Cybercrime(this)

488 views

Published on

Cyber crime for Information System Risk & Security.

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
488
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
29
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Cybercrime(this)

  1. 1. Group Members: Danushka Nirmal De Silva(4240138) Ahmad Akmal Afiq(4237323) Yadiy Zakwan(4240960)
  2. 2. INTRODUCTION  SUMMARY  DEFINITIONS  HISTORY  TYPES OF CYBERCRIME  STATISTICS  CASE STUDY (1 & 2)  PREVENTION  CONCLUSION
  3. 3. SUMMARY The internet is growing rapidly.  Rise in new opportunities in the modern world.  Internet also has its own disadvantages which is : 
  4. 4. WHAT IS CYBERCRIME ?  Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs  the computer used as an object or subject of crime
  5. 5. HISTORY  Abacus is the earliest and simplest form of computer which dates back about 3500 B.C and was used in some parts of the world such as China  First recorded cyber crime dates back to 1820  Joseph-Marie Jacquard had a textile manufacture introduced the loom  The loom threatened the employees in the firm who then decided to sabotage it in order to discourage Jacquard from further use of the loom
  6. 6. Cont’d First spam email took place in 1978 when it was sent over the Arpanet  The first virus was installed on an Apple computer in 1982 
  7. 7. TYPES OF CYBERCRIMES Hacking  Child Pornography  Denial of Service(DoS)  Virus Dissemination  Computer Vandalism  Cyber Terrorism  Software Piracy 
  8. 8. HACKING Illegal intrusion into a computer system and/or network  Hackers writes or use ready-made computer programs to attack the target computer  Includes breaking into a computer with intention to steal, damage, modify or monitor data or settings within a system 
  9. 9. CHILD PORNOGRAPHY The internet is being highly used by its abusers to reach and abuse children sexually, worldwide  Nowadays, more homes have internet access, more children would be using the internet and high chances of falling victim to paedophiles 
  10. 10. Denial of Service  The criminal floods the bandwidth of victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide
  11. 11. VIRUS DISSEMINITION Malicious software that attaches itself to other software  Circulate themselves to other files and to other computers on a network  Affect the data on a computer, either by altering or deleting it 
  12. 12. COMPUTER VANDALISM  An act of damaging or destroying data rather than stealing or misusing them
  13. 13. CYBER TERRORISM It is the actual use of computers and internet technology to cause intimidation and destruction  Uses the internet or network to destroy or damage computers for political reasons  Cyber terrorists could hack into a pharmaceutical company’s computers, changing the formula of some essential medication and causing thousands to die 
  14. 14. SOFTWARE PIRACY Theft of software through an illegal act of copying a genuine programs or the counterfeiting and distribution of products intended to pass for the original  Copying and using computer programs in violation of copyrights and trade secret laws  Retail revenue losses worldwide are ever increasing due to software piracy 
  15. 15. STATISTICS
  16. 16. STATISTICS(cont..)
  17. 17. CASE STUDY 1 CYBER CRIMINALS TARGET SKYPE, FACEBOOK & WINDOWS USER
  18. 18. CASE STUDY 1 Cyber criminals target social network & Windows users with Blackhole malware.  Disuised as Windows licences, Facebook account verification, Skype voicemail notifications & spam messages.  Biggest dangers Internet users face. 
  19. 19. Users who click the malicious Blackhole links & downloaded the files were infected with a Trojan virus.  Spam email campaign targeted Facebook users with a message claiming that their account was locked and needed to be re-verified.  The links led to Blackhole exploits and a Zeus Trojan disguised as an Adobe Flash Player download. 
  20. 20. Users should verify the source and destination of any link before clicking  they should never run executable files unless they are positive that the source is legitimate 
  21. 21. CASE STUDY 2 HACKING OF US DRONE TECHNOLOGY
  22. 22. CASE STUDY 2 Chinese hackers increasingly attracted to US drone technology  Hacker group “Comment Crew” hacked US military network stealing classified information of US military drones.  They targeted both large companies, including US military contractors & military firms focused on drone technology. 
  23. 23. Chinese drone identical to US Predator drone.  US drone market could be the first victim of Chinese espionage. 
  24. 24. PREVENTION Antivirus & Anti Spyware software  Firewalls  Cryptography  Cyber Law & Ethics 
  25. 25. Antivirus & Anti Spyware software   to identify and eliminate computer viruses and other malicious software. to restrict backdoor program, trojans and other spywares to be installed on the computer.
  26. 26. Firewalls protects a computer network from unauthorized access.  guards an internal computer network against malicious access from outside the network. 
  27. 27. Cryptography science of encrypting and decrypting information.  Encryption is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender & the recipient.  A number of cryptographic methods have been developed and some of them are still not cracked. 
  28. 28. Cyber Laws & Ethics Responsibility of every individual to follow cyber ethics and cyber laws.  ISP should provide high level security at their severs  Security software as a protection  Essential features in the cyber world today. 
  29. 29. CONCLUSION Cybercrimes increase with the rapidly growing internet technology.  It is not possible to eliminate cybercrimes.  It is quite possible to check them.  Awareness is always the first step to protect yourself. 

×