Cyber Crime and Security

1,261 views

Published on

A presentation about cyber crime and its security.It have all information about hacking,phishing,ddos,cracking,social engineering,crimes and all illegal online crime.

Published in: Education, Technology
0 Comments
9 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,261
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
186
Comments
0
Likes
9
Embeds 0
No embeds

No notes for slide

Cyber Crime and Security

  1. 1. ARE YO SECURE U D CYBER CRIME COMPUTING WORKSOP (CW ) PRESENTATION - SOFTWARE ENGINEERING SECURITY
  2. 2. CYBER CRIME IS NOTHING BUT WHERE THE COMPUTER USED AS AN OBJECT OR SUBJECT OF CRIME. CRIME COMMITED USING COMPUTER AND INTERNET CRIMINAL ACTIVITES THAT MAKE USE OF COMPUTERS OR NETWORKS.CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATIONCRIME
  3. 3. CYBER CRIME AGAINST A PERSON CYBER CRIME AGAINST A PROPERTY CYBER CRIME AGAINST GOVERNMENTCYBER 1 of 10 COMPUTING WORKSHOP PRESENTATIONCRIME
  4. 4. Other Scams 20% Virus & Phishing Malfare 30% 50%CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATIONCRIME
  5. 5. Social engineering is the art of manipulating people so they give up confidential information. 1-Never reveal credit or security information to anyone, even your friends. 2- If a friend urgently ask for your help,to transfer money etc, first confirm then proceed. 3-Never open suspicious emails containing links by friends name, maybe it’s a hacker, trying to reach you from friends email.CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATIONCRIME
  6. 6. Software piracy is a huge illegal business, running into billions of dollars. These includes the sale of imitation software on Internet auction and classified ads 1-It can be prevented by license. 2 types of software licensing management – online and offline. ONLINE – Software checked each time OFFLINE – Only once. 2- Another option to use for anti piracy is to price the software low enough so that it is not worth while forthe hackers to hack, this is very subjective and is up the vendors to decide for themselvesCYBER 1 of 10 COMPUTING WORKSHOP PRESENTATIONCRIME
  7. 7. Identity theft occurs when someone obtains your personal information, such as your credit card data or Social Security number, to commit fraud or other crimes. 1-Monitor your bank and credit card statements 2-Verify your mailing address with the post office and financial institutions- Monitor your bank and credit card statements 3-Choose secure online companies to make online transactions.CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATIONCRIME
  8. 8. Spoofing is a technique used by computer hackers to gain unauthorized access to our computers by sending a message with an IP address saying it is coming from trusted host , similarly with emails and caller ID . 1- CALL SPOOFING - Block spoofing calls. Services such as trapcall.com or safercall.com allow you to block calls that display false caller information. 2- EMAIL SPOOFING - Safeguard your email address and avoid disclosing it.. Use a spam filter, and always use an image to display your email online. 3- Use of good antivirus softwares can prevent IP SPOOFING.CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATIONCRIME
  9. 9. Distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. 1-Working with the Internet Service Provider (ISP) to establish quality of service rates to limit the amount of bandwidth one customer can utilize 2- Using firewalls and filtering devices to filter all unnecessary ports and protocols 3-(D)DoS-Deflate is a free open source Unix/Linux script by MediaLayer that automatically mitigate (D)DoS attacks.CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATIONCRIME
  10. 10. Phishing is a form of online identity theft in which fraudsters trick Internet users into submitting personal information to illegitimate web sites. 1- Communicate personal information only via phone or secure web sites 2-Do not click on links, download files or open attachments in emails from unknown senders 3- Never email personal or financial information, even if you are close with the recipient. 4-Beware of links in emails that ask for personal information.CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATIONCRIME
  11. 11. A salami technique is an automated form of abuse involving Trojan horses or secret execution of an unauthorized program that causes the unnoticed or immaterial debiting of small amounts of assets from a large number of sources or accounts. 1-Dont ignore what appear to be errors incomputer-based financial or other accounting systems. 2-Keep regular checks on account to see changing status.CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATIONCRIME
  12. 12. Malicious software that attaches itself to other software. 1-Use good antivirus and firewall in order to protect yourself. 2- Never download files, because viruses and programs like Trojan Horses and Keyloggers may be attached by sender.CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATIONCRIME
  13. 13. CYBERCRIME SECURITY

×