SlideShare uma empresa Scribd logo
1 de 26
Cybercrime and Security
Team Members
Maliha Rahman (2014-3-50-007)
Noushad Hasan Jabin (2014-3-50-
025)
Sauradip Roy (2014-3-50-008)
Topics will be covered
 Introduction
 History of cybercrime
 Authenticity,Security,Privacy
 Database security
 Social Engineering & protection
 Database security
 Different cyber attacking methods
 Security tips
 What we covered
 References
Introduction
◇Cyber crime is Harmful or unlawful
acts wherein the computer is either a
tool or target or both.
◇Online or Internet-based illegal acts.
History of Cyber Crime
 The first recorded cyber crime took place
in the year 1820.
 The first spam email took place in 1978
when it was sent over the Arpanet.
 The first VIRUS was installed on an
Apple computer in 1982.
Authenticity, Security,
Privacy
Authenticity is assurance that a message, transaction,
or other exchange of information is from the source it
claims to be from. Authenticity involves proof of
identity.
Different Authentications:
1. Digital certificates
2. USB token
3. Password based Authentication
4. Biometric authentications (Fingerprints, Retina
Scans)
Security
Security simply refers to the term
Cyber security.
Cybersecurity is the technologies &
processes which protects networks,
computers, programs and data
from attack, damage or
unauthorized access.
Place your screenshot here
Privacy
◇Privacy is your right to control
what happens with personal
information about you.
◇Using Internet may affects
someones personal data &
Identity.
Social Engineering
◇Social engineering is the art of manipulating
people so they give up confidential information
such as password and the control over their
computers.
◇Protections:
●First & foremost is user consciousness
●Avoid installing third party softwares
●System firewall is turned on
●2 step authentication for log into account
●Code generator
●Trusted Contacts
Database
Security
DATABASE SECURITY
FEATURES
■Digital Certificate is a unique identifier given to an entity
to provide authentication of a computer, document, or
webpage.
■Encryptions alter the data so unauthorized users cannot
view data information.
■Firewalls protect a network from unauthorized access
from the internet.
■Proxy Servers shield the requests between the client
computers inside a private network and the internet.
■Security Socket Layer connects and transmits encrypted
data.
■S-HTTP (secure hypertext transport protocol) transmits
web pages securely.
RESPONSIBLITIES OF THE
DATABASE ADMINISTRATOR
◇Always keep in mind that whenever a system has
internet and network connections attached to a DBMS,
security breaches may occur.
◇Perform routine backup recovery procedures incase
of electrical outage and intruder attacks that can
damage the DBMS.
Built in Database Protection
◇They create built in solutions such
as:
■Password Controls
■Data access based on roles and profiles
■IP restrictions for off site access
■Auditing capabilities of who has run what reports
■Security logging
Different Cyber Attacking
Methods
Cyber attacks
◇Trojan horse attack
◇Backdoors
◇Keyloggers
◇DDoS Attack
◇Man in the Middle attack
Trojan Horse Attack
Trojan Horse
arrives via email
or software like
free games.
Trojan Horse is
activated when
the software or
attachment is
executed.
Trojan Horse releases
virus, monitors
computer activity,
installs backdoor, or
transmits information
to hacker.
BackDoors
◇A backdoor is a technique in
which a system security
mechanism is bypassed
undetectably to access a computer
or its data.
◇The backdoor access method is
sometimes written by the
programmer who develops a
program.
KeyLoggers
◇A keylogger is a type
of software(Spyware)
that records every
keystrokes in a log file
by encrypting this and
sends it to the hackers
email.
DDoS(Distributed denial of
service)
◇A
distributed (DDoS) attack o
ccurs when a group of
attacker use multiple
systems to flood the
bandwidth or resources of a
targeted system, usually one
or more web servers.
Man in the middle attack
◇In this attack a
Hacker inserts
himself as a middle
man between the
two parties or
mostly between the
network router an
its connected
devices to catch
their packets and
credentials.
Safety Tips:
◇Use antivirus software
◇Insert firewalls , pop up blocker
◇Uninstall unnecessary software
◇Maintain backup
 Check security settings
 Use secure connection
 Open attachments carefully
 Use strong passwords ,
don’t give personal
information unless required
References
◇https://www.scribd.com/doc/71120466/The-First-
Recorded-Cyber-Crime-Took-Place-in-the-Year-1820
Thanks!
Any questions?
SlidesCarnival icons are editable shapes.
This means that you can:
● Resize them without losing quality.
● Change fill color and opacity.
● Change line color, width and style.
Isn’t that nice? :)
Examples:
Now you can use any emoji as an icon!
And of course it resizes without losing quality and you can change the
color.
How? Follow Google instructions
https://twitter.com/googledocs/status/730087240156643328
✋👆👉👍👤👦👧👨👩👪💃🏃💑❤😂
😉😋😒😭👶😸🐟🍒🍔💣📌📖🔨🎃🎈
🎨🏈🏰🌏🔌🔑 and many more...
😉

Mais conteúdo relacionado

Mais procurados

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 

Mais procurados (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 

Semelhante a Cybercrime and Security

Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
Kak Yong
 
Ch19 OS
Ch19 OSCh19 OS
Ch19 OS
C.U
 

Semelhante a Cybercrime and Security (20)

