Cyber_Crime_Security.pptx

Cyber Crime & Security
Sanjeev Pokharel
MScIT-III
What is Cyber Crime?
• Cyber Crime is a term used to broadly describe criminal activity in
which computers or computer networks are a tool, a target, or a
place of criminal activity and include everything from electronic
cracking to denial of service attacks.
• Crime committed using a computer and the internet to steal a
person’s identity or illegal imports or malicious programs
• Cybercrime is nothing but where the computer used as an object or
subject of crime.
Definition of Cyber Crime
• According to Electronic Transaction Act of Nepal
Theft of computer source code,
Unauthorized access to computer system,
Destructing the computer and computer system,
Illegal publication,
Violation of privacy ,
Providing wrong information,
Compute fraud etc
– are known as computer (cyber) crime.
CYBER LAW
Electronic Transaction Act (ETA)
encompasses laws relating to:
I. Electronic and Digital Signatures
II. Computer Crime
III. Intellectual Property
IV. Data Protection and Privacy
V. Telecommunications Laws
• The Computer as a Weapon :
– using a computer (ICT resources) to attack other
computers.
• Pornography,
• Threatening Email,
• Assuming someone's Identity,
• Sexual Harassment,
• Defamation,
• Spam and Phishing
• The computer as a Target :
– using a computer to commit real world crimes.
• Viruses,
• Worms and Industrial Espionage,
• Software Piracy and
• Hacking
– Financial fraud
– Sabotage / disrupt of data/networks
– Theft of proprietary information
– System penetration from the outside
– Denial of service/Making Service Unavailable
– Unauthorized access by insiders
– Employee abuse of internet privileges
– Injection of Viruses
• type of activity performed by the intruder
Manipulate data integrity
Installed a sniffer
Stole password files
Proving/scanning systems
Trojan logons
IP spoofing
Introduced virus
Denied use of services
CYBER CRIME
• HACKING
• CHILD PORNOGRAPHY
• DENIAL OF SERVICE ATTACK
• VIRUS DISSEMINITION
• COMPUTER VANDALISM
• CYBER TERRORISM
• SOFTWARE PIRACY
• PHISHING
• CYBER STALKING
Hacking in simple terms
means an illegal intrusion
into a computer system
and/or network. It is also
known as CRACKING.
Government websites are
the hot targets of the
hackers due to the press
coverage, it receives.
Hackers enjoy the media
coverage.
The Internet is being highly used by its abusers to reach
and abuse children sexually, worldwide. As more homes
have access to internet, more children would be using
the internet and more are the chances of falling victim to
the aggression of pedophiles.
• This is an act by the criminal, who floods the bandwidth
of the victims network or fills his e-mail box with spam
mail depriving him of the services he is entitled to access
or provide
Malicious software that attaches itself to other software. (virus,
worms, Trojan Horse, web jacking, e-mail bombing etc)
Cyber_Crime_Security.pptx
 Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism.
 Transmitting virus:
These are programs that attach themselves to a file and then
circulate .
 Terrorist attacks on the Internet is by distributed denial
of service attacks, hate websites and hate emails,
attacks on sensitive computer networks, etc.
 Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of
products intended to pass for the original.
Phishing
• Phishing is just one of the many frauds on the Internet,
trying to fool people into parting with their money.
• Phishing refers to the receipt of unsolicited emails by
customers of Financial Institutions, requesting them to
enter their Username, Password or other personal
information to access their Account for some reason.
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
Cyber Stalking
 Cyber Stalking is use of the Internet or other electronic
means to track someone.
 This term is used interchangeably with online harassment
and online abuse.
 Stalking generally involves harassing or threatening
behaviour that an individual engages in repeatedly, such as
following a person, appearing at a person's home or place of
business, making harassing phone calls, leaving written
messages or objects, or vandalizing a person's property.
Nepali Crime Scene
The major Cyber Crimes reported, in Nepal, are
Defacement of Websites,
Spam,
Computer Virus and Worms,
Pornography,
VOIP Call Bypass,
 Creation/design of Fake /Duplicate documents ,
Phishing and
Fake Social Networking Users ID(fake facebook id in
facebook)
Bank ATM Fraud
• Internet security is a branch
of computer security specifically
related to the Internet.
• It's objective is to establish rules
and measure to use against
attacks over the Internet.
Cyber_Crime_Security.pptx
• Use antivirus software’s
• insert firewalls
• uninstall unnecessary software
• maintain backup
• check security settings
• Stay anonymous - choose a genderless screen name
• Never give your full name or address to strangers
• Don't respond to harassing or
negative messages (flames)
• Save offending messages
• Learn more about Internet
privacy
• Treat your laptop/Computer like
cash
• Cryptography and digital
signature
• Cyber Ethics and Laws
• Get out of uncomfortable or
hostile situations quickly
Contd…
• Remember that any email or instant message you send
could come back to haunt you
• Lock it when you leave it
• If you access the Internet from a shared computer,
make sure you don't leave anything behind
• Don't check the "remember my password" box.
• When you're done, make sure you log off completely by clicking
the "log off" button before you walk away.
• If possible, clear the browser cache and history.
• Trash all documents you used, and empty the recycle bin.
• Don't reply to unsolicited email messages (spam)
Contd…
• Don't Trust Links Sent in Email Messages
– Stop. Think. Click
• If you suspect malware is on your computer
– Stop, Confirm, Scan
• Backup important files on a regular basis
• Don't click on links in pop-ups or banner
advertisements
The Most Dangerous Things You Can Do
• Opening attachments from unknown
senders
• Installing unauthorized applications
• Disabling security tools.
• Giving/lending passwords
• Wireless networks are a huge risk
• Filling in web forms and registration pages
• Avoid social networking sites
Top Password Tips
• Never tell your password to anyone
• Never write down your password
• Make your password hard to guess — do not
use the name of your pet (or your child).
• Avoid using words found in a dictionary.
• Be sure that you don't use personal identifiers
in your password
• The cyber security will defend us from critical attacks.
• It helps us to browse the safe website.
• Internet security process all the incoming and outgoing
data on our computer.
• security will defend from hacks and virus.
• The application of cyber security used in our PC needs
update every week.
• The security developers will update their database every
week once. Hence the new virus also deleted
Cyber Security Strategies- Nepal
• Legal Framework
– IT Policy 2067
– Electronic Transaction Act 2063
– Telecommunication Act 1997
– Secure Password Practices 2067
• Institutional Development
– Ministry of Science Technology and Environment(MoSTE)
– Department of Information Technology(DOIT)
– Office of Controller of Certification(OCC)
– Cyber Forensics Lab
– National Information Technology Centre (NITC)
– Cyber Cell – Hanuman Dhoka
– CIB
– ITERT(Information Technology Emergency Response Team) –Under study
Conclusion
• Cyber Law of Nepal is well drafted and are capable of
handling all kinds of challenges as posed by cyber criminals.
• As internet technology advances so does the threat of cyber
crime.
• In times like these we must protect ourselves from cyber
crime. Anti-virus software, firewalls and security patches are
just the beginning.
• Never open suspicious e-mails and only navigate to trusted
sites.
• If possible Use Digital Signature for every electronic
Transactions
Cyber_Crime_Security.pptx
1 sur 33

