Short Presentation On Cyber Crime And Security which includes Cyber crime introduction and types , Hacking and its types, different Threats , and in last Prevention for Hacks and Threats.
2. CONTENTS
1. What Is cybercrime?
2. History Of Cybercrime
3. Categories Of Cybercrime
4. Types Of Cybercrime
5. What Is Security?
6. Threats & Hacks
7. Prevention & Tips
8. Conclusion
3. What is Cyber crime?
Cybercrime is defined as a crime in which a computer is the object of the
crime (hacking, phishing, spamming) or is used as a tool to commit an
offense (child pornography, hate crimes). Cybercriminals may use
computer technology to access personal information, business trade
secrets or use the internet for exploitative or malicious purposes.
Criminals can also use computers for communication and document or
data storage.
4. So How It Started ?
• When hacking first started it was not thought of as that serious. The
hackers were not even known as hackers but as practical jokers. The very
first hack came in 1878 when the phone company, Bell Telephone, was
started. A group of teenage boys, hired to run the switchboards, would
disconnect or misdirect calls.
• Then hackers tried to break into computer networks. Some did it just for
the thrill of accessing high-level security networks, but others sought to
gain sensitive, classified material. Eventually, criminals started to infect
computer systems with computer viruses, which led to breakdowns on
personal and business computers.
HISTORY
5. Categories Of Cyber Crime
We can categorize Cyber crimes in two ways
The Computer as a Target :-using a computer to attack other computers.
e.g. Hacking, Virus/Worm attacks, DOS attack etc.
The computer as a weapon :-using a computer to commit real world crimes.
e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds,
Pornography etc.
6. Types Of Cyber Crime
1. Hacking
Hacking generally refers to unauthorized intrusion into a computer or a
network. The person engaged in hacking activities is known as a hacker.
This hacker may alter system or security features to accomplish a goal
that differs from the original purpose of the system.
Hacking can also refer to non-malicious activities, usually involving
unusual or improvised alterations to equipment or processes.
2.Spamming
Spamming is the use of electronic messaging systems like e-mails and
other digital delivery systems and broadcast media to send unwanted
bulk messages indiscriminately. The term spamming is also applied to
other media like in internet forums, instant messaging, and mobile text
messaging, social networking spam, junk fax transmissions, television
advertising and sharing network spam.
7. Types Of Cyber Crime
3. Phishing
Phishing is the fraudulent attempt to obtain sensitive information such
as usernames, passwords, and credit card details (and money), often for
malicious reasons, by disguising as a trustworthy entity in an electronic
communication.
8. What Is Cyber Security?
Cyber security is a branch of computer security specifically related to
the internet.
It’s objectives is to establish rules and measure to use against attacks
over the internet.
Cyber Security involves protection of sensitive personal and business
information through prevention, detection and response to different
online attacks.
9. Confidentiality
Only those authorized to view information
Integrity
Information is correct and hasn’t been altered by
unauthorized users or software
Availability
Data is accessible to authorized users
10. Computer Security – Threats & Hacks
Malware
Software that has a malicious purpose
•Viruses : A computer virus is malicious code that replicates by copying itself to
another program, computer boot sector or document and changes how a
computer works.
•Trojans : Trojans can be employed by cyber-thieves and hackers trying to gain
access to users' systems. Users are typically tricked by some form of social
engineering into loading and executing Trojans on their systems
•Spyware : It is designed to spy on the victim’s computer. If you are infected with it,
probably your daily activity or certain activity will be spied by the spyware and it
will find itself a way to contact the host of this malware.
11. The most common hacks known are:
Backdoors: Backdoor is an undocumented
way of gaining access to a program, online service
or an entire computer system.
A backdoor will bypass normal authentication
mechanisms. Also called a trapdoor.
Denial-Of-Service Attack = DOS Attack is a malicious attempt by a single person
or a group of people to cause the victim, site or node to deny service to it
customers.
• DoS = when a single host attacks
• DDoS = when multiple hosts attack simultaneously
12. Eavesdropping (Man in the Middle): This attack consists of listening to
private conversations between hosts in a network and compromising
sensitive information.
Spoofing: This technique consist of masquerading as another person (or
program) and falsify data.
SQL Injection : An SQL injection is a computer attack in which malicious code
is embedded in a poorly-designed application and then passed to the
backend database. The malicious data then produces database query results
or actions that should never have been executed.
13. Safety tips & prevention for cyber crime
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous & use VPN (virtual private network)
• Never give your full name or address to strangers.
• Learn more about Internet privacy.
• Make Sure your Computer is configured securely
• Choose Strong Passwords and Keep them Safe.
• Cybercrime prevention can be straight-forward - when armed with a little
technical advice and common sense, many attacks can be avoided.
• In general, online criminals are trying to make their money as quickly and
easily as possible. The more difficult you make their job, the more likely
they are to leave you alone and move on to an easier target.
14. The Beginner's Guide to Defending Against Wi-Fi Hacking
1. Password Cracking
Solution: Better Passwords
2. Social-Engineering Attacks
Solution: Always Be Suspicious
3. WPS PIN Attacks
Solution: Disable WPS & Verify with Testing
4. Remote-Access Attacks
Solution: Disable Remote Access & Port Forwarding
5. Rogue Access Points
Solution: Spot Signs of a Rogue AP
16. Conclusion
I hope that our presentation will be helpful for my audience to improve
their knowledge about cyber security and to overcome several security
loopholes on their computer operation.
Also it helps to spread awareness among normal people about emerging
security threats.
Simple and practical prevention methods are explained in the Seminar to
prevent PCs from infection.
◦ As computer security gets tighter hackers are getting smarter!!!
◦ Computer and information security continue to grow in importance
◦ Know The Importance Of Cyber Security.
◦ Neglecting security is the worst thing you can do!!