, Trojans, and Rootkits (2 of 5) • Logic Bomb ✓Behaves like a virus ✓Performs malicious act ✓Does not replicate ✓Attacks when certain conditions are met • Time Bomb ✓A logic bomb with a trigger that is a specific time or date  April Fool’s Day  Friday the 13th
  • 22. Malware:– Viruses, Worms, Trojans, and Rootkits (3 of 5) • Worms ✓Self-replicating ✓Do not need a host to travel ✓Travel over networks to infect other machines ✓Conficker worm  First released in 2008  Reemerged in 2010 with new behaviors
  • 23. Malware:– Viruses, Worms, Trojans, and Rootkits (4 of 5) • Botnet Network of computer zombies or bots controlled by a master Fake security notifications Denial-of-service attacks • Cripple a server or network by sending out excessive traffic • Trojan horse Appears to be legitimate program Actually malicious Might install adware, a toolbar, a keylogger, or open a backdoor
  • 24. Malware:– Viruses, Worms, Trojans, and Rootkits (5 of 5) • Ransomware Malware that prevents you from using your computer until you pay a fine or fee Bitcoin is an anonymous, digital, encrypted currency • Rootkit Set of programs Allows someone to gain control over system Hides the fact that the computer has been compromised Nearly impossible to detect Masks behavior of other malware
  • 25. How to Secure a Computer
  • 26. Shield’s Up – Software (1 of 2) • Drive-by download A visited website installs a program in the background without your knowledge • Firewall Hardware device that blocks access to your network Software that blocks access to an individual machine
  • 27. Shield’s Up – Software (2 of 2) • Antivirus program Protects against viruses, Trojans, worms, spyware Windows 10 includes Windows Defender • An antispyware program that performs both real-time protection and system scanning • Antispyware software Prevents adware and spyware from installing • Security suite Package of security software Combination of features
  • 28. Shield’s Up – Hardware (1 of 2) • Router Connects two or more networks together Home router acts like firewall • Network address translation (NAT) Security feature of a router Shields devices on private network from the public network
  • 29. Shield’s Up – Hardware (2 of 2) • SSID (Service Set Identifier) Wireless network name • Wireless encryption Adds security by encrypting transmitted data Wi-Fi Protected Setup (WPS) is one option
  • 30. Shield’s Up – Operating System • Most important piece of security software • Keep patched and up-to-date
  • 32. User Accounts • Three user account types Standard Administrator Guest • User Account Control (UAC) notifies you prior to changes made to your computer Do not turn this feature off Always read message before clicking Yes • Malware tricks users into clicking fake Windows notifications
  • 34. Encryption • Converts plain text into ciphertext • Must have a key to decrypt it
  • 35. Safely Installing Software • Copies files to the computer • Alters settings
  • 36. Updating and Installing Software • Protect yourself from downloading problems Only download from reliable sources • Zero-day exploit Attack that occurs on the day an exploit is discovered before the publisher can fix it • Bugs Flaws in the programming of software Patch or hotfix Service pack
  • 37. Discuss Laws Related toComputer Security andPrivacy
  • 38. Summary: Types of Cybercrime • DDoS Attacks • Botnets • Identity Theft • Cyberstalking • Social Engineering • Potentially Unwanted Programs • Phishing • Prohibited/Illegal Content • Online Scams
  • 39. Cyber crime in India - statistics & facts • India has over 400 million internet users as of 2018, making it the second-largest internet population in the world. • In 2018, there were over 27 thousand cases of cyber crimes recorded in the country • While the nature of crimes ranges from petty online frauds to lottery scams and sexual harassment, the most targeted crimes seem to be in the banking and finance sector.
  • 40. Cyber Vulnerabilities • -private sectors • - One such security breach was that involving India’s unique citizen identification system- the Aadhaar, which got hacked in early 2018, compromising extensive personal information including bank details, address and biometrics of over a billion Indians • - Responsibility for abusive behavior on social media lay with both the users as well as social media platforms. • - Lack of awareness