SlideShare une entreprise Scribd logo
1  sur  13
ARE                  YO                     SECURE
                     U                      D
      CYBER CRIME
      COMPUTING WORKSOP (CW ) PRESENTATION - SOFTWARE ENGINEERING

      SECURITY
CYBER CRIME IS NOTHING BUT WHERE THE COMPUTER
    USED AS AN OBJECT OR SUBJECT OF CRIME.

   CRIME COMMITED USING COMPUTER AND INTERNET


    CRIMINAL ACTIVITES THAT MAKE USE OF COMPUTERS OR
    NETWORKS.




CYBER                                                  1   of 10
                  COMPUTING WORKSHOP PRESENTATION
CRIME
CYBER CRIME AGAINST A PERSON



   CYBER CRIME AGAINST A PROPERTY


    CYBER CRIME AGAINST GOVERNMENT




CYBER                                               1   of 10
                  COMPUTING WORKSHOP PRESENTATION
CRIME
Other
        Scams
        20%
                                   Virus &
                Phishing           Malfare
                  30%                50%




CYBER                                              1   of 10
                 COMPUTING WORKSHOP PRESENTATION
CRIME
Social engineering is the art of manipulating people so they give up
   confidential information.



  1-Never reveal credit or security information to anyone, even your friends.


  2- If a friend urgently ask for your help,to transfer money etc, first confirm
  then proceed.
  3-Never open suspicious emails containing links by friends name, maybe
  it’s a hacker, trying to reach you from friends email.


CYBER                                                                     1   of 10
                          COMPUTING WORKSHOP PRESENTATION
CRIME
Software piracy is a huge illegal business, running into billions of dollars. These
   includes the sale of imitation software on Internet auction and classified ads



  1-It can be prevented by license. 2 types of software licensing
  management – online and offline.
  ONLINE – Software checked each time OFFLINE – Only once.

  2- Another option to use for anti piracy is to price the software low
  enough so that it is not worth while forthe hackers to hack, this is
  very subjective and is up the vendors to decide for themselves


CYBER                                                                           1   of 10
                            COMPUTING WORKSHOP PRESENTATION
CRIME
Identity theft occurs when someone obtains your personal information, such as your
   credit card data or Social Security number, to commit fraud or other crimes.



  1-Monitor your bank and credit card statements

   2-Verify your mailing address with the post office and financial
   institutions-
     Monitor your bank and credit card statements
  3-Choose secure online companies to make online transactions.




CYBER                                                                       1   of 10
                           COMPUTING WORKSHOP PRESENTATION
CRIME
Spoofing is a technique used by computer hackers to gain unauthorized access to
   our computers by sending a message with an IP address saying it is coming from
   trusted host , similarly with emails and caller ID .


  1- CALL SPOOFING - Block spoofing calls. Services such as
  trapcall.com or safercall.com allow you to block calls that display
  false caller information.
  2- EMAIL SPOOFING - Safeguard your email address and avoid
  disclosing it.. Use a spam filter, and always use an image to
  display your email online.
  3- Use of good antivirus softwares can prevent IP SPOOFING.



CYBER                                                                      1   of 10
                          COMPUTING WORKSHOP PRESENTATION
CRIME
Distributed denial-of-service attack (DDoS attack) is an attempt to make a machine
  or network resource unavailable to its intended users.



  1-Working with the Internet Service Provider (ISP) to establish quality of service
  rates to limit the amount of bandwidth one customer can utilize

  2- Using firewalls and filtering devices to filter all unnecessary ports and protocols

  3-(D)DoS-Deflate is a free open source Unix/Linux script by MediaLayer that
  automatically mitigate (D)DoS attacks.




CYBER                                                                             1   of 10
                             COMPUTING WORKSHOP PRESENTATION
CRIME
Phishing is a form of online identity theft in which fraudsters trick Internet
  users into submitting personal information to illegitimate web sites.



  1- Communicate personal information only via phone or secure web sites

  2-Do not click on links, download files or open attachments in emails from
  unknown senders

  3- Never email personal or financial information, even if you are close with
  the recipient.

