Presentation is loading. Please wait.

Presentation is loading. Please wait.

A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”

Similar presentations


Presentation on theme: "A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”"— Presentation transcript:

1 A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”

2 INTRODUCTION 2 This tutorial provides some basic information and practical suggestions for protecting your personal information and computer from cyber-attacks. Cyber-safety topics covered include: What is Cyber-safety? Cyber-safety Threats Consequences of Inaction Cyber-safety Actions at Home

3 WHAT IS CYBER SAFETY 3 Cyber-safety is a common term used to describe a set of practices, measures and/or actions you can take to protect personal information and your computer from attacks.

4 Security -The new face of Information Technology Services 4

5 WHAT DO YOU DO ONLINE?

6 Cybercrime : Top 20 Countries 6 India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the Global Cyber Crime.

7 WHY INDIA? 7 A rapidly growing online user base  121 Million Internet Users  65 Million Active Internet Users, up by 28% from 51 million in 2010  50 Million users shop online on Ecommerce and Online Shopping Sites  46+ Million Social Network Users  346 million mobile users had subscribed to Data Packages. Source: IAMAI; Juxt; wearesocial 2011

8 CYBER CRIMES 8 We can categorize Cyber crimes in two ways The Computer as a Target :-using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc. The computer as a weapon :-using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.

9 WHAT ARE CYBER SAFETY THREATS 9 These cyber-safety threats are responsible for various Cyber Crimes Viruses Viruses infect computers through email attachments and file sharing. They delete files, attack other computers, and make your computer run slowly and can cause problem for the whole network.. Hackers Hackers are people who “trespass” into your computer from a remote location. They may use your computer to send spam or viruses, host a Web site and cause computer malfunctions. Identity Thieves People who obtain unauthorized access to your personal information, such as Social Security and financial account numbers. They then use this information to commit crimes such as fraud or theft. Spyware Spyware is software that “piggybacks” on programs you download, gathers information about your online habits, and transmits personal information without your knowledge.

10 Internet Safety Risks 10 Cyberbullying Posting personal /inappropriate information Online Predators Sexting Phishing Cyber terrorism Defamation Sale of illegal articles Online gambling (Lottery) Email spoofing Email Bombing Email spamming Financial Frauds Exposure to inappropriate content


Download ppt "A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”"

Similar presentations


Ads by Google