SlideShare a Scribd company logo
1 of 33
CYBER CRIME AND SECURITY
If we can defeat them sitting at
home……who needs to fight with tanks
and guns!!!!
Presented By
Eng. Md.Tawhidur Rahman Pial
CCNA,CCNA-SEC,CCNP,
C|EH,CHFI,CNDA, E|CSA, L|PT, E|NSA, WiMAX+
,Telecom+, Network+, Security+, Linux+
Consultant of Cyber Crime & Digital Forensic
Visiting Scholar , Dept of IICT , BUET
CONTENTS
 Introduction.
 Definition.
 History.
 Cyber threat evolution.
 Categories of cyber crime.
 Types of cyber crime.
 Prevention.
 Security.
 Conclusion.
INTRODUCTION
The internet in Bangladesh is growing rapidly. It has
given rise to new opportunities in every field we can
think of be it entertainment, business, sports or
education.
There’re two sides to a coin. Internet also has it’s
own disadvantages is Cyber crime- illegal activity
committed on the internet.
Modern Day Crimes- Transnational crime
syndicates
What Is organized Crime?
Network of criminals working across the borders to synchronize criminal
activities such as extortion, drug trafficking, Human Trafficking,
Smuggling, cybercrime, etc.
 THE RUSSIAN MAFIA - Solntsevskaya Bravta , The brothers Circle, The
Odessa Mafia.
 THE ITALIAN MAFIA - Cosa Nostra(Sicily), La Stidda, Camorra (Naples).
 THE TRIADS (China)- Dai Huen Jai, 14 K (Hong Kong)
 THE YAKUZA (Japan)- Yamaguchi Gumi, Sumiyoshi Kai, Inagawa Kai.
According to FBI Transnational Organized criminal Syndicates are venturing
into the world of cyber crime diverting their attention from the traditional
methods. They are hiring top class hackers from all over the globe. The
interpol suggests that the Russian Mafia are one of the pioneers of the
international Cyber crime industry. Their strength and influence has lead
to rise in terror throughout the cyber world.
Cyber crime
HISTORY
• The first recorded cyber crime took place in the
year 1820.
• The first spam email took place in 1978 when it
was sent over the Arpanet.
• The first Virus was installed on an Apple
Computer in 1982.
CYBER THREAT EVOLUTION
CATEGORIZATION OF CYBER CRIME
• The Computer as a Target
• The computer as a weapon
TYPES OF CYBER CRIME
• Hacking
• Denial of service attack
• Virus Dissemination
• Computer Vandalism
• Cyber Terrorism
• Technology Crime
HACKING
• Hacking in simple terms means an illegal
intrusion into a computer system and/or
network.
DENIAL OF SERVICE ATTACK
• Act by the criminal, who floods the
bandwidth of the victims network.
• Is his e-mail box with spam mail depriving
him of the services.
VIRUS DISSEMINATION
• Malicious software that attaches itself to
other software. (virus, worms, Trojan
Horse, web jacking, e-mail bombing etc.)
COMPUTER VANDALISM
• Damaging or destroying data rather than
stealing.
• Transmitting virus
Types of Cyber Vandalism
Worms- usually spread through e-mails, attaches itself and resends itself
out through your e-mail contacts. Causes files to react slowly, and works its
way through individual and network computers.
Viruses- usually spread through innocent looking links and social network
sites attaching itself to applications, videos, and hyperlinks. Very harmful to
computers, causes hard drive failure, or can contain backdoor Trojan
programs which can contain key-loggers, remote access programs, open
pornography sites on its own, and access to total control over computer.
Computer Hacking – perpetrators break into security systems in order to
use services, change information, or steal information
CYBER TERRORISM
• Use of Internet based attacks in terrorist activities.
• Technology savvy terrorists are using 512-bit
encryption, which is impossible to decrypt.
Technology Crimes
• Technology used in crime commission other than
computers themselves- includes software
• These crimes often affect the elderly through
phone scams promising large cash prizes after
giving up personal information such as bank
account numbers, or social security numbers.
Types of Technology Crimes
Cell Phone Fraud- fraudulently or legitimately
obtained cell phones used for deceptive purposes
such as promises of fake charities or prizes
designed to illicit personal information and money
from people
Software Piracy- illegal downloads of software
from the internet
Types of Technology Crimes
Shoplifting Software
Physically stealing hardware for resale or
information
Theft of cable services
Cyber Theft
