Cyber crime and security

Cyber crime and security
Computer crime, or cybercrime, is crime that involves
a computer and a network. The computer may have been
used in the commission of a crime, or it may be the target.
Cyber security is the body of technologies, processes and
practices designed to protect networks, computers
programs and data from attack, damage or unauthorized
access.
OR
Cyber Security is the protection of information
systems from theft or damage to the hardware, the
software, and to the information on them.
NEED FOR CYBER SECURITY
Cyber security is necessary since it helps in securing data from
threats such as data theft or misuse, also safeguards your
system from viruses.
A vulnerability is a system susceptibility or flaw. To secure a
computer system, it is important to understand the attacks that
can be made against it, and these threats can typically be
classified into one of the categories below:
Backdoors: It is a cryptosystem or an algorithm, is any
secret method of bypassing normal authentication or
security controls.
Denial-of-Service Attack: It is designed to make a machine
or network resource unavailable to its intended users.
Eavesdropping: It is the act of surreptitiously listening to a
private conversation, typically between hosts on a network.
Spoofing: It is a fraudulent or malicious practice in which
communication is sent from an unknown source disguised
as a source known to the receiver.
Phishing: It is the attempt to acquire sensitive information
 Financial Systems
 Utilities and Industrial
Equipment's
 Aviation
 Consumer Devices
 Large Corporations
 Automobiles
 Government
Serious Financial damage has been caused by security
breaches, The 2003 loss estimates by these firms range from
$13 billion(worms and viruses only) to $226 billion(For all
forms of covert attacks). The reliability of these estimates is
often challenged; the underlying methodology is basically
anecdotal.
Impact of Security breaches
Cyber crime and security
As with physical security, the motivations for breaches of
computer security vary between attackers. Some are thrill-
seekers or vandals, others are activists or criminals looking
for financial gain.
Cyber crime and security
Use different ID or Password combinations for different
account and avoid writing them down. Make the passwords
more complicated by combining letters, numbers, special
characters and change them on a regular basis.
Ex:
• Activate firewalls: Firewall are the first line of cyber
defense; they block connections to unknown or bogus
sites and will keep out some types of viruses and
hackers.
• Use Anti-virus/ malware Software: Prevent viruses
from infecting your computer by installing and regularly
updating anti-virus software.
• Block Spyware attacks: Prevent spyware from in
filtering your computer by installing and updating anti-
spyware software.
Make sure your social networking profiles (e.g. Facebook,
Twitter, YouTube, MSN, etc.) are set to private. Check your
security settings. Be careful what information you post
online. Once it is on the Internet, it is there forever!
Be aware that your mobile device is vulnerable to viruses
and hackers. Download applications from trusted sources.
Keep your applications and operating system (e.g.
Windows, Mac, Linux) current with the latest system
updates. Turn on automatic updates to prevent potential
attacks on older software.
Use encryption for your most sensitive files such as tax
returns or financial records, make regular back-ups of all
your important data, and store it in another location.
Wi-Fi (wireless) networks at home are vulnerable to
intrusion if they are not properly secured. Review and
modify default settings. Public Wi-Fi, “Hot Spots”, are also
vulnerable. Avoid conducting financial or corporate
transactions on these networks.
Be cautious when giving out personal information such as
your name, address, phone number or financial information
on the Internet. Make sure that websites are secure (e.g.
when making online purchases) or that you’ve enabled
privacy settings (e.g. when accessing/using social
networking sites).
Always think before you click on a link or file of unknown
origin. Don’t feel pressured by any emails. Check the
source of the message. When in doubt, verify the source.
Never reply to emails that ask you to verify your information
or confirm your user ID or password.
Don’t panic! If you are a victim, if you encounter illegal
Internet content (e.g. child exploitation) or if you suspect a
computer crime, identity theft or a commercial scam, report
this to your local police. If you need help with maintenance
or software installation on your computer, consult with your
service provider or a certified computer technician.
Cyber crime and security
Cyber crime and security
1 sur 22

Recommandé

Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
1.4K vues26 diapositives
PptPpt
PptGeetu Khanna
1.8K vues18 diapositives
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
57.6K vues25 diapositives
cyber securitycyber security
cyber securityBasineniUdaykumar
3.2K vues10 diapositives

Contenu connexe

Tendances

Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
1.1K vues42 diapositives
CybersecurityCybersecurity
CybersecurityForam Gosai
1.8K vues30 diapositives
Cyber securityCyber security
Cyber securitySamsil Arefin
1.7K vues21 diapositives
Cyber security ppt finalCyber security ppt final
Cyber security ppt finalSanishShrestha2
288 vues27 diapositives
Cyber securityCyber security
Cyber securityManjushree Mashal
3.1K vues41 diapositives
CYBER CRIMECYBER CRIME
CYBER CRIMEKunal Sinha
1.8K vues15 diapositives

Tendances(20)

Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace11.1K vues
CybersecurityCybersecurity
Cybersecurity
Foram Gosai1.8K vues
Cyber securityCyber security
Cyber security
Samsil Arefin1.7K vues
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
SanishShrestha2288 vues
Cyber securityCyber security
Cyber security
Manjushree Mashal3.1K vues
CYBER CRIMECYBER CRIME
CYBER CRIME
Kunal Sinha1.8K vues
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü12.9K vues
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.610 vues
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal10.8K vues
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya2.2K vues
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha4K vues
Cyber securityCyber security
Cyber security
Harsh verma13.6K vues
Cyber securityCyber security
Cyber security
Rishav Sadhu5.7K vues
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman2.9K vues
Cyber securityCyber security
Cyber security
manoj duli1.7K vues

