26
Seminar Presentation Seminar Presentation on on Cyber Crime And Security Cyber Crime And Security By By Shishupal Nagar 8CSB-1(95) Shishupal Nagar 8CSB-1(95) DEPARTMENT OF COMPUTER SCIENCE &ENGINEERING Jaipur Engineering College & Research Centre Sitapura , Tonk , Road Jaipur

Cybercrime and security

Embed Size (px)

Citation preview

Page 1: Cybercrime and security

Seminar PresentationSeminar Presentationonon

Cyber Crime And SecurityCyber Crime And SecurityByBy

Shishupal Nagar 8CSB-1(95)Shishupal Nagar 8CSB-1(95)

DEPARTMENT OF COMPUTER SCIENCE &ENGINEERING

Jaipur Engineering College & Research CentreSitapura , Tonk , Road Jaipur

Page 2: Cybercrime and security

What is Cyber Crime?Reasons for Cyber CrimeCyber CriminalsClassificationTypes of Cyber CrimeSafety tips for Cyber crimeCyber SecurityAdvantage of SecurityConclusionsReferences

Page 3: Cybercrime and security

Cybercrime is nothing but where the computer used as an object or subject of crime.

Crime committed using a computer and the internet to steal a person’s identity.Illegal imports.Malicious programs.

Page 4: Cybercrime and security

Capacity to store data in comparatively small spaceEasy to accessComplexNegligenceLoss of evidence

Page 5: Cybercrime and security

Those who are doing crimes by using the computer as an target or object.

Children and adolescents between the age group of 6 – 18 years Organised hackersProfessional hackers / crackersDissatisfied employees

Page 6: Cybercrime and security

When Computer Is used:-As a Target: using a computer to attack other computers.

As a weapon: using a computer to commit real world crimes.

Page 7: Cybercrime and security

HackingEmail bombing Data diddlingSalami attacksEmail spoofingDenial of Service attackVirus / worm attacksLogic bombsSoftware piracy

Page 8: Cybercrime and security

Hacking in simple terms means an illegal instruction into a computer system and/or network. It is also known as CRACKING.

Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage..

Page 9: Cybercrime and security

Sending huge volumes of e-mailTo an address or server in an attempt to overflow the mailbox

or overwhelm the serverZip BombingMethods of email bombing

Mass MailingLink Listing

Page 10: Cybercrime and security

Changing of data before or during entry into the computer system

Forging or counterfeiting documents used for data entry

Exchanging valid disks and tapes with modified replacements.

Prevention:Regular AuditsSupervising employees

Page 11: Cybercrime and security

A series of minor attacks that together results in a larger attack

Used for financial crimes in which criminals steal money or resources a bit at a time from a system

Prevention: Find indications of an attack Random audits Don't ignore what appear to be errors in computer-

based financial systems.

Page 12: Cybercrime and security

The sender address and other parts of the e-mail header are altered .

From, Return-Path and Reply-To fieldsAlthough the e-mail appears to come from the address

indicated in the From field it actually comes from another source.

PreventionAntivirusUse cryptographic signatures

Page 13: Cybercrime and security
Page 14: Cybercrime and security

This is an act by the cyber criminal to make any host network unavailable for the guests.

These attacks are mostly done by group of people.

This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.

Page 15: Cybercrime and security

Viruses are programs that attach themselves to a computer or a

file and then circulate themselves to other files and to other computers on a network.

They usually affect the data on a computer, either by altering or deleting it.

Programs that multiply like viruses but spread from computer to computer are called as worms.

Page 16: Cybercrime and security

If a piece of code intentionally inserted into a software system.

That will set off a malicious function when specified conditions are met.

Prevention:Monitoring system Application logs are the keys to identifying unwarranted

activity

Page 17: Cybercrime and security

Theft of software through the illegal copying of genuine programs.

Distribution of products intended to pass for the original.

Page 18: Cybercrime and security

Use antivirus software’s Insert firewalls Uninstall unnecessary software Maintain backup Check security settingsStay anonymous - choose a genderless

screen nameNever give your full name or address to

strangers

Page 19: Cybercrime and security

Avoiding use of Unauthorized software.Avoid opening of unknown email.Use internet filtering software.Data Level Security (Using encrypting software's).Don't respond to harassing or negative messages. Get out of uncomfortable or hostile situations quickly. Save offending messages. Learn more about Internet privacy.

Page 20: Cybercrime and security
Page 21: Cybercrime and security

Internet security is a branch of computer security specifically related to the Internet.

It's objective is to establish rules and measure to use against attacks over the Internet. 

Page 22: Cybercrime and security

The cyber security will defend us from critical attacks.It helps us to browse the safe website. Internet security process all the incoming and outgoing data on

our computer.Security will defend from hacks and viruses.

Page 23: Cybercrime and security

It is not possible to eliminate cyber crime from the cyber space.

It is quite possible to check them.

Awareness is the first step in protecting yourself.

So we must pay attention to all those issues and protect the World from Cyber Crime.

The IT Act is a historical step in the cyber world.

Page 24: Cybercrime and security

http://www.computerhope.com/jargon/d

 http://www.slideshare.com/

 www.google.com/

 http://seminarsonly.com/

http://1000projects.com/

Page 25: Cybercrime and security
Page 26: Cybercrime and security