• Use of the internet in the distribution of unlawful
materials for profit or to commit fraud for swift
revenue returns
• These crimes promote child pornography, and
perpetrators swindle millions of dollars a year
from innocent people while remaining
anonymous.
Types of cyber theft
Computer Fraud- includes theft of information,
software, manipulation of bank and credit card
accounts, and corporate espionage
Unlawful distribution of pornography or drugs for profit
Illegal Copyright Infringement (Warez) – stealing
software, destroying it’s copyright information, then
posting on internet or file sharing
Internet securities fraud
Identity Theft- computer used to steal personal
information to obtain fraudulent loans, credit, or bank
account information
Cyber Warfare
• Cyber crime in which perpetrators have political
motives attached.
• These crimes may involve computer network
penetrations on military bases, defense
contractors, and aerospace companies. The goal
is to embezzle vital data and information.
Types of Cyber Warfare
Cyber Terrorism- enemies strike at targets without
bombs, such as the American economy, or use
the internet to gather information on future targets
without having to go behind enemy lines.
Cyber Warfare- use of hackers to infiltrate
important systems such as the pentagon, the
National Security Agency, and nuclear weapons
lab.
Can also be used to attack electric power and
essential services
TYPES OF CYBER ATTACK BY PERCENTAGE
• Financial fraud: 11%
• Sabotage of data/networks: 17%
• Theft of proprietary information: 20%
• System penetration from the outside: 25%
• Denial of service: 27%
• Unauthorized access by insiders: 71%
• Employee abuse of internet privileges 79%
• Viruses 85%
Recent Day Cyber Crime
 The majority of cybercrimes are centered on forgery,
fraud and Phishing,
 India is the third-most targeted country for Phishing
attacks after the US and the UK,
 Social networks as well as ecommerce sites are major
targets,
 6.9 million bot-infected systems in 2010,
 14,348 website defacements in 2010,
 6,850 .in and 4,150 .com domains were defaced during
2011,
 15,000 sites hacked in 2011,
 India is the number 1 country in the world for generating
spam.
Recent Day Cyber Crime
• Looking at the scam history, some of the popular scams have
been the ‘419 scam’,
• ‘See who viewed your profile!’,
• ‘Dad walks in on daughter …. Embarrassing!’,
• ‘The ‘dislike’ button’,
• ‘Make thousands working from home!’,
• Twitter direct messages with bad links,
• ‘Twitter mentions’,
• ‘Justin Bieber stabbed!’,
• ‘Your account has been cancelled.’,
• ‘Confirm your email account’,
• ‘Facebook will start charging members!’, and the list can go
on and on.
SAFETY TIPS FOR CYBER CRIME
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a genderless screen name.
• Never give your full name or address to strangers.
• Learn more about Internet privacy.
• Don’t open emails or attachments from unknown
sources.
• Disable Remote Connectivity.
5P mantra for
online
security
Precaution
Prevention
Protection
Preservation
Perseverance
Security
The growing phenomenon of cybercrime is
causing a whole new set of laws and law
enforcement processes.
This causes numerous challenges for law
enforcement, because technology changes
so rapidly it is hard to keep up with the
training
CYBER SECURITY
• Internet security is a branch of computer security
specifically related to the Internet.
• It's objective is to establish rules and measure to
use against attacks over the Internet.
Application/Web
Logging DB (ms sql)
Web Console
(DB/Processing)
Agents
(Workstations/Laptops
/Servers )
Private Site Server
Private Site Server
Network Shares
(Non agent data
sources)
Public Site Server
SilentRunner
Nodes with
Proxy Agent
Computer Emergency Response Team
(CERT ) – Architecture(CERT ) – Architecture
ADVANTAGES OF CYBER
SECURITY
• Defend us from critical attacks.
• Browse the safe website.
• Internet security process all the incoming and
outgoing data on our computer.
CONCLUSION
Technology is destructive only in the hands
of people who do not realize that they are
one and the same process as the universe.
References
1. Foster, R.E. (2000). Police Technology.
2. Upper Saddle River: Pearson Prentice Hall
3. Siegel, L.J. (2010). Criminology: Theories,
Patterns, and Typologies. Tenth Edition.
4. Belmont: Wadsworth Cengage Learning.
CYBER CRIME AND SECURITY

