Download presentation
Presentation is loading. Please wait.
Published byBarbara Mills Modified over 9 years ago
1
CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba
2
Brief overview on cybersecurity and some history Brief overview on cybersecurity and some history Cybercrime and some common types Cybercrime and some common types Why is cybersecurity important? Why is cybersecurity important? Practical personal and business cybersecurity measures Practical personal and business cybersecurity measures
3
Cyber Security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the internet by cyber criminals. Cyber Security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the internet by cyber criminals.
4
Communication security-protecting organization communication technology, media and content. Communication security-protecting organization communication technology, media and content. Network Security- is the protection of networking components, connection and content. Network Security- is the protection of networking components, connection and content. Information Security- The protection of information and its critical elements. This includes the systems and hardware that uses, stores, or transmits information. Information Security- The protection of information and its critical elements. This includes the systems and hardware that uses, stores, or transmits information.
5
The first recorded cyber crime took place in 1820 The first recorded cyber crime took place in 1820 The first Virus was installed on an Apple computer in 1982 when a high school student developed the EIK Cloner The first Virus was installed on an Apple computer in 1982 when a high school student developed the EIK Cloner The first Spam email took place in 1978 when it was sent over the Arpanet The first Spam email took place in 1978 when it was sent over the Arpanet
6
Robert Tappan Morris created the first worm and sent it from MIT to the web and caused $50.000 worth of damages Robert Tappan Morris created the first worm and sent it from MIT to the web and caused $50.000 worth of damages In 1994 Vladimir Levin intruded an American bank computer and stole 10 million dollars In 1994 Vladimir Levin intruded an American bank computer and stole 10 million dollars In 1999 Jonathan James hacked into a NASA computer and had access to data worth over 1.7 million dollars. In 1999 Jonathan James hacked into a NASA computer and had access to data worth over 1.7 million dollars. 46% of companies have admitted to suffering financial losses due to security incidences. The total amount in 2013 was $781.84 million. 46% of companies have admitted to suffering financial losses due to security incidences. The total amount in 2013 was $781.84 million.
7
Crime committed using a computer and the internet to steal data or information. The computer is used as an object or subject of a crime. Crime committed using a computer and the internet to steal data or information. The computer is used as an object or subject of a crime. The computer could be the target of Cybercrime. Examples: Hacking, virus/worm attacks, DOS attacks ect. The computer could be the target of Cybercrime. Examples: Hacking, virus/worm attacks, DOS attacks ect. The Computer can be used as a weapon to facilitate cyber crime. Examples: Cyber terrorism, Credit card fraud ect The Computer can be used as a weapon to facilitate cyber crime. Examples: Cyber terrorism, Credit card fraud ect Illegal Imports such as copyright violation. Which is material copied from sources that are not public domain or compatibly licensed without the permission of copyright holder. Causes legal issues Illegal Imports such as copyright violation. Which is material copied from sources that are not public domain or compatibly licensed without the permission of copyright holder. Causes legal issues Malicious programs Malicious programs
8
HACKING HACKING DENIAL OF SERVICE ATTACK DENIAL OF SERVICE ATTACK VIRUS DISSEMINATION VIRUS DISSEMINATION COMPUTER VANDALISM COMPUTER VANDALISM CYBER TERRORISM CYBER TERRORISM SOFTWARE PIRACY SOFTWARE PIRACY FRAUD FRAUD
9
Hacking means an illegal intrusion into a computer system and/or network Hacking means an illegal intrusion into a computer system and/or network Also known as CRACKING Also known as CRACKING Government websites are the hot target of hackers due to the type of press coverage it receives. Government websites are the hot target of hackers due to the type of press coverage it receives. Main motives for hackers are publicity, revenge, adventure, desire to access forbidden information, overall destructive mindset Main motives for hackers are publicity, revenge, adventure, desire to access forbidden information, overall destructive mindset
10
This act is committed by the criminal, who floods the bandwidth of the victims network or fills ones e-mail box with spam mail depriving an individual of services they are entitled to access or provide. This act is committed by the criminal, who floods the bandwidth of the victims network or fills ones e-mail box with spam mail depriving an individual of services they are entitled to access or provide.
11
Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are programs that attach themselves to a file and then circulate by some channel like email. These are programs that attach themselves to a file and then circulate by some channel like email.
12
Terrorist attacks on the internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks. Terrorists that are extremely technology savvy are using 512-bit encryption which is impossible to decrypt. Terrorist attacks on the internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks. Terrorists that are extremely technology savvy are using 512-bit encryption which is impossible to decrypt.
13
Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
14
Malicious software that attaches itself to other software. VIRUS, WORMS, TROJAN HORSE, WEB JACKING, EMAIL BOMBING ect are all examples. Malicious software that attaches itself to other software. VIRUS, WORMS, TROJAN HORSE, WEB JACKING, EMAIL BOMBING ect are all examples.
