Cyber security

Samsil Arefin
Samsil ArefinStudent at chandrapara sultania high school à Programming learners club
Cyber security
Contents
What is cyber crime?
 Cyber crime refers to any crime that involves a
computer/mobile and a network. The computer
may have been used in the commission of a
crime, or it may be the target.
 Cyber hackers apply all sorts of techniques
(hacking, use of malware for intercepting data,
etc.) in stealing personal or financial data from
their victims, generally from their computers.
History
 The first spam email took place in 1978 when it was
sent out over the ARPANET (Advanced Research
Projects Agency Network).
 The first virus was installed on an Apple computer by a
high school student, Rich Skrenta in the year 1982.
CYBER THREAT EVOLUTION
Computer as a tool
 When the individual is the main target of the crime the computer can be
considered as a tool rather than target.
 These crimes are not done by technical experts.
 Eg: Spam, cyber stalking , cyber theft etc.
Computer as a target
 These crimes are committed by a selected
group of people with technical knowledge.
 Destruction of information in the
computer by spreading virus.
 Eg : Defacement, cyber terrorism etc.
Defacement
Computer as an instrumentality
 The crime is committed by manipulating the contents of computer
systems.
 With the advent of computer the criminal have started using the
technology as an aid for its perpetuation.
 Eg: money laundering.
Crime associated with prevalence of
computers
 Copyright violation
 Material copied from sources that are not public domain or
compatibly licensed without the permission of copyright holder.
 Copyright violation causes legal issues.
Types of cyber crime
• Financial crimes
• IP spoofing
• Trojan
• Web jacking
• Session Hijacking
• Mail bombing
• Key loggers
Types Of crime
• Financial crime includes credit card frauds, money
laundering, Forgery etc
• Money laundering is the process by which large amount of
illegally obtained money is given the appearance of having
originated from a legitimate source
IP Spoofing – Source Routing
Definition:
Attacker spoofs the address of another machine and inserts
itself between the attacked machine and the spoofed machine
to intercept replies
Replies sent back
to 10.10.20.30
Spoofed Address
10.10.20.30
Attacker
10.10.50.50
John
10.10.5.5
From Address: 10.10.20.30
To Address: 10.10.5.5
Attacker intercepts packets
as they go to 10.10.20.30
Trojan & Web Jacking
• Trojan Horse-A Trojan as this program is aptly called, is an unauthorized program
which functions from inside what seems to be an authorized program, thereby
concealing what it is actually doing.
• Web jacking-This occurs when someone forcefully takes control of a website (by
cracking the password ). The actual owner of the website does not have any more
control over what appears on that website.
Attacker can
monitor the session
periodically inject commands into session
launch passive and active attacks from the session
Session Hijacking
Bob telnets to Server
Bob authenticates to Server
Bob
Attacker
Server
Die! Hi! I am Bob
Mail Bombing
• A mail bomb is the sending of a massive amount of e-mail to a
specific person or system. A huge amount of mail may simply fill
up the recipient's disk space on the server or, in some cases,
may be too much for a server to handle and may cause the
server to stop functioning.
Clickjacking
• Clickjacking is a form of cyber attack where the hacker uses an invisible layer over the
embedded web content (this could be an image, video or button) to intercept and
‘hijack’ you to a mirror website and mine information from you.
Keyloggers
• Keyloggers are regularly used in computers to log all the strokes a victim makes on the
keyboard.
Cyber security
• It is not possible to eliminate cyber crime from the cyber
space. It is quite possible to check them.
• Awareness is the first step in protecting yourself.
• Invest in Anti-virus, Firewall, and SPAM blocking software
for your PC.
• Change passwords on a regular basis
• Use complex passwords (include numbers and special
characters)
Cyber security
• Do not automatically check boxes before reading the
contents of any agreement of the software.
• Avoiding use of unauthorized software.
• Avoid opening of unknown emails.
• Use internet filtering software.
• Data Level Security Using encrypting software's
• Disable remote connectivity (such as Bluetooth)
ADVANTAGES OF CYBER SECURITY
• Defend us from critical attacks.
• Browse the safe website.
• Internet security process all the incoming and outgoing
data on our computer.
Conclusion
Technology is destructive only in the hands of people who do
not realize that they are one and the same process as the
universe.
1 sur 21

