1. Cyber Security In
Modern World .
Second Year Of Computer Engineering.
Imperial College Of Engineering And Research,, Wagholi, Nagar Road. ,Pune-
421207.
Submitted by...
Mr.Mandar pathrikar.
2. Growing problem in cyber world
Computer worms and
viruses.
Password cracking.
Unauthorized network
access.
Interception and
fabrication of emails.
Theft of passwords.
Unauthorized access
3. Software Available In Market
Who Affect
The Cyber Crime
1. Brute force attack.
Brute force attack is a method of
defeating a cryptographic scheme
by trying a large number of
possibilities.
It is exhaustively working through
all possible keys in order to
decrypt a message.
5. USA cyber security.
Great features provided in the USA security.
1. Strong Authentication.
2. Snort center & their working for government.
6. 1 . Strong Authentication
Government agencies must be able to authenticate and
authorize internal and external users and reliably secure
online data exchanges, transactions, and
communications.
Provide the PIK ,to the user.
Encryption is able to transform data into a form that
makes it almost impossible to read it without the right
key
8. Snort Center & their working.
Snort Centers in their company so that they can
easily detect this crime happening in the small
part.
The Snort Centers are find out those pc whose
directly changes their path of working, and note
down address of that ,working pc & on that
basis investigation occurred.
9. How to Monitor Cyber Crime.
1. The Radar Page.
2. Nessus vulnerability scanner
11. The Radar Page.
The latest Information Security Threats , in whole
world only USA and Europe is using that is radar page
developed by Security Wizardry Portal.
In simple word if we explain the radar page in that we
can say that, it work like a simple radar but, it have full
control on the data transformation system.
In every 20sec. This page is updated.
If any where in the network free downloading is going
on then within an 20sec. It will tract their address.
13. Nessus vulnerability scanner
Nessus vulnerability scanner is the system which play
very important roll in US cyber world.
Now what exactly this scanner doing ,when any
company send the data from or product from their
server to the client ,this all data is send in terms of
packets, if any hacker are link with this network and
stolen the data, the information regarding hacker is
send to the main console computer of the Nessus
vulnerability scanner.
14. Crimes Happen in Cyber world.
Today I am going to tell you about the famous crime in
the history of cyber world.
The name of that engineer is “zxeer”. he divides the
sub module in all his group members, but testing part,
he keep it for himself.
He made a small software in that database. In that
database information about every client is saved .the
money which is available after decimal point is collected
from everyone account and it will saved in the who is
the last client available in that database. His name is
started from “z” so that all that money is saved in his
account .
15. Crimes Happen in Cyber world
But after some year the person whose name is
“zzeer” is open account in that bank, he found
that his account money is automatically
increasing then he reported to bank. After
checking the software they understand that the
some software is added into it who collect the
money which is available after the decimal digit
from all account ,in that period he earn
$2billion.
16. Preventions
USING INTRUSION ALERT PROGRAMS-: They need to be
operating constantly so that all unusual behavior on network is caught
immediately.
USING ENCRYPTION-: Encryption is able to transform data into a
form that makes it almost impossible to read it without the right key. This key
is used to allow controlled access to the information to selected people.
PASSWORD-: Password should be charged with regular interval of time and
it should be alpha numeric and should be difficult to judge.
USING NETWORK SCANNING PROGRAMS-: we all should install
all this software in our computer so that we can get the information about
warms and Trojan in the network, so it is very beneficial for our network
system.
17. Conclusion .
At thee last I want to conclude that if our
government include private sectors for securing
the cyber world then ,It is great development in
the cyber world.
If we really want to improve our technology
then we have to take this steps.
Employment is also available at larger amount.
Education of consumer and industry players about
anti-crime measures.