15
Credit card fraud is the misuse of a credit card to make purchases without authorization or counterfeiting a credit card. Types of credit card fraud are online credit card fraud, advance payments, stolen card numbers. The lack of face-to-face or voice interaction on the Internet provides fraudsters anonymity. Some thieves may go through the trash to find billing statements then use account information to buy things. Advanced payment is someone using a forged or counterfeit check, then an advance or overpayment is made on a stolen credit card. Because the issuer must credit the payment at the time it is made, there is no time to verify the authenticity of the check.
16
Internet security is a branch of computer security specifically related to the internet. Internet security is a branch of computer security specifically related to the internet. Remember, cybersecurity's objective is to establish rules and measure to use against attacks over the internet. Remember, cybersecurity's objective is to establish rules and measure to use against attacks over the internet.
18
Defend us from critical attacks Defend us from critical attacks It helps us browse safe websites It helps us browse safe websites Internet security processes all the incoming and outgoing data on our computer Internet security processes all the incoming and outgoing data on our computer Security will defend us from hacks and viruses Security will defend us from hacks and viruses
19
Use antivirus software's and keep them up to date! Use antivirus software's and keep them up to date! Insert firewalls Insert firewalls Uninstall unnecessary software Uninstall unnecessary software Maintain backup Maintain backup Check security settings Check security settings NEVER give your full name or address to strangers NEVER give your full name or address to strangers Learn more about internet privacy Learn more about internet privacy
20
Keep your operating system up to date with critical security updates and patches Keep your operating system up to date with critical security updates and patches Never open emails or attachments from unknown sources Never open emails or attachments from unknown sources Use hard to guess passwords. Try not to use words found in the dictionary. PASSWORD CRACKING TOOLS DO EXIST! Use hard to guess passwords. Try not to use words found in the dictionary. PASSWORD CRACKING TOOLS DO EXIST! Back up your computer data on disks or cds often Back up your computer data on disks or cds often PROTECT WIFI PASSWORD PROTECT WIFI PASSWORD DON’T share access to your computers with strangers DON’T share access to your computers with strangers
21
For hardware: Tamper-resistant devices, operate a TCB, hardware watermarking For hardware: Tamper-resistant devices, operate a TCB, hardware watermarking For software: Secure coding practice, code obfuscation, secure design and development, formal methods For software: Secure coding practice, code obfuscation, secure design and development, formal methods For network: Firewall, intrusion prevention and detection, VPN, encryption For network: Firewall, intrusion prevention and detection, VPN, encryption
22
As internet technology advances so does the threat of cyber crime. WE MUST PROTECT OURSELVES FROM CYBER CRIME. As internet technology advances so does the threat of cyber crime. WE MUST PROTECT OURSELVES FROM CYBER CRIME. So BE SAFE, AND LETS EDUCATE OURSELVES when it comes to cyber security. So BE SAFE, AND LETS EDUCATE OURSELVES when it comes to cyber security.
23
TREAT YOUR PASSWORD LIKE YOU TREAT YOUR TOOTHBRUSH. NEVER GIVE IT TO ANYONE ELSE TO USE AND CHANGE IT EVERY FEW MONTHS. TREAT YOUR PASSWORD LIKE YOU TREAT YOUR TOOTHBRUSH. NEVER GIVE IT TO ANYONE ELSE TO USE AND CHANGE IT EVERY FEW MONTHS.
24
"2014 State of Risk Report." Trustwave, 1 Jan. 2014. Web. 6 Apr. 2015.. Balan, L ă cr ă mioara, AND Popescu, Mihai. “Credit card fraud” The USV Annals of Economics and Public Administration [Online], 11 9 Sep 2011. Conner, Marcia. "Data on Big Data." Marc!a Conner. 18 July 2013. Web. 6 Apr. 2015. Cybersecurity Basics - Level 3 Whiteboard Video. Level 3 Communications, 2012. Film.
25
Hansen, L. and Nissenbaum, H. (2009), Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly, 53: 1155–1175. doi: 10.1111/j.1468-2478.2009.00572.x Jang-Jaccard, Julian, and Surya Nepal. "A Survey Of Emerging Threats In Cybersecurity." Journal Of Computer And System Sciences 5 (2014): 973. Academic OneFile. Web. 14 Apr. 2015. Roeder, D. Bruce. "Cybersecurity." Military Review 92.3 (2014): 38- 42. MasterFILE Elite. Web. 14 Apr. 2015. Schiff, Jennifer L. "6 Biggest Business Security Risks and How You Can Fight Back." CIO. CIO, 20 Jan. 2015. Web. 6 Apr. 2015. Superior Ecommerce Analytics. Digital image. Evermerchant. 1 Jan. 2015. Web.
26
Walters, Riley. "Cyber Attacks on U.S. Companies in 2014." The Heritage Foundation. The Heritage Foundation, 27 Oct. 2014. Web. 2 Apr. 2015.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.