  4-Beware of links in emails that ask for personal information.

CYBER                                                                     1   of 10
                          COMPUTING WORKSHOP PRESENTATION
CRIME
A salami technique is an automated form of abuse involving Trojan horses or secret
   execution of an unauthorized program that causes the unnoticed or immaterial
   debiting of small amounts of assets from a large number of sources or accounts.




  1-Don't ignore what appear to be errors incomputer-based financial or other
  accounting systems.

  2-Keep regular checks on account to see changing status.




CYBER                                                                           1   of 10
                            COMPUTING WORKSHOP PRESENTATION
CRIME
Malicious software that attaches itself to other software.




  1-Use good antivirus and firewall in order to protect yourself.

  2- Never download files, because viruses and programs like Trojan Horses and
  Keyloggers may be attached by sender.




CYBER                                                                       1    of 10
                              COMPUTING WORKSHOP PRESENTATION
CRIME
CYBERCRIME SECURITY

Contenu connexe

Tendances

Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 

Tendances (20)

Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 

En vedette

Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Power point essentials #15 8°b
Power point essentials #15 8°bPower point essentials #15 8°b
Power point essentials #15 8°bforever97
 
Augustin romeo
Augustin romeoAugustin romeo
Augustin romeoleerling5
 
My biodata
My biodataMy biodata
My biodatariccot
 
Kasper en jef
Kasper en jefKasper en jef
Kasper en jefleerling5
 
Illinois supreme court decision in re pension reform litigation - May 8, 2015
Illinois supreme court decision in re pension reform litigation - May 8, 2015Illinois supreme court decision in re pension reform litigation - May 8, 2015
Illinois supreme court decision in re pension reform litigation - May 8, 2015Cook County Commissioner Bridget Gainer
 
Возможности приложения для ресторанов
Возможности приложения для ресторановВозможности приложения для ресторанов
Возможности приложения для ресторановSoGe Mobile
 
Food security bill
Food security billFood security bill
Food security billPANKAJMISHR
 
Internet Marketing Techniques That Require No SEO Knowledge
Internet Marketing Techniques That Require No SEO KnowledgeInternet Marketing Techniques That Require No SEO Knowledge
Internet Marketing Techniques That Require No SEO KnowledgeNasir Uddin Shamim
 
¿Cómo fue la cultura de Mesopotamia?
¿Cómo fue la cultura de Mesopotamia?¿Cómo fue la cultura de Mesopotamia?
¿Cómo fue la cultura de Mesopotamia?Hector Neto
 

En vedette (18)

Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Disney
DisneyDisney
Disney
 
Smart analyzer v9 product profile
Smart analyzer v9 product profileSmart analyzer v9 product profile
Smart analyzer v9 product profile
 
Power point essentials #15 8°b
Power point essentials #15 8°bPower point essentials #15 8°b
Power point essentials #15 8°b
 
Augustin romeo
Augustin romeoAugustin romeo
Augustin romeo
 
My biodata
My biodataMy biodata
My biodata
 
Kasper en jef
Kasper en jefKasper en jef
Kasper en jef
 
LIMC 01: SPEECHES
LIMC 01: SPEECHESLIMC 01: SPEECHES
LIMC 01: SPEECHES
 
Illinois supreme court decision in re pension reform litigation - May 8, 2015
Illinois supreme court decision in re pension reform litigation - May 8, 2015Illinois supreme court decision in re pension reform litigation - May 8, 2015
Illinois supreme court decision in re pension reform litigation - May 8, 2015
 
Возможности приложения для ресторанов
Возможности приложения для ресторановВозможности приложения для ресторанов
Возможности приложения для ресторанов
 
SRRV
SRRVSRRV
SRRV
 
Food security bill
Food security billFood security bill
Food security bill
 
Internet Marketing Techniques That Require No SEO Knowledge
Internet Marketing Techniques That Require No SEO KnowledgeInternet Marketing Techniques That Require No SEO Knowledge
Internet Marketing Techniques That Require No SEO Knowledge
 
¿Cómo fue la cultura de Mesopotamia?
¿Cómo fue la cultura de Mesopotamia?¿Cómo fue la cultura de Mesopotamia?
¿Cómo fue la cultura de Mesopotamia?
 

