1/62
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cybercrime
is nothing but where the computer is used as an object or subject of crime!
worm program
written by a college student shut down about 10 percent of computers connected to the Internet. This was the beginning of the era of cyber attacks.
1920
on what year does worm program begins?
1997
what year does virus
1995
Breaking Web Sites
2000
Malicious Code (Melissa)
2003 - 2004
Advanced Worm/ Trojan (I Love You)
2005 - 2006
Identity Theft (Phishing)
2007 - 2008
Organised Crime Data Theft, DoS/DDoS
The Computer as a Target
The computer as a weapon
Categorization of Cyber crime
Hacking
Denial of service attack
Virus Dissemination
Computer Vandalism
Cyber Terrorism
Software Piracy
Types of Cyber crime
Hacking
Malware
Phishing
Rootkits
Spam
Spyware
Trojans
Viruses
Examples of Cybercrime
Hacking
in simple terms means an illegal intrusion into a computer system and/or network .Also called as cracking
Cracking
Hacking also called
Hacking
means finding out weaknesses in an established system and exploiting them.
computer hacker
is a person who finds out weaknesses in the computer and exploits it.
For profit, protest, or challenge.
A large fraction of hacker attacks have been pranks
Financial Gain
Revenge
Venting anger at a company or organization
Terrorism
Why do hackers attack?
Denial of Service Attack
Attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the system so that no one else can use it.
Denial of Service Attack
Act by the criminal, who floods the bandwidth of the victims network.
Virus Dissemination
Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)
Computer Vandalism
Damaging or destroying data rather than stealing.
Computer Vandalism
Transmitting virus
Cyber Terrorism
Use of Internet based attacks in terrorist activities.
Cyber Terrorism
Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
Software Piracy
Theft of software through the illegal copying of genuine programs.
Software Piracy
Distribution of products intended to pass for the original.
Cyber security
is a branch of computer security specifically related to the Internet.
Cyber security
It's objective is to establish rules and measure to use against attacks over the Internet.
Defend us from critical attacks.
Browse the safe website.
Internet security process all the incoming and outgoing data on our computer.
Advantages of Cyber Security
Install OS/SoftwareUpdates
Run Anti-virus Software
Prevent IdentityTheft
Protect Passwords
Avoid Spyware/Adware
Turn on Personal Firewalls
Back up ImportantFiles
Top Seven Cyber-Safety Actions
Install OS/Software Updates
Updates-sometimes called patches-fix problems with your operating system (OS) (e.g., Windows XP, Windows Vista, Mac OS X) and software programs (e.g., Microsoft Office applications).
Install OS/Software Updates
Most new operating systems are set to download updates by default.
Install OS/Software Updates
Be sure to restart your computer after updates are installed so that the patches can be applied immediately.
Run Anti-Virus Software
To avoid computer problems caused by viruses, install and run an anti-virus program like Norton,Quick Heal,etc.
Run Anti-Virus Software
Periodically, check to see if your anti-virus is up to date by opening your anti-virus program and checking the Last updated date.
Anti-virus software
removes viruses, quarantines and repairs infected files, and can help prevent future viruses.
Prevent Identity Theft
Don't give out financial account numbers, Social Security numbers, driver’s license numbers or other personal identity information unless you know exactly who's receiving it. Protect others people’s information as you would your own.
Prevent Identity Theft
Never send personal or confidential information via email or instant messages as these can be easily intercepted.
Beware of phishing scams
a form of fraud that uses email messages that appear to be from a reputable business (often a financial institution) in an attempt to gain personal or account information. Legitimate businesses will not ask for personal information online.
Protect Passwords
Do not share your passwords, and always make new passwords difficult to guess by avoiding dictionary words, and mixing letters, numbers and punctuation.
Protect Passwords
Do not use one of these common passwords or any variation of them: qwerty1, letmein,etc.
Protect Passwords
Change your passwords periodically.
Mix upper and lower case letters
Use a minimum of 8 characters
Use mnemonics to help you remember a difficult password
When choosing a password:
Protect Passwords
Store passwords in a safe place. Consider using KeePass Password Safe , an encrypted USB drive to store passwords.
Spyware and adware
take up memory and can slow down your computer or cause other problems.
Avoid Spyware/Adware
Use Spybot and Ad-Aware to remove spyware/adware from your computer
Avoid Spyware/Adware
Watch for allusions to spyware and adware in user agreements before installing free software programs.
Avoid Spyware/Adware
Be wary of invitations to download software from unknown internet sources.
Firewalls
act as protective barriers between computers and the internet.
Turn on Personal Firewalls
Check your computer's security settings for a built-in personal firewall. If you have one, turn it on. Microsoft Vista and Mac OSX have built-in firewalls.
Turn on Personal Firewalls
Once your firewall is turned on, test your firewall for open ports that could allow in viruses and hackers.
Turn on Personal Firewalls
Hackers search the Internet by sending out pings (calls) to random computers and wait for responses. Firewalls prevent your computer from responding to these calls.
Back up Important Files
Reduce your risk of losing important files to a virus, computer crash, theft or disaster by creating back-up copies.
Back up Important Files
Keep your critical files in one place on your computer’s hard drive so you can easily create a back up copy.
Back up Important Files
Save copies of your important documents and files to a CD, online back up service, flash or USB drive, or a server.
Back up Important Files
Store your back-up media in a secure place away from your computer, in case of fire or theft.
Cyber Safety at Home
Physically secure your computer by using security cables and locking doors and windows in the dorms and off- campus housing.
Cyber Safety at Home
Avoid leaving your laptop unsupervised and in plain view in the library or coffee house, or in your car, dorm room or home.
Cyber Safety at Home
Set up a user account and password to prevent unauthorized access to your computer files.
Cyber Security at work
Be sure to work with your technical support coordinator before implementing new cyber-safety measures.
Cyber Security at work
Report to your supervisor any cyber-safety policy violations, security flaws/weaknesses you discover or any suspicious activity by unauthorized individuals in your work area.
Cyber Security at work
Physically secure your computer by using security cables and locking building/office doors and windows.
Cyber Security at work
Do not install unnecessary programs on your work computer.