SlideShare uma empresa Scribd logo
1 de 20
CYBER SECURITY
PRESENTING BY:
KAZI SAZED SALMAN ID: 2015210001045
MUSTARY UMMA ASHA ID: 2015210001029
WHAT IS CYBER SECURITY
Cyber security is the protection of
computer & network systems for
preventing -
• Theft
• Damage to the hardware & software
• Misdirection of the information
WHY CYBER SECURITY IS
IMPORTANT
• To ensure data protection
• Restrict unauthorized users
• Prevent losing data
• Ensuring privacy & confidentiality
• To keep safe from the cyber crime
WHAT IS CYBER CRIME
• Crime committed using a computer and the
internet to steal data or information.
• Illegal imports.
• Malicious programs.
A FEW REMARKABLE HISTORIES
1971 – John Draper builds a ‘blue box’ that
reproduces a 26kHz tone, which allows to
make free calls.
1981 – Ian Murphy, becomes first convict of a
computer crime, broke into a super shop’s
computers and changed the billing clock so
that people receive discounted rates during
normal business hours.
1986 – “Brain” the first standard computer
virus released.
1988 – National Bank of Chicago, first victim
1991 – Kevin Poulsen was captured for selling
military secrets
1994 – A 16 year old UK student, got arrested
for accessing computers at the Korean Atomic
Research Institute, NASA and several US govt.
agencies.
1996 – Russian cracker attempts to extort
$100K from thousands of customers' credit
card numbers
2007 – First cyber warfare in Estonia
2010 – WikiLeaks released Iraq War
documents and Afghan War documents
A FEW REMARKABLE HISTORIES
(CONT.)
CYBERCRIMES IN 2013
RECENT ATTACK IN
BANGLADESH
• In February 2016, US$951 million had been
illegally transferred from Bangladesh Bank.
• Issued via the SWIFT network.
• Withdrawn from a Bangladesh Bank account at
the Federal Reserve Bank of New York.
• $20 million traced in Sri Lanka (since
recovered) and $81 million in the Philippines
(about $18 million recovered).
• The Federal Reserve Bank of NY blocked the
remaining thirty transactions, amounting to
$850 million, at the request of Bangladesh
TYPES OF CYBER CRIME
A.Hacking
B.Theft / Piracy
C.Cyber stalking (spying)
D.Identity theft
E. Malicious program
F. Child soliciting & abuse
HACKING
• A person’s computer is
broken into so that his
personal or sensitive
information can be
accessed.
• A hacker uses a variety
of software to enter a
person’s computer and
the person may not be
aware that his computer
is being accessed from a
THEFT / PIRACY
• Copyright infringement
(piracy) occurs when a
person violates copyrights
and downloads music,
movies, games and
software.
• The owner of the
copyright gets no
monetary value of his
work from the pirated
CYBER STALKING
• This is a kind of online
harassment wherein the
victim is subjected to a
barrage of online
messages, emails &
pictures by the stalker.
• Typically, these stalkers
know their victims and
they use the internet to
stalk & spy.
IDENTITY THEFT
• A criminal accesses data
about a person’s bank
account, credit cards,
Social Security, debit card
and other sensitive
information to withdraw
money or to buy things
online in the victim’s
name.
• It can result in major
MALICIOUS SOFTWARE
• The software is used to
gain access to a system to
steal information or data
or causing damage to
other software or data
present in the system
• These can be Internet-
based software or
programs that are used to
disrupt a network
TYPES OF CYBER ATTACK
Financial fraud: 11%
Sabotage of data/networks: 17%
Theft of proprietary information:
20%
System penetration from the outside:
25%
Denial of service:
27%
Unauthorized access by insiders:
71%
CYBER SECURITY STAGES
Personal
Security
Organiza
tional
Security
National
Security
PERSONAL SECURITY
• Never click on unknown links in emails.
• Do not give out personal information.
• Use recommended antivirus.
• Do not run non-familiar application.
• Keep information private in the social media.
• Keep operating system, browser, anti-virus
and other critical software up to date.
ORGANIZATIONAL SECURITY
• Cloud Backup & Pay for Premium Cloud
Security
• Call in an IT Security Consultant when needed
• Don’t let employees download any software
without permission
• Never share official files in social media
• Use portable drives with care
• Use business level antivirus software
NATIONAL CYBER SECURITY
• Constructing & applying proper laws for cyber
crime
• Confidential files should be shared with high
care
• Protect national bandwidth from being abused
• Taking proper steps to prevent hackers &
piracy
• Giving high priority on the development of IT
sector
THANKS EVERYONE…
IF YOU HAVE ANY QUERY, PLEASE FEEL FREE TO
ASK.