More Related Content

What's hot

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 

Similar to CYBER CRIME AND SECURITY

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
Arshad Khan
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 

Similar to CYBER CRIME AND SECURITY (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
cybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdfcybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdf
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

CYBER CRIME AND SECURITY

  • 1. CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Eng. Md.Tawhidur Rahman Pial CCNA,CCNA-SEC,CCNP, C|EH,CHFI,CNDA, E|CSA, L|PT, E|NSA, WiMAX+ ,Telecom+, Network+, Security+, Linux+ Consultant of Cyber Crime & Digital Forensic Visiting Scholar , Dept of IICT , BUET
  • 2. CONTENTS  Introduction.  Definition.  History.  Cyber threat evolution.  Categories of cyber crime.  Types of cyber crime.  Prevention.  Security.  Conclusion.
  • 3. INTRODUCTION The internet in Bangladesh is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet.
  • 4. Modern Day Crimes- Transnational crime syndicates What Is organized Crime? Network of criminals working across the borders to synchronize criminal activities such as extortion, drug trafficking, Human Trafficking, Smuggling, cybercrime, etc.  THE RUSSIAN MAFIA - Solntsevskaya Bravta , The brothers Circle, The Odessa Mafia.  THE ITALIAN MAFIA - Cosa Nostra(Sicily), La Stidda, Camorra (Naples).  THE TRIADS (China)- Dai Huen Jai, 14 K (Hong Kong)  THE YAKUZA (Japan)- Yamaguchi Gumi, Sumiyoshi Kai, Inagawa Kai. According to FBI Transnational Organized criminal Syndicates are venturing into the world of cyber crime diverting their attention from the traditional methods. They are hiring top class hackers from all over the globe. The interpol suggests that the Russian Mafia are one of the pioneers of the international Cyber crime industry. Their strength and influence has lead to rise in terror throughout the cyber world.
  • 6. HISTORY • The first recorded cyber crime took place in the year 1820. • The first spam email took place in 1978 when it was sent over the Arpanet. • The first Virus was installed on an Apple Computer in 1982.
  • 8. CATEGORIZATION OF CYBER CRIME • The Computer as a Target • The computer as a weapon
  • 9. TYPES OF CYBER CRIME • Hacking • Denial of service attack • Virus Dissemination • Computer Vandalism • Cyber Terrorism • Technology Crime
  • 10. HACKING • Hacking in simple terms means an illegal intrusion into a computer system and/or network.
  • 11. DENIAL OF SERVICE ATTACK • Act by the criminal, who floods the bandwidth of the victims network. • Is his e-mail box with spam mail depriving him of the services.
  • 12. VIRUS DISSEMINATION • Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)
  • 13. COMPUTER VANDALISM • Damaging or destroying data rather than stealing. • Transmitting virus
  • 14. Types of Cyber Vandalism Worms- usually spread through e-mails, attaches itself and resends itself out through your e-mail contacts. Causes files to react slowly, and works its way through individual and network computers. Viruses- usually spread through innocent looking links and social network sites attaching itself to applications, videos, and hyperlinks. Very harmful to computers, causes hard drive failure, or can contain backdoor Trojan programs which can contain key-loggers, remote access programs, open pornography sites on its own, and access to total control over computer. Computer Hacking – perpetrators break into security systems in order to use services, change information, or steal information
  • 15. CYBER TERRORISM • Use of Internet based attacks in terrorist activities. • Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 16. Technology Crimes • Technology used in crime commission other than computers themselves- includes software • These crimes often affect the elderly through phone scams promising large cash prizes after giving up personal information such as bank account numbers, or social security numbers.
  • 17. Types of Technology Crimes Cell Phone Fraud- fraudulently or legitimately obtained cell phones used for deceptive purposes such as promises of fake charities or prizes designed to illicit personal information and money from people Software Piracy- illegal downloads of software from the internet