Recommandé

Cyber Crime par
Cyber CrimeCyber Crime
Cyber Crimeshubham ghimire
23.4K vues38 diapositives
Cyber Security and Cyber Awareness par
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
846 vues26 diapositives
CYBER CRIME AND SECURITY par
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
666 vues33 diapositives
Cyber Crime par
Cyber CrimeCyber Crime
Cyber CrimeAnimesh Shaw
2K vues29 diapositives
Cyber Security in Society par
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
5.9K vues23 diapositives
Cybercrimes par
CybercrimesCybercrimes
CybercrimesShareb Ismaeel
169 vues20 diapositives

Contenu connexe

Similaire à Cyber_Crime_Security.pptx

Cyber crime presentation par
Cyber crime presentation Cyber crime presentation
Cyber crime presentation Priya Saluja
3.9K vues13 diapositives
Cybercrime par
CybercrimeCybercrime
CybercrimeVansh Verma
154 vues30 diapositives
cybersecurityawareness-presentation-170627121043.pdf par
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
10 vues14 diapositives
Cyber security awareness presentation par
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
2.2K vues14 diapositives
Cyber crime-140128140443-phpapp02 (1) par
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
3.6K vues22 diapositives
Chapter 3 par
Chapter 3Chapter 3
Chapter 3anas_desa
272 vues22 diapositives

Similaire à Cyber_Crime_Security.pptx(20)