Computer security and
Computer security andComputer security and
Computer security and
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
cyber security
cyber security cyber security
cyber security
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Data security
Data securityData security
Data security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
OSCh19
OSCh19OSCh19
OSCh19
 
OS_Ch19
OS_Ch19OS_Ch19
OS_Ch19
 
Ch19 OS
Ch19 OSCh19 OS
Ch19 OS
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
cyber security
cyber security cyber security
cyber security
 
Network security
Network security Network security
Network security
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Cybercrime and Security

  • 2. Team Members Maliha Rahman (2014-3-50-007) Noushad Hasan Jabin (2014-3-50- 025) Sauradip Roy (2014-3-50-008)
  • 3. Topics will be covered  Introduction  History of cybercrime  Authenticity,Security,Privacy  Database security  Social Engineering & protection  Database security  Different cyber attacking methods  Security tips  What we covered  References
  • 4. Introduction ◇Cyber crime is Harmful or unlawful acts wherein the computer is either a tool or target or both. ◇Online or Internet-based illegal acts.
  • 5. History of Cyber Crime  The first recorded cyber crime took place in the year 1820.  The first spam email took place in 1978 when it was sent over the Arpanet.  The first VIRUS was installed on an Apple computer in 1982.
  • 6. Authenticity, Security, Privacy Authenticity is assurance that a message, transaction, or other exchange of information is from the source it claims to be from. Authenticity involves proof of identity. Different Authentications: 1. Digital certificates 2. USB token 3. Password based Authentication 4. Biometric authentications (Fingerprints, Retina Scans)
  • 7. Security Security simply refers to the term Cyber security. Cybersecurity is the technologies & processes which protects networks, computers, programs and data from attack, damage or unauthorized access.
  • 8. Place your screenshot here Privacy ◇Privacy is your right to control what happens with personal information about you. ◇Using Internet may affects someones personal data & Identity.
  • 9. Social Engineering ◇Social engineering is the art of manipulating people so they give up confidential information such as password and the control over their computers. ◇Protections: ●First & foremost is user consciousness ●Avoid installing third party softwares ●System firewall is turned on ●2 step authentication for log into account ●Code generator ●Trusted Contacts
  • 11. DATABASE SECURITY FEATURES ■Digital Certificate is a unique identifier given to an entity to provide authentication of a computer, document, or webpage. ■Encryptions alter the data so unauthorized users cannot view data information. ■Firewalls protect a network from unauthorized access from the internet. ■Proxy Servers shield the requests between the client computers inside a private network and the internet. ■Security Socket Layer connects and transmits encrypted data. ■S-HTTP (secure hypertext transport protocol) transmits web pages securely.
  • 12. RESPONSIBLITIES OF THE DATABASE ADMINISTRATOR ◇Always keep in mind that whenever a system has internet and network connections attached to a DBMS, security breaches may occur. ◇Perform routine backup recovery procedures incase of electrical outage and intruder attacks that can damage the DBMS.
  • 13. Built in Database Protection ◇They create built in solutions such as: ■Password Controls ■Data access based on roles and profiles ■IP restrictions for off site access ■Auditing capabilities of who has run what reports ■Security logging
  • 15. Cyber attacks ◇Trojan horse attack ◇Backdoors ◇Keyloggers ◇DDoS Attack ◇Man in the Middle attack
  • 16. Trojan Horse Attack Trojan Horse arrives via email or software like free games. Trojan Horse is activated when the software or attachment is executed. Trojan Horse releases virus, monitors computer activity, installs backdoor, or transmits information to hacker.
  • 17. BackDoors ◇A backdoor is a technique in which a system security mechanism is bypassed undetectably to access a computer or its data. ◇The backdoor access method is sometimes written by the programmer who develops a program.
  • 18.
  • 19. KeyLoggers ◇A keylogger is a type of software(Spyware) that records every keystrokes in a log file by encrypting this and sends it to the hackers email.
  • 20. DDoS(Distributed denial of service) ◇A distributed (DDoS) attack o ccurs when a group of attacker use multiple systems to flood the bandwidth or resources of a targeted system, usually one or more web servers.
  • 21. Man in the middle attack ◇In this attack a Hacker inserts himself as a middle man between the two parties or mostly between the network router an its connected devices to catch their packets and credentials.
  • 22. Safety Tips: ◇Use antivirus software ◇Insert firewalls , pop up blocker ◇Uninstall unnecessary software ◇Maintain backup  Check security settings  Use secure connection  Open attachments carefully  Use strong passwords , don’t give personal information unless required
  • 25. SlidesCarnival icons are editable shapes. This means that you can: ● Resize them without losing quality. ● Change fill color and opacity. ● Change line color, width and style. Isn’t that nice? :) Examples:
  • 26. Now you can use any emoji as an icon! And of course it resizes without losing quality and you can change the color. How? Follow Google instructions https://twitter.com/googledocs/status/730087240156643328 ✋👆👉👍👤👦👧👨👩👪💃🏃💑❤😂 😉😋😒😭👶😸🐟🍒🍔💣📌📖🔨🎃🎈 🎨🏈🏰🌏🔌🔑 and many more... 😉