presentation topic : cyber crimes and security By ashwini awatare

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Chapter 9: Privacy, Crime, and Security
CYBER CRIME& SECUIRITY
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
DIYTP What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Cyber Crime Carloe Distor CCS1D. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers.
CYBER CRIME AND SECURITY TRENDS
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Chapter 11 Security and Privacy: Computers and the Internet.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Cyber crime & Security Prepared by : Rughani Zarana.
BUSINESS B1 Information Security.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Chap1: Is there a Security Problem in Computing?.
Cybercrime What is it, what does it cost, & how is it regulated?
CLICKTECHSOLUTION.COM.  INTRODUCTION  HISTORY OF CYBER CRIME  CATEGORIES OF CYBER CRIME  TYEPS OF CYBER CRIME  CYBERCRIMES THREATENS NATIONAL SECORITY.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Security and Ethics Safeguards and Codes of Conduct.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Presented by Presented by Daniel Lawrence Delgado CITCS BSIT 1-D.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
What is Cybercrime? Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs Cybercrime.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Seminar by: Guided By: Nidhi Anand Sandhya Rani Sahoo Regd No:
Securing Information Systems
CYBER FORENSICS | Kiran Bettadapur S. | 5/8/2018.
IT Security  .
A Project on CYBER SECURITY
Submitted By: Arslan Javaid Bsmc Submitted to: Sir Farrukh
Seminar On Cyber Crime Submitted To: Submitted By:
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
The Best Way To Secure U R Self
Assalamualaikum Today, I am going to give a presentation on
COMPUTER CRIME.
Securing Information Systems
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chapter 13 Security and Ethical Challenges.
Introduction to Cybercrime and Security
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Presentation transcript:

presentation topic : cyber crimes and security By ashwini awatare

Contents :- Introduction to cyber crimes History of cyber crimes Categories of cyber crimes Types Impact of cyber crimes Cyber security Cyber laws Prevention Conclusion

Introduction :- The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of— be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime — illegal activity committed on the internet.

What is cyber crime ? Using the Internet to commit a crime. Identity Theft Hacking Viruses Facilitation of traditional criminal activity Stalking Stealing information Child Pornography

Cyber Crimes :- Defining Cyber Crime :-> It’s an unlawful act wherein the computer is either a tool or a target or both. Cyber space is a virtual space that has become as important as real space for business, politics, and communities

History of Cyber Crime The first recorded cyber crime took place in the year 1820 In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard’s - employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!

History of cyber crimes :- The first recorded cyber crime took place in 1820. That is not surprising considenng the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c. In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage.

The first spam email took place in 1976 when it was sent out over the AR PANT. The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the ElK Cloner.

Incident due to cyber crimes

Cybercrime Components Computers Cell Phones PDA’s Game Consoles

CATEGORIES OF CYBER CRIME: We can categorize cyber crime in two ways. The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.

CATEGORIES OF CYBER CRIME: Cyber crimes can be basically divided into 3 major categories: 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government.

FIRST CATEGORY Cyber crimes against persons Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other.

SECOND CATEGORY Cyber crimes against property These crimes include computer vandalism . (Destruction of others’ property), Transmission of harmful programs, Unauthorized trespassing through cyber space, Unauthorized possession of computer information.

THIRD CATEGORY Cyber crimes against government Cyber terrorism is one distinct kind of crime in this category. The growth of Internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.

STATISTICS AND THEIR IMPACTS

Types Of Cyber Crime Modification of a conventional crime by using computers. Frequently Used Cyber Crimes.

Modification of a conventional crime by using computers. Financial crimes Cyber pornography Sale of illegal articles Online gambling

Intellectual Property crime Email spoofing Forgery Cyber Defamation Cyber stalking — . . . —

Frequently Used Cyber Crimes. Unauthorized access to computer systems or networks Theft of information contained in electronic form Email bombing Data diddling Salami attacks Denial of Service attack

Virus / worm attacks Logic bombs Internet time thefts Web jacking Theft of computer system Physically damaging a computer system

Cyber Criminals Kids (age group 9-16 etc.) Organized hacktivists Disgruntled employees Professional hackers (corporate espionage)

Computer Security Confidentiality Integrity Availability Only those authorized to view information. Integrity Information is correct and hasn’t been altered by unauthorized users or software. Availability Data is accessible to authorized users.

Computer Security

Computer Security - Threats Malware Software that has a malicious purpose Viruses Trojan horse Spyware

Computer Security - Threats Intrusions Any attempt to gain unauthorized access to a system Cracking Hacking Social Engineering War-driving

Computer Security - Threats

Computer Security - Terminology People Hackers White Hat – Good guys. Report hacks/vulnerabilities to appropriate people. Black Hat – Only interested in personal goals, regardless of impact. Gray Hat – Somewhere in between.

Computer Security - Terminology Script Kiddies Someone that calls themselves a ‘hacker’ but really isn’t. Ethical Hacker Someone hired to hack a system to find vulnerabilities and report on them. Also called a ‘sneaker’ .

Computer Security - Terminology Security Devices Firewall Barrier between network and the outside world. Proxy server Sits between users and server. Two main functions are to improve performance and filter requests. Intrusion Detection Systems (IDS) Monitors network traffic for suspicious activity.

Cyber Laws :- • Law governing cyber space • Cyber law encompasses laws relating to: — Cyber Crimes Electronic and Digital Signatures — Intellectual Property — Data Protection and Privacy

Cyber crime: it refers to criminal exploitation of the internet Electronic and Digital signatures : it refers to mathematical scheme for demonstrating the authenticity of digital message or documents

Intellectual property: it refers to legal concept which refers to creations of the mind for which exclusive rights are recognized. Data protection and privacy: it refers to effective legislation helps minimize monitoring by governments , regulate surveillance by information is properly protected.

NEED OF CYBER LAW Cybercriminals ÷ computer technology = difficulties to apply the law. Not only real-world crimes by using computers..

PREVENTION Disable and log off a specific user account to prevent access. Disable and log off a group of user accounts which access a particular service that is being attacked. Disable and dismount specific (network) devices, for instance disk devices that are being swamped.

Disable specific applications, for example, an e-mail system subjected to a SPAM attack. Close down an entire system, and divert processing to an alternative or backup service on a secondary network.

conclusion Within the law enforcement agencies, a set of rules must be developed to address the various categories of computer crime. As such, investigators will know what and which materials to search and seize, the electronic evidence to recover, and the chain of custody to maintain.