Cyber Security. Objectives To understand: 1.Definition of Cyber Crime 2.Classification of Cyber crimes 3.Computer Intrusions and Hacking 4.Computer Security.

Slides:



Advertisements
Similar presentations
SECURITY CHECK Protecting Your System and Yourself Source:
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Cyber Crime.
Unit 18 Data Security 1.
Security, Privacy, and Ethics Online Computer Crimes.
Cyber X-Force-SMS alert system for threats.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Wonga example Register Question- What risks do you think businesses face due to IT developments?
CYBER CRIME AND SECURITY TRENDS
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Viruses & Destructive Programs
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Chapter 11 Security and Privacy: Computers and the Internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Cyber crime & Security Prepared by : Rughani Zarana.
Staying Safe Online Keep your Information Secure.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
CYBER CRIME.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Types of Electronic Infection
Introduction to Computer Security PA Turnpike Commission.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Presented by Presented by Daniel Lawrence Delgado CITCS BSIT 1-D.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
IT Security  .
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
COMPUTER CRIME.
UNIT 18 Data Security 1.
Information Systems for Health:
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Cyber Security

Objectives To understand: 1.Definition of Cyber Crime 2.Classification of Cyber crimes 3.Computer Intrusions and Hacking 4.Computer Security 2

Cybercrime also known as Computer crime, refers to any crime that involves a computer/mobile and a network. The computer may have been used in the commission of a crime, or it may be the target. [ [ 2] Netcrime is criminal exploitation of the internet. [3 [3 ] Experts defined Cybercrime as "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, s, notice boards and groups) and mobile phones (SMS/MMS)". [4] [4] Such crimes may threaten a nation’s security and financial health. [5] [5] Cyber Crime 3

A simple yet sturdy definition of cyber crime would be “unlawful acts wherein the computer is either a tool or a target or both” Cyber Crime 4

Where computers are used to commit crime: Threatening Assuming someone’s identity Defamation (damaging the good reputation of someone) SPAM and Phishing Where computers become target of crime: Viruses and worms Industrial espionage (the practice of spying to obtain information) Software piracy Hacking Classification of Cyber Crimes 5

Where computers are used to commit crime This category includes traditional offenses such as fraud committed through the use of a computer such as: 1. Financial Crime 2.Online Gambling 3.Intellectual Property Crimes 4. spoofing 5.Cyber defamation 6.Cyber stalking (threatening s) Classification of Cyber Crimes 6

This would include cheating, credit card frauds, money laundering etc. 1. Financial crimes 7

There are millions of websites; all hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering. 2. Online gambling 8

These include software piracy, copyright infringement, trademarks violations, theft of computer source code etc. 3. Intellectual Property crimes 9

A spoofed is one that appears to originate from one source but actually has been sent from another source. 4. spoofing 10

This occurs when defamation takes place with the help of computers and / or the Internet. Example: Someone publishes defamatory matter about someone on a website or sends s containing defamatory information to all of that person's contacts. 5. Cyber Defamation 11

Cyber stalking involves: following a person's movements across the Internet by posting messages Entering the chat-rooms frequented by the victim Constantly bombarding the victim with s etc. 6. Cyber stalking 12

Where computers become target of crime A. Unauthorized Access(Hacking) B.Malicious Software(Viruses, Trojans- corrupts server) C.Worm (Self-replicating programs) D.Spyware – parasitic software, invades privacy, E.Divulging details through tracking cookies. F.Cyber terrorism Classification of Cyber Crimes 13

Also known as Hacking. Involves gaining access illegally to a computer system or network and in some cases making unauthorized use of this access. Hacking is also the act by which other forms of cyber-crime (e.g., fraud, terrorism) are committed. Unauthorized Access 14

Hacking Additional Information 15

Theft of any information contained in electronic form such as that stored in computer hard disks, removal storage media, etc. Can extend to identity theft. Theft of information 16

This refers to sending large number of s to the victim resulting in the victim's account (in case of an individual) or mail servers (in case of a company or an service provider) crashing. Bombing 17

These attacks are often used in committing financial crime and are based on the idea that an alteration, so insignificant, would go completely unnoticed in a single case. E.g. A bank employee inserts a program, into the bank's servers, that deducts a small amount of money (say 5 cents a month) from the account of every customer. This unauthorized debt is likely to go unnoticed by an account holder. Salami Attacks 18

This involves flooding a computer resource with more requests than it can handle, causing the resource (e.g. a web server) to crash thereby denying authorized users the service offered by the resource. Denial of Service (DNS) Attack 19

Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Virus 20

These are event dependent programs where programs kick into action only when a certain event (known as a trigger event) occurs. Some viruses may be termed logic bombs because they lie dormant throughout the year and become active only on a particular date (e.g. Chernobyl virus). Logic Bombs 21

An unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing. Trojan Attacks 22

Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory. Worm 23

This occurs when someone forcefully takes control of a website (by cracking the password and later changing it). Web Jacking 24

Hacking designed to cause terror. Like conventional terrorism, `e-terrorism' utilizes hacking to cause violence against persons or property, or at least cause enough harm to generate fear. Cyber-Terrorism 25

Computer security (also known as cyber security or IT security) is information security as applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the Internet as a whole. Computer Security is the protection of computing systems and the data that they store or access. Computer Security covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters. Computer Security 26

Enabling people to carry out their jobs, education, and research. Supporting critical business process. Protecting personal and sensitive information. Why is Computer Security Important? 27

Good Security Standards follow the "90 / 10" Rule: 10% of security safeguards are technical. 90% of security safeguards rely on the computer user ("YOU") to adhere to good computing practices  Example: The lock on the door is the 10%. You remembering to lock the lock, checking to see if the door is closed, ensuring others do not prop the door open, keeping control of the keys, etc. is the 90%. You need both parts for effective security. Why do I need to learn about Computer Security? 28

Many cyber security threats are largely avoidable. Some key steps that everyone can take include: —Use good, cryptic passwords that can't be easily guessed and keep your passwords secret —Make sure your operating system and applications are protected with all necessary security patches and updates —Make sure your computer is protected with up-to-date antivirus and anti-spyware software —Don't click on unknown or unsolicited links or attachments, and don't download unknown files or programs onto your computer Simple measures to be followed… 29

—Remember that information and passwords sent via standard, unencrypted wireless are especially easy for hackers to intercept To help reduce the risk, look for https in the URL before you enter any sensitive information or a password. Also avoid standard, unencrypted and unencrypted Instant Messaging (IM) if you are concerned about privacy Simple measures to be followed… 30

Risk to security and integrity of personal or confidential information – e.g. identity theft, data corruption or destruction, unavailability of critical information in an emergency, etc. Loss of valuable business information Loss of employee and public trust, embarrassment, bad publicity, media coverage, news reports Internal disciplinary action(s) up to and including termination of employment, as well as possible penalties, prosecution and the potential for sanctions / lawsuits What are the consequences for security violations? 31