Recommandé

cyber security par
cyber securitycyber security
cyber securityBasineniUdaykumar
3.3K vues10 diapositives
Cyber crime and security par
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
2.9K vues19 diapositives
Cyber Security Presentation par
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
4.2K vues8 diapositives
CYBER SECURITY par
CYBER SECURITYCYBER SECURITY
CYBER SECURITYMohammad Shakirul islam
1.8K vues32 diapositives
Cybercrime and Security par
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
1.5K vues26 diapositives
Cyber Crime and Security par
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
2.9K vues12 diapositives

Contenu connexe

Tendances

Cyber security par
Cyber securityCyber security
Cyber securityHarsh verma
14.2K vues11 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityPihu Goel
3.9K vues25 diapositives
Cyber Security Presentation "It Will Never Happen To Me" par
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
2.1K vues19 diapositives
CYBER SECURITY par
CYBER SECURITYCYBER SECURITY
CYBER SECURITYPranjalShah18
1.1K vues22 diapositives
Cybersecurity par
CybersecurityCybersecurity
CybersecurityForam Gosai
1.8K vues30 diapositives
Ppt par
PptPpt
PptGeetu Khanna
1.8K vues18 diapositives

Tendances(20)

Cyber security par Pihu Goel
Cyber securityCyber security
Cyber security
Pihu Goel3.9K vues
Cyber Security Presentation "It Will Never Happen To Me" par Simon Salter
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter2.1K vues
Cyber Security par Ramiro Cid
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid6.6K vues
Cyber Security 03 par Home
Cyber Security 03Cyber Security 03
Cyber Security 03
Home948 vues
Cyber security system presentation par A.S. Sabuj
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj2.2K vues
Introduction to cyber security amos par Amos Oyoo
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo3.2K vues
Cyber crime and security par Sharath Raj
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj2.6K vues
Cyber security par manoj duli
Cyber securityCyber security
Cyber security
manoj duli1.7K vues

En vedette

2 july 2015 sab ki khabren par
2 july 2015 sab ki khabren2 july 2015 sab ki khabren
2 july 2015 sab ki khabrenSantosh Tiwari
246 vues4 diapositives
рождество par
рождестворождество
рождествоdetki
311 vues5356 diapositives
} par
}}
}fkyruasdtr
121 vues3 diapositives
Banking awareness 2014 par
Banking awareness 2014Banking awareness 2014
Banking awareness 2014sanu
378 vues7 diapositives
Allison par
AllisonAllison
Allisonguestc9df88
141 vues5 diapositives
BGREVE - Dec 2016 - Base par
BGREVE - Dec 2016 - BaseBGREVE - Dec 2016 - Base
BGREVE - Dec 2016 - BaseBill Greve
216 vues4 diapositives

En vedette(17)