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
 
cyber security
cyber securitycyber security
cyber security
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Ppt
PptPpt
Ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
cyber security
cyber security cyber security
cyber security
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 

Destaque

Destaque (20)

Viscose Rayon (Cotton Modification)
Viscose Rayon (Cotton Modification)Viscose Rayon (Cotton Modification)
Viscose Rayon (Cotton Modification)
 
Cotton fibre dyeing in textile
Cotton fibre dyeing in textileCotton fibre dyeing in textile
Cotton fibre dyeing in textile
 
Springs & uses of springs
Springs & uses of springsSprings & uses of springs
Springs & uses of springs
 
Steam boiler & its use in Textile
Steam boiler & its use in TextileSteam boiler & its use in Textile
Steam boiler & its use in Textile
 
Balaka Blade (Bangladesh)
Balaka Blade (Bangladesh)Balaka Blade (Bangladesh)
Balaka Blade (Bangladesh)
 
Metal Alloys
Metal AlloysMetal Alloys
Metal Alloys
 
Speech / Reported Speech / Narration
Speech / Reported Speech / NarrationSpeech / Reported Speech / Narration
Speech / Reported Speech / Narration
 
Silk Manufacturing
Silk ManufacturingSilk Manufacturing
Silk Manufacturing
 
Recycling & Waste Management
Recycling & Waste ManagementRecycling & Waste Management
Recycling & Waste Management
 
Factors of production
Factors of productionFactors of production
Factors of production
 
Types of springs, its application and reasons
Types of springs, its application and reasonsTypes of springs, its application and reasons
Types of springs, its application and reasons
 
Springs
SpringsSprings
Springs
 
Mosque architecture of Bangladesh
Mosque architecture of BangladeshMosque architecture of Bangladesh
Mosque architecture of Bangladesh
 
Polyester & uses of polyester
Polyester & uses of polyesterPolyester & uses of polyester
Polyester & uses of polyester
 
Ppt springs
Ppt springsPpt springs
Ppt springs
 
Spring ppt
Spring pptSpring ppt
Spring ppt
 
Nanotechnology in textile
Nanotechnology in textileNanotechnology in textile
Nanotechnology in textile
 
Types of springs Design Machine Elements (DME)
Types of springs Design Machine Elements (DME)Types of springs Design Machine Elements (DME)
Types of springs Design Machine Elements (DME)
 
Design of mechanical spring
Design of mechanical springDesign of mechanical spring
Design of mechanical spring
 
mechanical springs
mechanical springsmechanical springs
mechanical springs
 

Semelhante a Cyber Crime and Cyber Security

Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8
Ajeet Choudhary
 

Semelhante a Cyber Crime and Cyber Security (20)

CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8
 
SYBER CRIME.pptx
SYBER CRIME.pptxSYBER CRIME.pptx
SYBER CRIME.pptx
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security
Cyber security        Cyber security
Cyber security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 

Último

➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
nirzagarg
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 

Último (20)

Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 

Cyber Crime and Cyber Security

  • 1. CYBER SECURITY PRESENTING BY: KAZI SAZED SALMAN ID: 2015210001045 MUSTARY UMMA ASHA ID: 2015210001029
  • 2. WHAT IS CYBER SECURITY Cyber security is the protection of computer & network systems for preventing - • Theft • Damage to the hardware & software • Misdirection of the information
  • 3. WHY CYBER SECURITY IS IMPORTANT • To ensure data protection • Restrict unauthorized users • Prevent losing data • Ensuring privacy & confidentiality • To keep safe from the cyber crime
  • 4. WHAT IS CYBER CRIME • Crime committed using a computer and the internet to steal data or information. • Illegal imports. • Malicious programs.
  • 5. A FEW REMARKABLE HISTORIES 1971 – John Draper builds a ‘blue box’ that reproduces a 26kHz tone, which allows to make free calls. 1981 – Ian Murphy, becomes first convict of a computer crime, broke into a super shop’s computers and changed the billing clock so that people receive discounted rates during normal business hours. 1986 – “Brain” the first standard computer virus released. 1988 – National Bank of Chicago, first victim
  • 6. 1991 – Kevin Poulsen was captured for selling military secrets 1994 – A 16 year old UK student, got arrested for accessing computers at the Korean Atomic Research Institute, NASA and several US govt. agencies. 1996 – Russian cracker attempts to extort $100K from thousands of customers' credit card numbers 2007 – First cyber warfare in Estonia 2010 – WikiLeaks released Iraq War documents and Afghan War documents A FEW REMARKABLE HISTORIES (CONT.)
  • 8. RECENT ATTACK IN BANGLADESH • In February 2016, US$951 million had been illegally transferred from Bangladesh Bank. • Issued via the SWIFT network. • Withdrawn from a Bangladesh Bank account at the Federal Reserve Bank of New York. • $20 million traced in Sri Lanka (since recovered) and $81 million in the Philippines (about $18 million recovered). • The Federal Reserve Bank of NY blocked the remaining thirty transactions, amounting to $850 million, at the request of Bangladesh
  • 9. TYPES OF CYBER CRIME A.Hacking B.Theft / Piracy C.Cyber stalking (spying) D.Identity theft E. Malicious program F. Child soliciting & abuse
  • 10. HACKING • A person’s computer is broken into so that his personal or sensitive information can be accessed. • A hacker uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a
  • 11. THEFT / PIRACY • Copyright infringement (piracy) occurs when a person violates copyrights and downloads music, movies, games and software. • The owner of the copyright gets no monetary value of his work from the pirated
  • 12. CYBER STALKING • This is a kind of online harassment wherein the victim is subjected to a barrage of online messages, emails & pictures by the stalker. • Typically, these stalkers know their victims and they use the internet to stalk & spy.
  • 13. IDENTITY THEFT • A criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to withdraw money or to buy things online in the victim’s name. • It can result in major
  • 14. MALICIOUS SOFTWARE • The software is used to gain access to a system to steal information or data or causing damage to other software or data present in the system • These can be Internet- based software or programs that are used to disrupt a network
  • 15. TYPES OF CYBER ATTACK Financial fraud: 11% Sabotage of data/networks: 17% Theft of proprietary information: 20% System penetration from the outside: 25% Denial of service: 27% Unauthorized access by insiders: 71%
  • 17. PERSONAL SECURITY • Never click on unknown links in emails. • Do not give out personal information. • Use recommended antivirus. • Do not run non-familiar application. • Keep information private in the social media. • Keep operating system, browser, anti-virus and other critical software up to date.
  • 18. ORGANIZATIONAL SECURITY • Cloud Backup & Pay for Premium Cloud Security • Call in an IT Security Consultant when needed • Don’t let employees download any software without permission • Never share official files in social media • Use portable drives with care • Use business level antivirus software
  • 19. NATIONAL CYBER SECURITY • Constructing & applying proper laws for cyber crime • Confidential files should be shared with high care • Protect national bandwidth from being abused • Taking proper steps to prevent hackers & piracy • Giving high priority on the development of IT sector
  • 20. THANKS EVERYONE… IF YOU HAVE ANY QUERY, PLEASE FEEL FREE TO ASK.