SlideShare uma empresa Scribd logo
1 de 4
CYBER SECURITY
                                                       Jumanne Rajabu Mtambalike
                                    Bsc.Computer
                                                   science and electronics,Dayanandasagar College
                                                          Bangalore University,India
                                                              mtambalike@yahoo.co.uk

                                                                 jrmhza@gmail.com

                                                              Web
                                                                technologies.
                                                              Bangalore,India
                                                            www.webtechjr.blogspot.com




Abstract— Cyber crime is emerging as serious threat. To the               Vishing is the criminal practice of using social engineering
world of computer technology, governments, police and                     Voice over IP (VoIP) to gain access to private personal,
intelligence units are acting toward the issue closely. Different         information from the public for the purpose of financial
strategies are put into action. The effort is done to educate             reward. The term is the combination of Voice and Phishing.
people and to expose them to the idea that it is not safe
                                                                          D. Cyber stalking.
anymore to navigate in the cyber world without security. This
report is based on different research done by people and                     The term refers to the act of online stalking which involve
Organization about cyber security.                                        online harassment and abuse. It involves vandalizing property,
                                                                          threatening behaviours and message or objects which disturb
Keywords— cyber-security, cyber-crime, Phishing and Hacking.
                                                                          the user of the Internet or cyber technologies.

                        I. INTRODUCTION
Cyber Security, techniques developed to safeguard                                             III. GLOBAL ATTACK TREND.
information and information systems stored on computers.
Potential threats include the destruction of computer hardware            Cyber security is a collective concern that is comprehensive in
and software and the loss, modification, theft, unauthorized              scope—the Internet has no National boundaries. Whereas
use, observation, or disclosure of computer data.                         security is typically regulated at the government level, cyber
                                                                          security is at once national, international and private
                                                                          concerned.
                 II. TYPES OF CYBERCRIME
                                                                          A. Asia.
   The need of cyber security is due to the increase of cyber
                                                                          The entire Asian continent is in the blink of cyber wars for
crimes or online crimes. In recent years several new method
                                                                          example hostile cyber actions have taken place in the past
and ways of practicing these crimes has been established
                                                                          between India and Pakistan, Azerbaijan and Armenia, and
including:
                                                                          Japan and the People’s Republic of China. This indicates the
A. Phishing.                                                              need and essentialness of cyber security around the word.
   It is among the internet fraud involving getting financial             With every new application, newer vulnerabilities crop up,
information illegally online spam e-mail pretending to be from            posing immense challenges to those who are mandated to
bank or any institution concerning with the user of the account           protect the IT assets.
asking him to send account number or password for
verification while the original aim is to use the privacy of the          B. America
user for illegal activities.
                                                                             America and Canada especially North America are the
                                                                          most affected areas with cyber crimes due to the huge number
B. Hacking.                                                               of computer literate people. In recent days teenagers are
   Hacking is the crime involves invading systems and                     extremely exposed into cybercrimes making add for the law
gaining unauthorized access to the data stored in them. A                 enforcers to enforce the law.
hacker refers to someone who secretively invades other’s
computers, inspecting or tampering with the programs or data
stored on them.                                                                          INFORMATION TECHNOLOGY SECURITY TECHNIQUES.

                                                                          NO.                Information security management system.
                                                                                       Country              ISO 9000     27001
C. Vishing.
                                                                          1            WORLD                951486       77326
2       CHINA                210773       146
3       ITALY                115309       148
4       JAPAN                731766       276
5       SPAIN                5112         93
6       INDIA                46091         94
7       USA                  36192
8

