Cyber X-Force-SMS alert system for E-mail threats.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Threats To A Computer Network
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Wonga example Register Question- What risks do you think businesses face due to IT developments?
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Cyber Crimes.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Cybercrime What is it, what does it cost, & how is it regulated?
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Information Systems Week 7 Securing Information Systems.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Safe Computing Practices. What is behind a cyber attack? 1.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
CYBER SECURITY...
IT Security  .
Lesson 3 Safe Computing.
A Project on CYBER SECURITY
Information Security 101 Richard Davis, Rob Laltrello.
Securing Information Systems
Cybersecurity Awareness
Prepared By : Binay Tiwari
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
WJEC GCSE Computer Science
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Cyber X-Force-SMS alert system for threats

ABSTRACT The objective of cyber X-Force includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. Cyber Police may be defined in a general way as an unlawful act wherein the computer is either a tool or a target or both.

An threat is any threat that uses the internet to facilitate cyber crime. threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ other protocols and components, such as links in or IM, or malware attachments or on servers that access the Web. They benefit cyber criminals by stealing information for subsequent sale and help absorb infected PCs into botnets.

threats pose a broad range of risks, including financial damages, identity theft, loss of confidential information/data, theft of network resources, damaged brand/personal reputation. threats can be divided into two primary categories, based on delivery method – push and pull. Push-based threats use spam, phishing, or other fraudulent means to lure a user to a malicious (often spoofed) website which then collects information and/or injects malware. Push attacks use phishing, DNS poisoning (or pharming), and other means to appear to originate from a trusted source.

Precisely-targeted push-based threats are often referred to as spear phishing to reflect the focus of their data gathering attack. Spear phishing typically targets specific individuals and groups for financial gain. In other push-based threats, malware authors use social engineering such as enticing subject lines those reference holidays, popular personalities, sports, pornography, world events and other hot topics to persuade recipients to open the and follow links to malicious websites or open attachments with malware that accesses the Web.

Pull-based threats are often referred to as “drive- by” threats, since they can affect any website visitor. Cyber criminals infect legitimate websites, which unknowingly transmit malware to visitors or alter search results to take users to malicious websites. Upon loading the page, the user’s browser passively runs a malware downloader in a hidden HTML frame (IFRAME) without any user interaction. We propose to design a SMS system which monitors the key actions and gets invoked if it identifies any threat key words and sends SMS to the admin along with the “Word” and the systems IP address to enable quick preventive actions.

EXISTING SYSTEM is a useful tool for technology savvy criminals thanks to the relative anonymity offered by it. It becomes fairly easy for anyone with even a basic knowledge of computers to become a blackmailer by threatening someone via . Individual who received should report to the police authority, then the police will trace IP address of sender then they will trace the location. Sometimes sender may not be trapped.

PROPOSED SYSTEM In the Proposed System software can be extend to prevent high-tech crimes and cyber terrorism, and keep them from spreading, by quickly providing information gathered by the police on information security to Internet users, and increasing security awareness All banking institutions and businesses today run their business online. Hackers can hack your computer system and misuse our personal information and pictures. Various other dangers associated with cyber crimes are entry of virus into your system, altering your files, change of passwords, stealing credit card information and make unauthorized purchases.

Hardware Configuration Hardware Configuration Main Processor:Intel Pentium III CPU Clock:667 MHz Base Memory Size:128 MB Hard Disk Capacity:10 GB (Mini) Monitor :COMPAQ Color monitor Keyboard:COMPAQ 104 keys

SOFTWARE REQUIREMENTS Operating System : Windows XP Internet tool : ASP.NET Application Development tool : C#.NET Database : SQL SERVER 2005 Issue tracking : Scarab Project planning and tracking : MS Project 2000