Cyber crime presentation par Priya Saluja
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
Priya Saluja3.9K vues
cybersecurityawareness-presentation-170627121043.pdf par ssuserd25aae
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae10 vues
Cybercrimes par Fit Tri
CybercrimesCybercrimes
Cybercrimes
Fit Tri461 vues
CYBER CRIME AND SECURITY MAYUR.pptx par MayurSapkale7
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
MayurSapkale760 vues
Steps and Tips to Protect Yourself and your Private Information while Online.... par Abzetdin Adamov
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
Abzetdin Adamov1.4K vues
Cyber Crime and Security Presentation par Preethi Kumaresh
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh34.5K vues

Plus de bcanawakadalcollege

Intro to Javascript.pptx par
Intro to Javascript.pptxIntro to Javascript.pptx
Intro to Javascript.pptxbcanawakadalcollege
4 vues9 diapositives
computer and software are changing.pptx par
computer and software are changing.pptxcomputer and software are changing.pptx
computer and software are changing.pptxbcanawakadalcollege
2 vues9 diapositives
tIME LINE.pptx par
tIME LINE.pptxtIME LINE.pptx
tIME LINE.pptxbcanawakadalcollege
6 vues1 diapositive
Basic HTML Tags.PPT par
Basic HTML Tags.PPTBasic HTML Tags.PPT
Basic HTML Tags.PPTbcanawakadalcollege
17 vues17 diapositives
Cryptography.ppt par
Cryptography.pptCryptography.ppt
Cryptography.pptbcanawakadalcollege
31 vues42 diapositives
Confusion and Diffusion.pptx par
Confusion and Diffusion.pptxConfusion and Diffusion.pptx
Confusion and Diffusion.pptxbcanawakadalcollege
631 vues9 diapositives

Plus de bcanawakadalcollege(20)

Dernier

How to think like a threat actor for Kubernetes.pptx par
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxLibbySchulze1
5 vues33 diapositives
Affiliate Marketing par
Affiliate MarketingAffiliate Marketing
Affiliate MarketingNavin Dhanuka
16 vues30 diapositives
Is Entireweb better than Google par
Is Entireweb better than GoogleIs Entireweb better than Google
Is Entireweb better than Googlesebastianthomasbejan
12 vues1 diapositive
Building trust in our information ecosystem: who do we trust in an emergency par
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergencyTina Purnat
106 vues18 diapositives
WEB 2.O TOOLS: Empowering education.pptx par
WEB 2.O TOOLS: Empowering education.pptxWEB 2.O TOOLS: Empowering education.pptx
WEB 2.O TOOLS: Empowering education.pptxnarmadhamanohar21
16 vues16 diapositives
IETF 118: Starlink Protocol Performance par
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol PerformanceAPNIC
354 vues22 diapositives

Dernier(9)

How to think like a threat actor for Kubernetes.pptx par LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze15 vues
Building trust in our information ecosystem: who do we trust in an emergency par Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat106 vues
IETF 118: Starlink Protocol Performance par APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC354 vues
Marketing and Community Building in Web3 par Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast12 vues
PORTFOLIO 1 (Bret Michael Pepito).pdf par brejess0410
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdf
brejess04108 vues