рождество par detki
рождестворождество
рождество
detki311 vues
Banking awareness 2014 par sanu
Banking awareness 2014Banking awareness 2014
Banking awareness 2014
sanu 378 vues
BGREVE - Dec 2016 - Base par Bill Greve
BGREVE - Dec 2016 - BaseBGREVE - Dec 2016 - Base
BGREVE - Dec 2016 - Base
Bill Greve216 vues
Latin for beginners par Mansour1
Latin for beginnersLatin for beginners
Latin for beginners
Mansour1369 vues
URL 4013 Historisch Parket versie 1.0 - def (gew 161223) par Eric Jongmans
URL 4013 Historisch Parket versie 1.0 - def (gew 161223)URL 4013 Historisch Parket versie 1.0 - def (gew 161223)
URL 4013 Historisch Parket versie 1.0 - def (gew 161223)
Eric Jongmans612 vues
Development and use of selected response item par guevarra_2000
Development and use of selected response itemDevelopment and use of selected response item
Development and use of selected response item
guevarra_2000437 vues
Thinking Laterally to Unlock Your Assets and Enable Development in Hard Times par PurcellUK
Thinking Laterally to Unlock Your Assets and Enable Development in Hard TimesThinking Laterally to Unlock Your Assets and Enable Development in Hard Times
Thinking Laterally to Unlock Your Assets and Enable Development in Hard Times
PurcellUK290 vues
C3 Transformations par JJkedst
C3 TransformationsC3 Transformations
C3 Transformations
JJkedst2.5K vues
Tartalomszolgáltatás a könyvtári honlapokon (Papp József) par Daniel Takacs
Tartalomszolgáltatás a könyvtári honlapokon (Papp József)Tartalomszolgáltatás a könyvtári honlapokon (Papp József)
Tartalomszolgáltatás a könyvtári honlapokon (Papp József)
Daniel Takacs623 vues

Similaire à Cyber security

Cyber crime and security 1 par
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
10.4K vues39 diapositives
Introducion cyber crime and cyber law par
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber lawYagnesh Garud
178 vues23 diapositives
Cyber crime and cyber security par
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
5.2K vues50 diapositives
CYBER CRIME AND SECURITY MAYUR.pptx par
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxMayurSapkale7
61 vues14 diapositives
Cybercrime par
CybercrimeCybercrime
CybercrimeRatnesh Sharma
764 vues16 diapositives
Workshop on Cyber security and investigation par
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigationMehedi Hasan
432 vues96 diapositives

Similaire à Cyber security(20)

Cyber crime and security 1 par indhuchezhian
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian10.4K vues
Introducion cyber crime and cyber law par Yagnesh Garud
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
Yagnesh Garud178 vues
Cyber crime and cyber security par Keshab Nath
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath5.2K vues
CYBER CRIME AND SECURITY MAYUR.pptx par MayurSapkale7
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
MayurSapkale761 vues
Workshop on Cyber security and investigation par Mehedi Hasan
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
Mehedi Hasan432 vues
Ppt on cyber security par Avani Patel
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel42.2K vues
Cyber crimes (By Mohammad Ahmed) par Mohammad Ahmed
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
Mohammad Ahmed1.6K vues
Workshop on Cyber security par Mehedi Hasan
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan101 vues
Computer Security risks Shelly par Adeel Khurram
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram1.7K vues
presentation_cybercrime_1486105587_257582.ppt par JatinRajput67
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
JatinRajput6713 vues

Plus de Samsil Arefin

Transmission Control Protocol and User Datagram protocol par
Transmission Control Protocol and User Datagram protocolTransmission Control Protocol and User Datagram protocol
Transmission Control Protocol and User Datagram protocolSamsil Arefin
301 vues14 diapositives
Evolution Phylogenetic par
Evolution PhylogeneticEvolution Phylogenetic
Evolution PhylogeneticSamsil Arefin
160 vues5 diapositives
Evolution Phylogenetic par
Evolution PhylogeneticEvolution Phylogenetic
Evolution PhylogeneticSamsil Arefin
152 vues24 diapositives
Ego net facebook data analysis par
Ego net facebook data analysisEgo net facebook data analysis
Ego net facebook data analysisSamsil Arefin
463 vues9 diapositives
Augmented Reality (AR) par
Augmented Reality (AR)Augmented Reality (AR)
Augmented Reality (AR)Samsil Arefin
4.2K vues17 diapositives
Client server chat application par
Client server chat applicationClient server chat application
Client server chat applicationSamsil Arefin
3.8K vues15 diapositives

Plus de Samsil Arefin(20)