  • 18. Types of Technology Crimes Shoplifting Software Physically stealing hardware for resale or information Theft of cable services
  • 19. Cyber Theft • Use of the internet in the distribution of unlawful materials for profit or to commit fraud for swift revenue returns • These crimes promote child pornography, and perpetrators swindle millions of dollars a year from innocent people while remaining anonymous.
  • 20. Types of cyber theft Computer Fraud- includes theft of information, software, manipulation of bank and credit card accounts, and corporate espionage Unlawful distribution of pornography or drugs for profit Illegal Copyright Infringement (Warez) – stealing software, destroying it’s copyright information, then posting on internet or file sharing Internet securities fraud Identity Theft- computer used to steal personal information to obtain fraudulent loans, credit, or bank account information
  • 21. Cyber Warfare • Cyber crime in which perpetrators have political motives attached. • These crimes may involve computer network penetrations on military bases, defense contractors, and aerospace companies. The goal is to embezzle vital data and information.
  • 22. Types of Cyber Warfare Cyber Terrorism- enemies strike at targets without bombs, such as the American economy, or use the internet to gather information on future targets without having to go behind enemy lines. Cyber Warfare- use of hackers to infiltrate important systems such as the pentagon, the National Security Agency, and nuclear weapons lab. Can also be used to attack electric power and essential services
  • 23. TYPES OF CYBER ATTACK BY PERCENTAGE • Financial fraud: 11% • Sabotage of data/networks: 17% • Theft of proprietary information: 20% • System penetration from the outside: 25% • Denial of service: 27% • Unauthorized access by insiders: 71% • Employee abuse of internet privileges 79% • Viruses 85%
  • 24. Recent Day Cyber Crime  The majority of cybercrimes are centered on forgery, fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam.
  • 25. Recent Day Cyber Crime • Looking at the scam history, some of the popular scams have been the ‘419 scam’, • ‘See who viewed your profile!’, • ‘Dad walks in on daughter …. Embarrassing!’, • ‘The ‘dislike’ button’, • ‘Make thousands working from home!’, • Twitter direct messages with bad links, • ‘Twitter mentions’, • ‘Justin Bieber stabbed!’, • ‘Your account has been cancelled.’, • ‘Confirm your email account’, • ‘Facebook will start charging members!’, and the list can go on and on.
  • 26. SAFETY TIPS FOR CYBER CRIME • Use antivirus software’s. • Insert firewalls. • Uninstall unnecessary software • Maintain backup. • Check security settings. • Stay anonymous - choose a genderless screen name. • Never give your full name or address to strangers. • Learn more about Internet privacy. • Don’t open emails or attachments from unknown sources. • Disable Remote Connectivity. 5P mantra for online security Precaution Prevention Protection Preservation Perseverance
  • 27. Security The growing phenomenon of cybercrime is causing a whole new set of laws and law enforcement processes. This causes numerous challenges for law enforcement, because technology changes so rapidly it is hard to keep up with the training
  • 28. CYBER SECURITY • Internet security is a branch of computer security specifically related to the Internet. • It's objective is to establish rules and measure to use against attacks over the Internet.
  • 29. Application/Web Logging DB (ms sql) Web Console (DB/Processing) Agents (Workstations/Laptops /Servers ) Private Site Server Private Site Server Network Shares (Non agent data sources) Public Site Server SilentRunner Nodes with Proxy Agent Computer Emergency Response Team (CERT ) – Architecture(CERT ) – Architecture
  • 30. ADVANTAGES OF CYBER SECURITY • Defend us from critical attacks. • Browse the safe website. • Internet security process all the incoming and outgoing data on our computer.
  • 31. CONCLUSION Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.
  • 32. References 1. Foster, R.E. (2000). Police Technology. 2. Upper Saddle River: Pearson Prentice Hall 3. Siegel, L.J. (2010). Criminology: Theories, Patterns, and Typologies. Tenth Edition. 4. Belmont: Wadsworth Cengage Learning.