     Due to the concern of cyber security United States try to
allied with the Asian countries for example India try to
counteract the problem of Cyber security.
                                                                  Fig 1 Global Attack Trend.
C. Europe
  Headings .                                                         Fig. 1 shows the intensity of the situation according to
                                                                  different locations and areas on the earth surface .The
    1) Level-1 Heading: A level-1 heading must be in Small
                                                                  situation is bad and critical in areas were a lot of people are
    Caps, centred and numbered using uppercase Roman
                                                                  computer literate and exposed to the networking word.
    numerals. For example, see heading “III. Page Style” of
                                                                  Although the effort has been done the unified effort is must.
    this document. The two level-1 headings which must not
    be numbered are “Acknowledgment” and “References”.
                                                                      • The RED colour is for areas between (0.32-94.92)%
    2) Level-2 Heading: A level-2 heading must be in Italic,          • The YELLOW colour for areas between (0.03-0.24)%
    left-justified and numbered using an uppercase alphabetic         • The BLUE colour for areas between (0.01-0.02)%
    letter followed by a period. For example, see heading “C.
    Section Headings” above.                                      E. Australia.
    3) Level-3 Heading: A level-3 heading must be indented,         In Australia some countries around the area the effect has
                                                                  been seen also in recent days were the number of junk mails
    in Italic and numbered with an Arabic numeral followed by
    a right parenthesis. The level-3 heading must end with a      and online hackers has been increase tremendously.
    colon. The body of the level-3 section immediately follows
    the level-3 heading in the same paragraph. For example,
    this paragraph begins with a level-3 heading.                          IV. TERMINOLOGIES.
D. Africa.                                                        A. Malicious Codes.
   In Africa the situation is not very bad because few people
are exposed to the vulnerability due to limited number of
resources and networking facilities. Although in countries like
Nigeria were they are famous for online spam mails to the
online computer users are still not under control and their
number increase day after day. Some effort has been done to
counteract the situation by law enforcers but still not enough.




                                                                      Fig. 2 System Administrators in action protecting the server security.
VI. OVERCOMING CYBERCRIMES.
                                                                      Overcoming the cyber crimes is the main aim of cyber
                                                                   security in order to do that several aspects of has to be
                                                                   considered including.
                                                                   1) Security policy and legal framework: The security policy
                                                                   must be kept tight to prevent law breakers from committing
                                                                   cyber crimes. The legal framework especially must analyse
                                                                   the system to create more opportunities for law enforcers to
                                                                   prevent cyber criminals to commit their crimes.
                                                                     2) Law enforcement: The laws established to guide the
                                                                     right of privacy and ownership of product should be
     Fig 4 Percentage of cyber incidents 2008
                                                                     practiced by every government and privacy agency and
                                                                     should be enforced by law so that to protect the rights of
                                                                     properties online.
                                                                     3) Research and development: Worldwide research on
                                                                     cyber security should be implemented so as to face the new
                                                                     threat in the cyber world. The new ways of protection and
                                                                     encryption should be developed to overcome the tactics of
                                                                     experienced and more powerful hackers.
                                                                     4) International Collaboration: International cooperation
                                                                     is the most important thing if the war has to be won sharing
                                                                     the ideas and opinions on how to overcome the problem of
                                                                     cyber-crimes by establishing worldwide organisations to
                                                                     deal with the situation.


    Fig 3 Percentage of cyber incidents 2009
                                                                                            VII.CONCLUSIONS
                                                                   Cyber security is essentially about managing future risk and
                                                                   responding to current and past incidents and attacks. This
B. Scam.
                                                                   report has offered a highly standardized and clear model for
   All the activities involving tricking people online by          processing risk-management information about critical
making them to believe in something and sending money or           information infrastructures, one that can be applied at both the
valuable item is considered to be scam. Scam is totally illegal    international and national levels. The urgent task ahead is to
and serious punishment is applied to the offender.                 identify the key information flows that are required for cyber
C. Intrusion.                                                      security and to establish linkages among the various
                                                                   organizational entities that can best collect and use this
   An illegal entry via online into someone server or PC often     information.
by force and penetrating through the system security without
the permission of the user is considered to be Intrusion and it                              ACKNOWLEDGMENT
is a cyber crime.                                                     It has been a tremendous achievement to accomplish this
                                                                   report. I would like to thank the administration for what I have
D. Cyber-terrorism                                                 achieved, the department of Computer science in
   Terrorism involving the use of computer especially in           Dayanandasagar College and my class teacher Prathima.Also I
military operation is considered to be cyber terrorism in recent   would like to recognize the sources such as Microsoft Encarta
days there has been pressure between countries complaining         for the support.
one country has tried to obtain their military secret operation
using illegal computer activities.

