You are on page 1of 23

Cyber crime

&
Security

Prepared by : Rughani Zarana


What is cyber security?
 Cyber security standards are security standards which enable
organizations to practice safe security techniques to
minimize the number of successful cyber security attacks.

 Cyber security refers to the technologies and processes


designed to protect computers, networks and data from
unauthorized access, vulnerabilities and attacks delivered via
the Internet by cyber criminals.

 Though, cyber security is important for network, data and


application security.
What is…?
 Communication security-protecting organization
communication media , technology , and content.

 Network security-is the protection of networking


components, connection and content.

 Information security-protection of information and its


critical elements , including the systems and hardware
that use , store or transmit that information.
What is cyber crime?

 Cyber crime is an activity done using computers


and internet. We can say that it is an unlawful acts
wherein the computer either a tool or target or
both.
History
 Thefirst cyber crime was recorded in the year
1820.

 Thefirst spam email took place in 1978 when it


was sent over the Arpanet.

 The
first Virus was installed on an Apple
Computer in 1982.
Cyber crimes includes

 Illegal access
 Illegal Interception
 System Interference
 Data Interference
 Misuse of devices
 Fraud
Types of Cyber attacks, by
percentage (source- FBI)
 Financial fraud: 11%
 Sabotage of data/networks: 17%
 Theft of proprietary information: 20%
 System penetration from the outside: 25%
 Denial of service: 27%
 Unauthorized access by insiders: 71%
 Employee abuse of internet privileges 79%
 Viruses: 85%
Categorize of Cybercrime
 The Computer as a Target :
 using a computer to attack other
computers.
 The computer as a weapon :
 using a computer to commit real
world crimes.
Types of cyber crime

 HACKING
 DENIAL OF SERVICE ATTACK
 VIRUS DISSEMINITION
 COMPUTER VANDALISM
 CYBER TERRORISM
 SOFTWARE PIRACY
Hacking

 Hacking in simple terms means an


illegal intrusion into a computer
system and/or network. It is also
known as CRACKING.

 Government websites are the hot


targets of the hackers due to the
press coverage, it receives.
Hackers enjoy the media coverage.
DENIAL OF SERVICE ATTACK

 This is an act by the


criminal, who floods the
bandwidth of the victims
network or fills his e-mail
box with spam mail
depriving him of the
services he is entitled to
access or provide.
VIRUS DISSEMINITION

 Malicious software that


attaches itself to other
software or computer system
and then propagates itself to
other computers via networks
or disks.
 (virus, worms, Trojan Horse,
web jacking, e-mail bombing
etc).
COMPUTER VANDALISM

 Damaging or destroying
data rather than stealing
or misusing them is called
cyber vandalism.
Transmitting virus: These
are programs that attach
themselves to a file and
then circulate .
CYBER TERRORISM

 Terrorist attacks on the


Internet is by distributed
denial of service attacks,
hate websites and hate
emails, attacks on sensitive
computer networks, etc.
 Technology savvy
terrorists are using 512-bit
encryption, which is
impossible to decrypt.
SOFTWARE PIRACY

 Theft of software through


the illegal copying of
genuine programs or the
counterfeiting and
distribution of products
intended to pass for the
original.
Why should we care?
 It is a criminal activity committed on the internet.

 Cyber crime-Where computer is either a tool or


target or both.
How can we protect?
 Read Privacy policy carefully when you submit the
data through internet.

 Encryption: lots of website uses SSL (secure


socket layer)to encrypt a data.

 Disable remote connectivity.


Advantage of cyber
security
 It will defend from hacks and virus.

 The application of cyber security used in our PC


needs update every week.

 The security developers will update their database


every week once. Hence the new virus also
deleted.
Safety tips …
 Use antivirus software
 Insert firewalls , pop up blocker
 Uninstall unnecessary software
 Maintain backup
 Check security settings
 Use secure connection
 Open attachments carefully
 Use strong passwords , don’t give personal information
unless required
CYBER LAW OF INDIA
 Cyber crime can involve criminal activities
that are traditional in nature, such as theft,
fraud, deformation and mischief, all of which
are subjected to the India Penal code. In
simple way we can say that cyber crime is
unlawful acts where in the computer is either
a tool or both.
 The abuse of computer has also given birth
of new age crime that are addressed by the
Information Technology Act, 2000.
Conclusion
 Theonly system which is truly secure is
one which is switched off and unplugged.

 So, only way to be safe is Pay attention


and Act smart.

THANK YOU

You might also like