Transmission Control Protocol and User Datagram protocol par Samsil Arefin
Transmission Control Protocol and User Datagram protocolTransmission Control Protocol and User Datagram protocol
Transmission Control Protocol and User Datagram protocol
Samsil Arefin301 vues
Ego net facebook data analysis par Samsil Arefin
Ego net facebook data analysisEgo net facebook data analysis
Ego net facebook data analysis
Samsil Arefin463 vues
Client server chat application par Samsil Arefin
Client server chat applicationClient server chat application
Client server chat application
Samsil Arefin3.8K vues
Strings in programming tutorial. par Samsil Arefin
Strings  in programming tutorial.Strings  in programming tutorial.
Strings in programming tutorial.
Samsil Arefin156 vues
Linked list searching deleting inserting par Samsil Arefin
Linked list searching deleting insertingLinked list searching deleting inserting
Linked list searching deleting inserting
Samsil Arefin71 vues
Program to sort the n names in an alphabetical order par Samsil Arefin
Program to sort the n names in an alphabetical orderProgram to sort the n names in an alphabetical order
Program to sort the n names in an alphabetical order
Samsil Arefin186 vues
Linked list Output tracing par Samsil Arefin
Linked list Output tracingLinked list Output tracing
Linked list Output tracing
Samsil Arefin1.1K vues
Fundamentals of-electric-circuit par Samsil Arefin
Fundamentals of-electric-circuitFundamentals of-electric-circuit
Fundamentals of-electric-circuit
Samsil Arefin1.7K vues
Structure in programming in c or c++ or c# or java par Samsil Arefin
Structure in programming  in c or c++ or c# or javaStructure in programming  in c or c++ or c# or java
Structure in programming in c or c++ or c# or java
Samsil Arefin386 vues

Dernier

DESIGN OF SPRINGS-UNIT4.pptx par
DESIGN OF SPRINGS-UNIT4.pptxDESIGN OF SPRINGS-UNIT4.pptx
DESIGN OF SPRINGS-UNIT4.pptxgopinathcreddy
21 vues47 diapositives
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... par
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...csegroupvn
8 vues210 diapositives
MK__Cert.pdf par
MK__Cert.pdfMK__Cert.pdf
MK__Cert.pdfHassan Khan
19 vues1 diapositive
Searching in Data Structure par
Searching in Data StructureSearching in Data Structure
Searching in Data Structureraghavbirla63
17 vues8 diapositives
Renewal Projects in Seismic Construction par
Renewal Projects in Seismic ConstructionRenewal Projects in Seismic Construction
Renewal Projects in Seismic ConstructionEngineering & Seismic Construction
5 vues8 diapositives
REACTJS.pdf par
REACTJS.pdfREACTJS.pdf
REACTJS.pdfArthyR3
37 vues16 diapositives

Dernier(20)

Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... par csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn8 vues
REACTJS.pdf par ArthyR3
REACTJS.pdfREACTJS.pdf
REACTJS.pdf
ArthyR337 vues
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf par AlhamduKure
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
AlhamduKure8 vues
Ansari: Practical experiences with an LLM-based Islamic Assistant par M Waleed Kadous
Ansari: Practical experiences with an LLM-based Islamic AssistantAnsari: Practical experiences with an LLM-based Islamic Assistant
Ansari: Practical experiences with an LLM-based Islamic Assistant
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth par Innomantra
BCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for GrowthBCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for Growth
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth
Innomantra 15 vues
_MAKRIADI-FOTEINI_diploma thesis.pptx par fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi12 vues
GDSC Mikroskil Members Onboarding 2023.pdf par gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil63 vues
Créativité dans le design mécanique à l’aide de l’optimisation topologique par LIEGE CREATIVE
Créativité dans le design mécanique à l’aide de l’optimisation topologiqueCréativité dans le design mécanique à l’aide de l’optimisation topologique
Créativité dans le design mécanique à l’aide de l’optimisation topologique
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx par lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78180 vues