                                  V.
REFERENCES
[1]   Microsoft student Encarta 2009 edition
[2]   www.verisign.com
[3]   Dr.B.Muthukumaran “CYBER CRIME SCENARIO IN INDIA”
[4]   www.wikipedia.com/cybersecurity.
[5]   www.itu.com
[6]   www.google.com.

Mais conteúdo relacionado

Mais procurados (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Ppt
PptPpt
Ppt
 

Destaque

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Strategic paper -11-cyber2 deconstructing cyber security in brazil
Strategic paper -11-cyber2 deconstructing cyber security in brazilStrategic paper -11-cyber2 deconstructing cyber security in brazil
Strategic paper -11-cyber2 deconstructing cyber security in brazilCMR WORLD TECH
 
CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document LeAnn Rhodes
 
Software Design Specification For Smart Internet Cafe
Software Design Specification For Smart Internet CafeSoftware Design Specification For Smart Internet Cafe
Software Design Specification For Smart Internet CafeHari
 
Blue ray disc seminar representation
Blue ray disc seminar representationBlue ray disc seminar representation
Blue ray disc seminar representationLikan Patra
 
European Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security TeamEuropean Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security Teamisc2-hellenic
 
Software Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet CafeSoftware Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet CafeHari
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 

Destaque (20)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Strategic paper -11-cyber2 deconstructing cyber security in brazil
Strategic paper -11-cyber2 deconstructing cyber security in brazilStrategic paper -11-cyber2 deconstructing cyber security in brazil
Strategic paper -11-cyber2 deconstructing cyber security in brazil
 
CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document
 
Software Design Specification For Smart Internet Cafe
Software Design Specification For Smart Internet CafeSoftware Design Specification For Smart Internet Cafe
Software Design Specification For Smart Internet Cafe
 
Cyber security vision since 2017
Cyber security vision since 2017Cyber security vision since 2017
Cyber security vision since 2017
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Blue ray disc seminar representation
Blue ray disc seminar representationBlue ray disc seminar representation
Blue ray disc seminar representation
 
European Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security TeamEuropean Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security Team
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
Software Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet CafeSoftware Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet Cafe
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 

Semelhante a Cybersecurity

Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxtanyamudgal4
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
Cyber security report in m asteral
Cyber security report in m asteralCyber security report in m asteral
Cyber security report in m asteralwhilma teodoro
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationRitik Kumar
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxNitishChoudhary23
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxHateMe9
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 

Semelhante a Cybersecurity (20)

Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security report in m asteral
Cyber security report in m asteralCyber security report in m asteral
Cyber security report in m asteral
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
188
188188
188
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Cyber security
Cyber security Cyber security
Cyber security
 

Mais de jumanne rajabu

Hdif innovation week, ecosystem meet-up Tanzania
Hdif innovation week, ecosystem meet-up TanzaniaHdif innovation week, ecosystem meet-up Tanzania
Hdif innovation week, ecosystem meet-up Tanzaniajumanne rajabu
 
Mobile Technologies For Socio-economic development Tanzania.
Mobile Technologies For Socio-economic development Tanzania.Mobile Technologies For Socio-economic development Tanzania.
Mobile Technologies For Socio-economic development Tanzania.jumanne rajabu
 
How to make a great Pitch
How to make a great PitchHow to make a great Pitch
How to make a great Pitchjumanne rajabu
 