Similaire à Cyber Crime and Security

presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptJatinRajput67
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up bookDiego Souza
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxjonadhe mondeja
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3Denise Bailey
 

Similaire à Cyber Crime and Security (20)

presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
My presentation
My presentationMy presentation
My presentation
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 

Dernier

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 

Dernier (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

Cyber Crime and Security

  • 1. ARE YO SECURE U D CYBER CRIME COMPUTING WORKSOP (CW ) PRESENTATION - SOFTWARE ENGINEERING SECURITY
  • 2. CYBER CRIME IS NOTHING BUT WHERE THE COMPUTER USED AS AN OBJECT OR SUBJECT OF CRIME. CRIME COMMITED USING COMPUTER AND INTERNET CRIMINAL ACTIVITES THAT MAKE USE OF COMPUTERS OR NETWORKS. CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 3. CYBER CRIME AGAINST A PERSON CYBER CRIME AGAINST A PROPERTY CYBER CRIME AGAINST GOVERNMENT CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 4. Other Scams 20% Virus & Phishing Malfare 30% 50% CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 5. Social engineering is the art of manipulating people so they give up confidential information. 1-Never reveal credit or security information to anyone, even your friends. 2- If a friend urgently ask for your help,to transfer money etc, first confirm then proceed. 3-Never open suspicious emails containing links by friends name, maybe it’s a hacker, trying to reach you from friends email. CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 6. Software piracy is a huge illegal business, running into billions of dollars. These includes the sale of imitation software on Internet auction and classified ads 1-It can be prevented by license. 2 types of software licensing management – online and offline. ONLINE – Software checked each time OFFLINE – Only once. 2- Another option to use for anti piracy is to price the software low enough so that it is not worth while forthe hackers to hack, this is very subjective and is up the vendors to decide for themselves CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 7. Identity theft occurs when someone obtains your personal information, such as your credit card data or Social Security number, to commit fraud or other crimes. 1-Monitor your bank and credit card statements 2-Verify your mailing address with the post office and financial institutions- Monitor your bank and credit card statements 3-Choose secure online companies to make online transactions. CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 8. Spoofing is a technique used by computer hackers to gain unauthorized access to our computers by sending a message with an IP address saying it is coming from trusted host , similarly with emails and caller ID . 1- CALL SPOOFING - Block spoofing calls. Services such as trapcall.com or safercall.com allow you to block calls that display false caller information. 2- EMAIL SPOOFING - Safeguard your email address and avoid disclosing it.. Use a spam filter, and always use an image to display your email online. 3- Use of good antivirus softwares can prevent IP SPOOFING. CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 9. Distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. 1-Working with the Internet Service Provider (ISP) to establish quality of service rates to limit the amount of bandwidth one customer can utilize 2- Using firewalls and filtering devices to filter all unnecessary ports and protocols 3-(D)DoS-Deflate is a free open source Unix/Linux script by MediaLayer that automatically mitigate (D)DoS attacks. CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 10. Phishing is a form of online identity theft in which fraudsters trick Internet users into submitting personal information to illegitimate web sites. 1- Communicate personal information only via phone or secure web sites 2-Do not click on links, download files or open attachments in emails from unknown senders 3- Never email personal or financial information, even if you are close with the recipient. 4-Beware of links in emails that ask for personal information. CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 11. A salami technique is an automated form of abuse involving Trojan horses or secret execution of an unauthorized program that causes the unnoticed or immaterial debiting of small amounts of assets from a large number of sources or accounts. 1-Don't ignore what appear to be errors incomputer-based financial or other accounting systems. 2-Keep regular checks on account to see changing status. CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 12. Malicious software that attaches itself to other software. 1-Use good antivirus and firewall in order to protect yourself. 2- Never download files, because viruses and programs like Trojan Horses and Keyloggers may be attached by sender. CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME