CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba.

Slides:



Advertisements
Similar presentations
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
Crime and Security in the Networked Economy Part 4.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
CYBER CRIME& SECUIRITY
Security, Privacy, and Ethics Online Computer Crimes.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Cyber Crime Carloe Distor CCS1D. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers.
CYBER CRIME AND SECURITY TRENDS
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet safety By Lydia Snowden.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Defining Security Issues
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Cyber crime & Security Prepared by : Rughani Zarana.
BUSINESS B1 Information Security.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
IT security By Tilly Gerlack.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Types of Electronic Infection
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Topic 5: Basic Security.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
CLICKTECHSOLUTION.COM.  INTRODUCTION  HISTORY OF CYBER CRIME  CATEGORIES OF CYBER CRIME  TYEPS OF CYBER CRIME  CYBERCRIMES THREATENS NATIONAL SECORITY.
Cyber Safety Jamie Salazar.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Presented by Presented by Daniel Lawrence Delgado CITCS BSIT 1-D.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
What is Cybercrime? Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs Cybercrime.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Cyber crime and security issues
Securing Information Systems
IT Security  .
Cyber crime and security issues
Chapter 11 crime and security in the networked economy
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Assalamualaikum Today, I am going to give a presentation on
COMPUTER CRIME.
Computer Ethics.
Unit# 7: Future Enabling use of ICT
Faculty of Science IT Department By Raz Dara MA.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer Security By: Muhammed Anwar.
Presentation transcript:

CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

Brief overview on cybersecurity and some history Brief overview on cybersecurity and some history Cybercrime and some common types Cybercrime and some common types Why is cybersecurity important? Why is cybersecurity important? Practical personal and business cybersecurity measures Practical personal and business cybersecurity measures

Cyber Security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the internet by cyber criminals. Cyber Security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the internet by cyber criminals.

Communication security-protecting organization communication technology, media and content. Communication security-protecting organization communication technology, media and content. Network Security- is the protection of networking components, connection and content. Network Security- is the protection of networking components, connection and content. Information Security- The protection of information and its critical elements. This includes the systems and hardware that uses, stores, or transmits information. Information Security- The protection of information and its critical elements. This includes the systems and hardware that uses, stores, or transmits information.

The first recorded cyber crime took place in 1820 The first recorded cyber crime took place in 1820 The first Virus was installed on an Apple computer in 1982 when a high school student developed the EIK Cloner The first Virus was installed on an Apple computer in 1982 when a high school student developed the EIK Cloner The first Spam took place in 1978 when it was sent over the Arpanet The first Spam took place in 1978 when it was sent over the Arpanet

Robert Tappan Morris created the first worm and sent it from MIT to the web and caused $ worth of damages Robert Tappan Morris created the first worm and sent it from MIT to the web and caused $ worth of damages In 1994 Vladimir Levin intruded an American bank computer and stole 10 million dollars In 1994 Vladimir Levin intruded an American bank computer and stole 10 million dollars In 1999 Jonathan James hacked into a NASA computer and had access to data worth over 1.7 million dollars. In 1999 Jonathan James hacked into a NASA computer and had access to data worth over 1.7 million dollars. 46% of companies have admitted to suffering financial losses due to security incidences. The total amount in 2013 was $ million. 46% of companies have admitted to suffering financial losses due to security incidences. The total amount in 2013 was $ million.

Crime committed using a computer and the internet to steal data or information. The computer is used as an object or subject of a crime. Crime committed using a computer and the internet to steal data or information. The computer is used as an object or subject of a crime. The computer could be the target of Cybercrime. Examples: Hacking, virus/worm attacks, DOS attacks ect. The computer could be the target of Cybercrime. Examples: Hacking, virus/worm attacks, DOS attacks ect. The Computer can be used as a weapon to facilitate cyber crime. Examples: Cyber terrorism, Credit card fraud ect The Computer can be used as a weapon to facilitate cyber crime. Examples: Cyber terrorism, Credit card fraud ect Illegal Imports such as copyright violation. Which is material copied from sources that are not public domain or compatibly licensed without the permission of copyright holder. Causes legal issues Illegal Imports such as copyright violation. Which is material copied from sources that are not public domain or compatibly licensed without the permission of copyright holder. Causes legal issues Malicious programs Malicious programs

HACKING HACKING DENIAL OF SERVICE ATTACK DENIAL OF SERVICE ATTACK VIRUS DISSEMINATION VIRUS DISSEMINATION COMPUTER VANDALISM COMPUTER VANDALISM CYBER TERRORISM CYBER TERRORISM SOFTWARE PIRACY SOFTWARE PIRACY FRAUD FRAUD

Hacking means an illegal intrusion into a computer system and/or network Hacking means an illegal intrusion into a computer system and/or network Also known as CRACKING Also known as CRACKING Government websites are the hot target of hackers due to the type of press coverage it receives. Government websites are the hot target of hackers due to the type of press coverage it receives. Main motives for hackers are publicity, revenge, adventure, desire to access forbidden information, overall destructive mindset Main motives for hackers are publicity, revenge, adventure, desire to access forbidden information, overall destructive mindset

This act is committed by the criminal, who floods the bandwidth of the victims network or fills ones box with spam mail depriving an individual of services they are entitled to access or provide. This act is committed by the criminal, who floods the bandwidth of the victims network or fills ones box with spam mail depriving an individual of services they are entitled to access or provide.

Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are programs that attach themselves to a file and then circulate by some channel like . These are programs that attach themselves to a file and then circulate by some channel like .

Terrorist attacks on the internet is by distributed denial of service attacks, hate websites and hate s, attacks on sensitive computer networks. Terrorists that are extremely technology savvy are using 512-bit encryption which is impossible to decrypt. Terrorist attacks on the internet is by distributed denial of service attacks, hate websites and hate s, attacks on sensitive computer networks. Terrorists that are extremely technology savvy are using 512-bit encryption which is impossible to decrypt.

Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.

Malicious software that attaches itself to other software. VIRUS, WORMS, TROJAN HORSE, WEB JACKING, BOMBING ect are all examples. Malicious software that attaches itself to other software. VIRUS, WORMS, TROJAN HORSE, WEB JACKING, BOMBING ect are all examples.

Credit card fraud is the misuse of a credit card to make purchases without authorization or counterfeiting a credit card. Types of credit card fraud are online credit card fraud, advance payments, stolen card numbers. The lack of face-to-face or voice interaction on the Internet provides fraudsters anonymity. Some thieves may go through the trash to find billing statements then use account information to buy things. Advanced payment is someone using a forged or counterfeit check, then an advance or overpayment is made on a stolen credit card. Because the issuer must credit the payment at the time it is made, there is no time to verify the authenticity of the check.

Internet security is a branch of computer security specifically related to the internet. Internet security is a branch of computer security specifically related to the internet. Remember, cybersecurity's objective is to establish rules and measure to use against attacks over the internet. Remember, cybersecurity's objective is to establish rules and measure to use against attacks over the internet.

Defend us from critical attacks Defend us from critical attacks It helps us browse safe websites It helps us browse safe websites Internet security processes all the incoming and outgoing data on our computer Internet security processes all the incoming and outgoing data on our computer Security will defend us from hacks and viruses Security will defend us from hacks and viruses

Use antivirus software's and keep them up to date! Use antivirus software's and keep them up to date! Insert firewalls Insert firewalls Uninstall unnecessary software Uninstall unnecessary software Maintain backup Maintain backup Check security settings Check security settings NEVER give your full name or address to strangers NEVER give your full name or address to strangers Learn more about internet privacy Learn more about internet privacy

Keep your operating system up to date with critical security updates and patches Keep your operating system up to date with critical security updates and patches Never open s or attachments from unknown sources Never open s or attachments from unknown sources Use hard to guess passwords. Try not to use words found in the dictionary. PASSWORD CRACKING TOOLS DO EXIST! Use hard to guess passwords. Try not to use words found in the dictionary. PASSWORD CRACKING TOOLS DO EXIST! Back up your computer data on disks or cds often Back up your computer data on disks or cds often PROTECT WIFI PASSWORD PROTECT WIFI PASSWORD DON’T share access to your computers with strangers DON’T share access to your computers with strangers

For hardware: Tamper-resistant devices, operate a TCB, hardware watermarking For hardware: Tamper-resistant devices, operate a TCB, hardware watermarking For software: Secure coding practice, code obfuscation, secure design and development, formal methods For software: Secure coding practice, code obfuscation, secure design and development, formal methods For network: Firewall, intrusion prevention and detection, VPN, encryption For network: Firewall, intrusion prevention and detection, VPN, encryption

As internet technology advances so does the threat of cyber crime. WE MUST PROTECT OURSELVES FROM CYBER CRIME. As internet technology advances so does the threat of cyber crime. WE MUST PROTECT OURSELVES FROM CYBER CRIME. So BE SAFE, AND LETS EDUCATE OURSELVES when it comes to cyber security. So BE SAFE, AND LETS EDUCATE OURSELVES when it comes to cyber security.

TREAT YOUR PASSWORD LIKE YOU TREAT YOUR TOOTHBRUSH. NEVER GIVE IT TO ANYONE ELSE TO USE AND CHANGE IT EVERY FEW MONTHS. TREAT YOUR PASSWORD LIKE YOU TREAT YOUR TOOTHBRUSH. NEVER GIVE IT TO ANYONE ELSE TO USE AND CHANGE IT EVERY FEW MONTHS.

"2014 State of Risk Report." Trustwave, 1 Jan Web. 6 Apr Balan, L ă cr ă mioara, AND Popescu, Mihai. “Credit card fraud” The USV Annals of Economics and Public Administration [Online], 11 9 Sep Conner, Marcia. "Data on Big Data." Marc!a Conner. 18 July Web. 6 Apr Cybersecurity Basics - Level 3 Whiteboard Video. Level 3 Communications, Film.

Hansen, L. and Nissenbaum, H. (2009), Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly, 53: 1155–1175. doi: /j x Jang-Jaccard, Julian, and Surya Nepal. "A Survey Of Emerging Threats In Cybersecurity." Journal Of Computer And System Sciences 5 (2014): 973. Academic OneFile. Web. 14 Apr Roeder, D. Bruce. "Cybersecurity." Military Review 92.3 (2014): MasterFILE Elite. Web. 14 Apr Schiff, Jennifer L. "6 Biggest Business Security Risks and How You Can Fight Back." CIO. CIO, 20 Jan Web. 6 Apr Superior Ecommerce Analytics. Digital image. Evermerchant. 1 Jan Web.

Walters, Riley. "Cyber Attacks on U.S. Companies in 2014." The Heritage Foundation. The Heritage Foundation, 27 Oct Web. 2 Apr