Innovation ecosystem in tanzani
Innovation ecosystem in tanzaniInnovation ecosystem in tanzani
Innovation ecosystem in tanzanijumanne rajabu
 
Manufacturing in tanzania (1)
Manufacturing in  tanzania (1)Manufacturing in  tanzania (1)
Manufacturing in tanzania (1)jumanne rajabu
 
Hivos Energy Safari Building Cases
Hivos Energy Safari Building CasesHivos Energy Safari Building Cases
Hivos Energy Safari Building Casesjumanne rajabu
 
Manufacturing in tanzania
Manufacturing in  tanzaniaManufacturing in  tanzania
Manufacturing in tanzaniajumanne rajabu
 
Innovation & entrepreneurship tanzania
Innovation & entrepreneurship tanzania Innovation & entrepreneurship tanzania
Innovation & entrepreneurship tanzania jumanne rajabu
 
Innovation ecosystem tanzania
Innovation ecosystem tanzaniaInnovation ecosystem tanzania
Innovation ecosystem tanzaniajumanne rajabu
 
Tanzania Agriculture Commodity Exchange
Tanzania Agriculture Commodity ExchangeTanzania Agriculture Commodity Exchange
Tanzania Agriculture Commodity Exchangejumanne rajabu
 
Buni version 2.0 presentation
Buni version 2.0 presentation Buni version 2.0 presentation
Buni version 2.0 presentation jumanne rajabu
 
Buni version 2.0 presentation
Buni version 2.0 presentation Buni version 2.0 presentation
Buni version 2.0 presentation jumanne rajabu
 
Open data day presentation
Open data day presentationOpen data day presentation
Open data day presentationjumanne rajabu
 
Social media markerting
Social media markertingSocial media markerting
Social media markertingjumanne rajabu
 

Mais de jumanne rajabu (20)

Hdif innovation week, ecosystem meet-up Tanzania
Hdif innovation week, ecosystem meet-up TanzaniaHdif innovation week, ecosystem meet-up Tanzania
Hdif innovation week, ecosystem meet-up Tanzania
 
Mobile Technologies For Socio-economic development Tanzania.
Mobile Technologies For Socio-economic development Tanzania.Mobile Technologies For Socio-economic development Tanzania.
Mobile Technologies For Socio-economic development Tanzania.
 
How to make a great Pitch
How to make a great PitchHow to make a great Pitch
How to make a great Pitch
 
E learning tanzania
E learning tanzaniaE learning tanzania
E learning tanzania
 
Innovation ecosystem in tanzani
Innovation ecosystem in tanzaniInnovation ecosystem in tanzani
Innovation ecosystem in tanzani
 
Manufacturing in tanzania (1)
Manufacturing in  tanzania (1)Manufacturing in  tanzania (1)
Manufacturing in tanzania (1)
 
Hivos Energy Safari Building Cases
Hivos Energy Safari Building CasesHivos Energy Safari Building Cases
Hivos Energy Safari Building Cases
 
Manufacturing in tanzania
Manufacturing in  tanzaniaManufacturing in  tanzania
Manufacturing in tanzania
 
Innovation & entrepreneurship tanzania
Innovation & entrepreneurship tanzania Innovation & entrepreneurship tanzania
Innovation & entrepreneurship tanzania
 
Branding 4 start ups
 Branding 4 start ups  Branding 4 start ups
Branding 4 start ups
 
Innovation ecosystem tanzania
Innovation ecosystem tanzaniaInnovation ecosystem tanzania
Innovation ecosystem tanzania
 
Tanzania Agriculture Commodity Exchange
Tanzania Agriculture Commodity ExchangeTanzania Agriculture Commodity Exchange
Tanzania Agriculture Commodity Exchange
 
Buni version 2.0 presentation
Buni version 2.0 presentation Buni version 2.0 presentation
Buni version 2.0 presentation
 
Buni version 2.0 presentation
Buni version 2.0 presentation Buni version 2.0 presentation
Buni version 2.0 presentation
 
Azam TV prototype
Azam TV prototype Azam TV prototype
Azam TV prototype
 
T good trainer
T good trainerT good trainer
T good trainer
 
Power of google
Power of googlePower of google
Power of google
 
Open data day presentation
Open data day presentationOpen data day presentation
Open data day presentation
 
Social media markerting
Social media markertingSocial media markerting
Social media markerting
 
Social Media Basics
Social Media BasicsSocial Media Basics
Social Media Basics
 

Cybersecurity

  • 1. CYBER SECURITY Jumanne Rajabu Mtambalike Bsc.Computer science and electronics,Dayanandasagar College Bangalore University,India mtambalike@yahoo.co.uk jrmhza@gmail.com Web technologies. Bangalore,India www.webtechjr.blogspot.com Abstract— Cyber crime is emerging as serious threat. To the Vishing is the criminal practice of using social engineering world of computer technology, governments, police and Voice over IP (VoIP) to gain access to private personal, intelligence units are acting toward the issue closely. Different information from the public for the purpose of financial strategies are put into action. The effort is done to educate reward. The term is the combination of Voice and Phishing. people and to expose them to the idea that it is not safe D. Cyber stalking. anymore to navigate in the cyber world without security. This report is based on different research done by people and The term refers to the act of online stalking which involve Organization about cyber security. online harassment and abuse. It involves vandalizing property, threatening behaviours and message or objects which disturb Keywords— cyber-security, cyber-crime, Phishing and Hacking. the user of the Internet or cyber technologies. I. INTRODUCTION Cyber Security, techniques developed to safeguard III. GLOBAL ATTACK TREND. information and information systems stored on computers. Potential threats include the destruction of computer hardware Cyber security is a collective concern that is comprehensive in and software and the loss, modification, theft, unauthorized scope—the Internet has no National boundaries. Whereas use, observation, or disclosure of computer data. security is typically regulated at the government level, cyber security is at once national, international and private concerned. II. TYPES OF CYBERCRIME A. Asia. The need of cyber security is due to the increase of cyber The entire Asian continent is in the blink of cyber wars for crimes or online crimes. In recent years several new method example hostile cyber actions have taken place in the past and ways of practicing these crimes has been established between India and Pakistan, Azerbaijan and Armenia, and including: Japan and the People’s Republic of China. This indicates the A. Phishing. need and essentialness of cyber security around the word. It is among the internet fraud involving getting financial With every new application, newer vulnerabilities crop up, information illegally online spam e-mail pretending to be from posing immense challenges to those who are mandated to bank or any institution concerning with the user of the account protect the IT assets. asking him to send account number or password for verification while the original aim is to use the privacy of the B. America user for illegal activities. America and Canada especially North America are the most affected areas with cyber crimes due to the huge number B. Hacking. of computer literate people. In recent days teenagers are Hacking is the crime involves invading systems and extremely exposed into cybercrimes making add for the law gaining unauthorized access to the data stored in them. A enforcers to enforce the law. hacker refers to someone who secretively invades other’s computers, inspecting or tampering with the programs or data stored on them. INFORMATION TECHNOLOGY SECURITY TECHNIQUES. NO. Information security management system. Country ISO 9000 27001 C. Vishing. 1 WORLD 951486 77326