Cyber security

  • 3. What is cyber crime?  Cyber crime refers to any crime that involves a computer/mobile and a network. The computer may have been used in the commission of a crime, or it may be the target.  Cyber hackers apply all sorts of techniques (hacking, use of malware for intercepting data, etc.) in stealing personal or financial data from their victims, generally from their computers.
  • 4. History  The first spam email took place in 1978 when it was sent out over the ARPANET (Advanced Research Projects Agency Network).  The first virus was installed on an Apple computer by a high school student, Rich Skrenta in the year 1982.
  • 6. Computer as a tool  When the individual is the main target of the crime the computer can be considered as a tool rather than target.  These crimes are not done by technical experts.  Eg: Spam, cyber stalking , cyber theft etc.
  • 7. Computer as a target  These crimes are committed by a selected group of people with technical knowledge.  Destruction of information in the computer by spreading virus.  Eg : Defacement, cyber terrorism etc. Defacement
  • 8. Computer as an instrumentality  The crime is committed by manipulating the contents of computer systems.  With the advent of computer the criminal have started using the technology as an aid for its perpetuation.  Eg: money laundering.
  • 9. Crime associated with prevalence of computers  Copyright violation  Material copied from sources that are not public domain or compatibly licensed without the permission of copyright holder.  Copyright violation causes legal issues.
  • 10. Types of cyber crime • Financial crimes • IP spoofing • Trojan • Web jacking • Session Hijacking • Mail bombing • Key loggers
  • 11. Types Of crime • Financial crime includes credit card frauds, money laundering, Forgery etc • Money laundering is the process by which large amount of illegally obtained money is given the appearance of having originated from a legitimate source
  • 12. IP Spoofing – Source Routing Definition: Attacker spoofs the address of another machine and inserts itself between the attacked machine and the spoofed machine to intercept replies Replies sent back to 10.10.20.30 Spoofed Address 10.10.20.30 Attacker 10.10.50.50 John 10.10.5.5 From Address: 10.10.20.30 To Address: 10.10.5.5 Attacker intercepts packets as they go to 10.10.20.30
  • 13. Trojan & Web Jacking • Trojan Horse-A Trojan as this program is aptly called, is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing. • Web jacking-This occurs when someone forcefully takes control of a website (by cracking the password ). The actual owner of the website does not have any more control over what appears on that website.
  • 14. Attacker can monitor the session periodically inject commands into session launch passive and active attacks from the session Session Hijacking Bob telnets to Server Bob authenticates to Server Bob Attacker Server Die! Hi! I am Bob
  • 15. Mail Bombing • A mail bomb is the sending of a massive amount of e-mail to a specific person or system. A huge amount of mail may simply fill up the recipient's disk space on the server or, in some cases, may be too much for a server to handle and may cause the server to stop functioning.
  • 16. Clickjacking • Clickjacking is a form of cyber attack where the hacker uses an invisible layer over the embedded web content (this could be an image, video or button) to intercept and ‘hijack’ you to a mirror website and mine information from you.
  • 17. Keyloggers • Keyloggers are regularly used in computers to log all the strokes a victim makes on the keyboard.
  • 18. Cyber security • It is not possible to eliminate cyber crime from the cyber space. It is quite possible to check them. • Awareness is the first step in protecting yourself. • Invest in Anti-virus, Firewall, and SPAM blocking software for your PC. • Change passwords on a regular basis • Use complex passwords (include numbers and special characters)
  • 19. Cyber security • Do not automatically check boxes before reading the contents of any agreement of the software. • Avoiding use of unauthorized software. • Avoid opening of unknown emails. • Use internet filtering software. • Data Level Security Using encrypting software's • Disable remote connectivity (such as Bluetooth)
  • 20. ADVANTAGES OF CYBER SECURITY • Defend us from critical attacks. • Browse the safe website. • Internet security process all the incoming and outgoing data on our computer.
  • 21. Conclusion Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.