2. WHAT IS CYBER SECURITY
Cyber security is the protection of
computer & network systems for
preventing -
• Theft
• Damage to the hardware & software
• Misdirection of the information
3. WHY CYBER SECURITY IS
IMPORTANT
• To ensure data protection
• Restrict unauthorized users
• Prevent losing data
• Ensuring privacy & confidentiality
• To keep safe from the cyber crime
4. WHAT IS CYBER CRIME
• Crime committed using a computer and the
internet to steal data or information.
• Illegal imports.
• Malicious programs.
5. A FEW REMARKABLE HISTORIES
1971 – John Draper builds a ‘blue box’ that
reproduces a 26kHz tone, which allows to
make free calls.
1981 – Ian Murphy, becomes first convict of a
computer crime, broke into a super shop’s
computers and changed the billing clock so
that people receive discounted rates during
normal business hours.
1986 – “Brain” the first standard computer
virus released.
1988 – National Bank of Chicago, first victim
6. 1991 – Kevin Poulsen was captured for selling
military secrets
1994 – A 16 year old UK student, got arrested
for accessing computers at the Korean Atomic
Research Institute, NASA and several US govt.
agencies.
1996 – Russian cracker attempts to extort
$100K from thousands of customers' credit
card numbers
2007 – First cyber warfare in Estonia
2010 – WikiLeaks released Iraq War
documents and Afghan War documents
A FEW REMARKABLE HISTORIES
(CONT.)
8. RECENT ATTACK IN
BANGLADESH
• In February 2016, US$951 million had been
illegally transferred from Bangladesh Bank.
• Issued via the SWIFT network.
• Withdrawn from a Bangladesh Bank account at
the Federal Reserve Bank of New York.
• $20 million traced in Sri Lanka (since
recovered) and $81 million in the Philippines
(about $18 million recovered).
• The Federal Reserve Bank of NY blocked the
remaining thirty transactions, amounting to
$850 million, at the request of Bangladesh
9. TYPES OF CYBER CRIME
A.Hacking
B.Theft / Piracy
C.Cyber stalking (spying)
D.Identity theft
E. Malicious program
F. Child soliciting & abuse
10. HACKING
• A person’s computer is
broken into so that his
personal or sensitive
information can be
accessed.
• A hacker uses a variety
of software to enter a
person’s computer and
the person may not be
aware that his computer
is being accessed from a
11. THEFT / PIRACY
• Copyright infringement
(piracy) occurs when a
person violates copyrights
and downloads music,
movies, games and
software.
• The owner of the
copyright gets no
monetary value of his
work from the pirated
12. CYBER STALKING
• This is a kind of online
harassment wherein the
victim is subjected to a
barrage of online
messages, emails &
pictures by the stalker.
• Typically, these stalkers
know their victims and
they use the internet to
stalk & spy.
13. IDENTITY THEFT
• A criminal accesses data
about a person’s bank
account, credit cards,
Social Security, debit card
and other sensitive
information to withdraw
money or to buy things
online in the victim’s
name.
• It can result in major
14. MALICIOUS SOFTWARE
• The software is used to
gain access to a system to
steal information or data
or causing damage to
other software or data
present in the system
• These can be Internet-
based software or
programs that are used to
disrupt a network
15. TYPES OF CYBER ATTACK
Financial fraud: 11%
Sabotage of data/networks: 17%
Theft of proprietary information:
20%
System penetration from the outside:
25%
Denial of service:
27%
Unauthorized access by insiders:
71%
17. PERSONAL SECURITY
• Never click on unknown links in emails.
• Do not give out personal information.
• Use recommended antivirus.
• Do not run non-familiar application.
• Keep information private in the social media.
• Keep operating system, browser, anti-virus
and other critical software up to date.
18. ORGANIZATIONAL SECURITY
• Cloud Backup & Pay for Premium Cloud
Security
• Call in an IT Security Consultant when needed
• Don’t let employees download any software
without permission
• Never share official files in social media
• Use portable drives with care
• Use business level antivirus software
19. NATIONAL CYBER SECURITY
• Constructing & applying proper laws for cyber
crime
• Confidential files should be shared with high
care
• Protect national bandwidth from being abused
• Taking proper steps to prevent hackers &
piracy
• Giving high priority on the development of IT
sector