  • 2. 2 CHINA 210773 146 3 ITALY 115309 148 4 JAPAN 731766 276 5 SPAIN 5112 93 6 INDIA 46091 94 7 USA 36192 8 Due to the concern of cyber security United States try to allied with the Asian countries for example India try to counteract the problem of Cyber security. Fig 1 Global Attack Trend. C. Europe Headings . Fig. 1 shows the intensity of the situation according to different locations and areas on the earth surface .The 1) Level-1 Heading: A level-1 heading must be in Small situation is bad and critical in areas were a lot of people are Caps, centred and numbered using uppercase Roman computer literate and exposed to the networking word. numerals. For example, see heading “III. Page Style” of Although the effort has been done the unified effort is must. this document. The two level-1 headings which must not be numbered are “Acknowledgment” and “References”. • The RED colour is for areas between (0.32-94.92)% 2) Level-2 Heading: A level-2 heading must be in Italic, • The YELLOW colour for areas between (0.03-0.24)% left-justified and numbered using an uppercase alphabetic • The BLUE colour for areas between (0.01-0.02)% letter followed by a period. For example, see heading “C. Section Headings” above. E. Australia. 3) Level-3 Heading: A level-3 heading must be indented, In Australia some countries around the area the effect has been seen also in recent days were the number of junk mails in Italic and numbered with an Arabic numeral followed by a right parenthesis. The level-3 heading must end with a and online hackers has been increase tremendously. colon. The body of the level-3 section immediately follows the level-3 heading in the same paragraph. For example, this paragraph begins with a level-3 heading. IV. TERMINOLOGIES. D. Africa. A. Malicious Codes. In Africa the situation is not very bad because few people are exposed to the vulnerability due to limited number of resources and networking facilities. Although in countries like Nigeria were they are famous for online spam mails to the online computer users are still not under control and their number increase day after day. Some effort has been done to counteract the situation by law enforcers but still not enough. Fig. 2 System Administrators in action protecting the server security.
  • 3. VI. OVERCOMING CYBERCRIMES. Overcoming the cyber crimes is the main aim of cyber security in order to do that several aspects of has to be considered including. 1) Security policy and legal framework: The security policy must be kept tight to prevent law breakers from committing cyber crimes. The legal framework especially must analyse the system to create more opportunities for law enforcers to prevent cyber criminals to commit their crimes. 2) Law enforcement: The laws established to guide the right of privacy and ownership of product should be Fig 4 Percentage of cyber incidents 2008 practiced by every government and privacy agency and should be enforced by law so that to protect the rights of properties online. 3) Research and development: Worldwide research on cyber security should be implemented so as to face the new threat in the cyber world. The new ways of protection and encryption should be developed to overcome the tactics of experienced and more powerful hackers. 4) International Collaboration: International cooperation is the most important thing if the war has to be won sharing the ideas and opinions on how to overcome the problem of cyber-crimes by establishing worldwide organisations to deal with the situation. Fig 3 Percentage of cyber incidents 2009 VII.CONCLUSIONS Cyber security is essentially about managing future risk and responding to current and past incidents and attacks. This B. Scam. report has offered a highly standardized and clear model for All the activities involving tricking people online by processing risk-management information about critical making them to believe in something and sending money or information infrastructures, one that can be applied at both the valuable item is considered to be scam. Scam is totally illegal international and national levels. The urgent task ahead is to and serious punishment is applied to the offender. identify the key information flows that are required for cyber C. Intrusion. security and to establish linkages among the various organizational entities that can best collect and use this An illegal entry via online into someone server or PC often information. by force and penetrating through the system security without the permission of the user is considered to be Intrusion and it ACKNOWLEDGMENT is a cyber crime. It has been a tremendous achievement to accomplish this report. I would like to thank the administration for what I have D. Cyber-terrorism achieved, the department of Computer science in Terrorism involving the use of computer especially in Dayanandasagar College and my class teacher Prathima.Also I military operation is considered to be cyber terrorism in recent would like to recognize the sources such as Microsoft Encarta days there has been pressure between countries complaining for the support. one country has tried to obtain their military secret operation using illegal computer activities. V.
  • 4. REFERENCES [1] Microsoft student Encarta 2009 edition [2] www.verisign.com [3] Dr.B.Muthukumaran “CYBER CRIME SCENARIO IN INDIA” [4] www.wikipedia.com/cybersecurity. [5] www.itu.com [6] www.google.com.