En vedette

Hardware theftHardware theft
Hardware theftchrispaul8676
12.6K vues7 diapositives
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
19.2K vues26 diapositives
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
47.9K vues26 diapositives
Reading skillsReading skills
Reading skillsalkaala
121.8K vues14 diapositives

En vedette(11)

Hardware theftHardware theft
Hardware theft
chrispaul867612.6K vues
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
hazirma19.2K vues
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
hazirma47.9K vues
Reading skillsReading skills
Reading skills
alkaala121.8K vues
Chapter 11Chapter 11
Chapter 11
Mohd Khairil Borhanudin17.9K vues
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
Miguel Rebollo33.5K vues
Skimming & ScanningSkimming & Scanning
Skimming & Scanning
Unggul DJatmika178.1K vues
Software theftSoftware theft
Software theft
chrispaul867616.4K vues

Similaire à Cyber crime and security

Cyber securityCyber security
Cyber securityNimesh Gajjar
401 vues18 diapositives
Computer securityComputer security
Computer securityEktaVaswani2
23.4K vues24 diapositives

Similaire à Cyber crime and security(20)

SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
ssusera0b94b15 vues
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
ArindamGhosal612 vues
Cyber securityCyber security
Cyber security
Nimesh Gajjar401 vues
Computer securityComputer security
Computer security
EktaVaswani223.4K vues
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
Symptai Consulting Limited85 vues
Insecurity vssutInsecurity vssut
Insecurity vssut
RAVIKUMAR Digital Signal Processing31 vues
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com3.3K vues
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
Khristine Botin11 vues
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai 238 vues
Cyber crime & securityCyber crime & security
Cyber crime & security
pinkutinku264.2K vues
Cyber SecurityCyber Security
Cyber Security
Adeel Younas298 vues
Computer security andComputer security and
Computer security and
Rana Usman Sattar6.6K vues
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104133 vues
Cyber Security.docxCyber Security.docx
Cyber Security.docx
TanushreeChakraborty27118 vues
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
56ushodayareddy229 vues

Dernier(20)

CXL at OCPCXL at OCP
CXL at OCP
CXL Forum203 vues
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
Prity Khastgir IPR Strategic India Patent Attorney Amplify Innovation24 vues
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)
CSUC - Consorci de Serveis Universitaris de Catalunya59 vues

Cyber crime and security

  • 2. Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
  • 3. Cyber security is the body of technologies, processes and practices designed to protect networks, computers programs and data from attack, damage or unauthorized access. OR Cyber Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them.
  • 4. NEED FOR CYBER SECURITY Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 5. A vulnerability is a system susceptibility or flaw. To secure a computer system, it is important to understand the attacks that can be made against it, and these threats can typically be classified into one of the categories below: Backdoors: It is a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls. Denial-of-Service Attack: It is designed to make a machine or network resource unavailable to its intended users. Eavesdropping: It is the act of surreptitiously listening to a private conversation, typically between hosts on a network. Spoofing: It is a fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver. Phishing: It is the attempt to acquire sensitive information
  • 6.  Financial Systems  Utilities and Industrial Equipment's  Aviation  Consumer Devices  Large Corporations  Automobiles  Government
  • 7. Serious Financial damage has been caused by security breaches, The 2003 loss estimates by these firms range from $13 billion(worms and viruses only) to $226 billion(For all forms of covert attacks). The reliability of these estimates is often challenged; the underlying methodology is basically anecdotal. Impact of Security breaches
  • 9. As with physical security, the motivations for breaches of computer security vary between attackers. Some are thrill- seekers or vandals, others are activists or criminals looking for financial gain.
  • 11. Use different ID or Password combinations for different account and avoid writing them down. Make the passwords more complicated by combining letters, numbers, special characters and change them on a regular basis. Ex:
  • 12. • Activate firewalls: Firewall are the first line of cyber defense; they block connections to unknown or bogus sites and will keep out some types of viruses and hackers. • Use Anti-virus/ malware Software: Prevent viruses from infecting your computer by installing and regularly updating anti-virus software. • Block Spyware attacks: Prevent spyware from in filtering your computer by installing and updating anti- spyware software.
  • 13. Make sure your social networking profiles (e.g. Facebook, Twitter, YouTube, MSN, etc.) are set to private. Check your security settings. Be careful what information you post online. Once it is on the Internet, it is there forever!
  • 14. Be aware that your mobile device is vulnerable to viruses and hackers. Download applications from trusted sources.
  • 15. Keep your applications and operating system (e.g. Windows, Mac, Linux) current with the latest system updates. Turn on automatic updates to prevent potential attacks on older software.
  • 16. Use encryption for your most sensitive files such as tax returns or financial records, make regular back-ups of all your important data, and store it in another location.
  • 17. Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not properly secured. Review and modify default settings. Public Wi-Fi, “Hot Spots”, are also vulnerable. Avoid conducting financial or corporate transactions on these networks.
  • 18. Be cautious when giving out personal information such as your name, address, phone number or financial information on the Internet. Make sure that websites are secure (e.g. when making online purchases) or that you’ve enabled privacy settings (e.g. when accessing/using social networking sites).
  • 19. Always think before you click on a link or file of unknown origin. Don’t feel pressured by any emails. Check the source of the message. When in doubt, verify the source. Never reply to emails that ask you to verify your information or confirm your user ID or password.
  • 20. Don’t panic! If you are a victim, if you encounter illegal Internet content (e.g. child exploitation) or if you suspect a computer crime, identity theft or a commercial scam, report this to your local police. If you need help with maintenance or software installation on your computer, consult with your service provider or a certified computer technician.