2. What is Cyber Crime
Categorize of Cyber Crime
Types of Cyber Attacks
Security
Personal Measures
3. Criminal acts using Computers
and networks as tools or targets.
Cybercrime can be directed
towards persons, companies,
or government authorities.
4.
5. HACKING
DENIAL OF SERVICE ATTACK
COMPUTER VANDALISM
CYBER TERRORISM
SOFTWARE PIRACY
6. Hacking in simple terms means an
illegal intrusion into a computer system
and/or network. It is also known as
CRACKING.
Motive behind the crime : Adventure,
Revenge, Greed, Desire to access
forbidden information, Publicity.
Government websites are the hot targets
of the hackers due to the press coverage
it receives.
7. This is an act that ceases the
functioning of a service or program
by sending malicious datagrams
that can even cause the network
connections to fail.
For example: The criminal fills
victim’s e-mail box with spam mail
depriving him of the services he is
entitled to access or provide.
8. Damaging or destroying data rather than stealing or misusing them
by making malicious software termed as Malwares.
People who make malicious software are called Malware writers.
Types of Malwares are Viruses,Worms,Trojan Horse.
9. Targeted attacks on military installations, power plants, air traffic
control, banks, telecommunication networks.
Cyber terrorism is an attractive option for modern terrorists for
several reasons:
1) Cheaper and more anonymous than traditional terrorist methods.
2) Variety and number of targets are enormous.
3) Crime can be conducted remotely.
4) Has the potential to affect directly a larger number of people.
10. Theft of software through the illegal
copying of genuine programs
Or
the counterfeiting and distribution
of products intended to pass for the
original.
11.
12. Use virus detection software that is regularly
updated.
Password protected screen savers.
Secure physical set-up that is not open to the
public or unmonitored.
Require network logins if you are on a network.
Standardize the desktop so as to limit what an
end-user can and cannot do.
13. The server should be kept in a locked and
restricted area.
Administrative passwords and equivalencies
should be given to a minimal number of
people.
Administrative passwords should be changed
regularly.
Users should only be given access to file
systems that they will actually need to use.
Use of virus detection software that is
regularly updated.
14. Use of Firewalls :
Firewalls are a system or combination of
systems that supports an access control
policy between two networks.
A firewall can limit the types of
transactions that enter a system, as well as the
types of transactions that leave a system.
Use of powerful Encryption Techniques:
Provides secured transactions over the
internet. Ex: Public Key Cryptography
15.
16. Uninstall unnecessary software .
Check security settings.
Use a powerful antivirus software
and update it regularly.
Back-up your computer data on disks or CDs often.
Keep your operating system up to date with critical security
updates .
17. While using Internet:
Log-out and login on your accounts each day.
Disable unused accounts.
Change passwords of your accounts at least every 30 days.
Never give your full name or address to strangers on Internet.
Avoid sending any photograph online particularly to strangers.
Don't open emails or attachments from unknown sources.
Never send your credit card number to any site that is not secure.