Cyber_Crime_Security.pptx

  • 1. Cyber Crime & Security Sanjeev Pokharel MScIT-III
  • 2. What is Cyber Crime? • Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. • Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs • Cybercrime is nothing but where the computer used as an object or subject of crime.
  • 3. Definition of Cyber Crime • According to Electronic Transaction Act of Nepal Theft of computer source code, Unauthorized access to computer system, Destructing the computer and computer system, Illegal publication, Violation of privacy , Providing wrong information, Compute fraud etc – are known as computer (cyber) crime.
  • 4. CYBER LAW Electronic Transaction Act (ETA) encompasses laws relating to: I. Electronic and Digital Signatures II. Computer Crime III. Intellectual Property IV. Data Protection and Privacy V. Telecommunications Laws
  • 5. • The Computer as a Weapon : – using a computer (ICT resources) to attack other computers. • Pornography, • Threatening Email, • Assuming someone's Identity, • Sexual Harassment, • Defamation, • Spam and Phishing • The computer as a Target : – using a computer to commit real world crimes. • Viruses, • Worms and Industrial Espionage, • Software Piracy and • Hacking
  • 6. – Financial fraud – Sabotage / disrupt of data/networks – Theft of proprietary information – System penetration from the outside – Denial of service/Making Service Unavailable – Unauthorized access by insiders – Employee abuse of internet privileges – Injection of Viruses
  • 7. • type of activity performed by the intruder Manipulate data integrity Installed a sniffer Stole password files Proving/scanning systems Trojan logons IP spoofing Introduced virus Denied use of services CYBER CRIME
  • 8. • HACKING • CHILD PORNOGRAPHY • DENIAL OF SERVICE ATTACK • VIRUS DISSEMINITION • COMPUTER VANDALISM • CYBER TERRORISM • SOFTWARE PIRACY • PHISHING • CYBER STALKING
  • 9. Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.
  • 10. The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles.
  • 11. • This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide
  • 12. Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc)
  • 14.  Damaging or destroying data rather than stealing or misusing them is called cyber vandalism.  Transmitting virus: These are programs that attach themselves to a file and then circulate .
  • 15.  Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc.
  • 16.  Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 17. Phishing • Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. • Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason.
  • 20. Cyber Stalking  Cyber Stalking is use of the Internet or other electronic means to track someone.  This term is used interchangeably with online harassment and online abuse.  Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property.
  • 21. Nepali Crime Scene The major Cyber Crimes reported, in Nepal, are Defacement of Websites, Spam, Computer Virus and Worms, Pornography, VOIP Call Bypass,  Creation/design of Fake /Duplicate documents , Phishing and Fake Social Networking Users ID(fake facebook id in facebook) Bank ATM Fraud
  • 22. • Internet security is a branch of computer security specifically related to the Internet. • It's objective is to establish rules and measure to use against attacks over the Internet.
  • 24. • Use antivirus software’s • insert firewalls • uninstall unnecessary software • maintain backup • check security settings • Stay anonymous - choose a genderless screen name • Never give your full name or address to strangers
  • 25. • Don't respond to harassing or negative messages (flames) • Save offending messages • Learn more about Internet privacy • Treat your laptop/Computer like cash • Cryptography and digital signature • Cyber Ethics and Laws • Get out of uncomfortable or hostile situations quickly
  • 26. Contd… • Remember that any email or instant message you send could come back to haunt you • Lock it when you leave it • If you access the Internet from a shared computer, make sure you don't leave anything behind • Don't check the "remember my password" box. • When you're done, make sure you log off completely by clicking the "log off" button before you walk away. • If possible, clear the browser cache and history. • Trash all documents you used, and empty the recycle bin. • Don't reply to unsolicited email messages (spam)
  • 27. Contd… • Don't Trust Links Sent in Email Messages – Stop. Think. Click • If you suspect malware is on your computer – Stop, Confirm, Scan • Backup important files on a regular basis • Don't click on links in pop-ups or banner advertisements
  • 28. The Most Dangerous Things You Can Do • Opening attachments from unknown senders • Installing unauthorized applications • Disabling security tools. • Giving/lending passwords • Wireless networks are a huge risk • Filling in web forms and registration pages • Avoid social networking sites
  • 29. Top Password Tips • Never tell your password to anyone • Never write down your password • Make your password hard to guess — do not use the name of your pet (or your child). • Avoid using words found in a dictionary. • Be sure that you don't use personal identifiers in your password
  • 30. • The cyber security will defend us from critical attacks. • It helps us to browse the safe website. • Internet security process all the incoming and outgoing data on our computer. • security will defend from hacks and virus. • The application of cyber security used in our PC needs update every week. • The security developers will update their database every week once. Hence the new virus also deleted
  • 31. Cyber Security Strategies- Nepal • Legal Framework – IT Policy 2067 – Electronic Transaction Act 2063 – Telecommunication Act 1997 – Secure Password Practices 2067 • Institutional Development – Ministry of Science Technology and Environment(MoSTE) – Department of Information Technology(DOIT) – Office of Controller of Certification(OCC) – Cyber Forensics Lab – National Information Technology Centre (NITC) – Cyber Cell – Hanuman Dhoka – CIB – ITERT(Information Technology Emergency Response Team) –Under study
  • 32. Conclusion • Cyber Law of Nepal is well drafted and are capable of handling all kinds of challenges as posed by cyber criminals. • As internet technology advances so does the threat of cyber crime. • In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning. • Never open suspicious e-mails and only navigate to trusted sites. • If possible Use Digital Signature for every electronic Transactions

Notes de l'éditeur

  1. Trojan Horse: secret undocumented routine embedded within a useful program, execution of the program results in execution of the routine Common motivation is data destruction