logging in or signing up cyber crime prejish Download Post to : URL : Related Presentations : Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Uploaded from authorPOINT lite Insert YouTube videos in PowerPont slides with aS Desktop Copy embed code: Embed: Flash iPad Copy Does not support media & animations WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 11145 Category: Science & Tech.. License: All Rights Reserved Like it (12) Dislike it (0) Added: September 08, 2010 This Presentation is Public Favorites: 33 Presentation Description No description available. Comments Posting comment... By: ishanka3208 (2 month(s) ago) nice presentation ... Saving..... Post Reply Close Saving..... Edit Comment Close By: amir967231 (2 month(s) ago) PLZ SEND THIS PPT TO ME.....I NED IT.......EMAIL IS....AMIR225692@GMAIL.COM Saving..... Post Reply Close Saving..... Edit Comment Close By: Sufiyan26235 (3 month(s) ago) can u plz send this ppt at email@example.com Saving..... Post Reply Close Saving..... Edit Comment Close By: kd4480 (3 month(s) ago) can u plzz email this presentation...its really awesome..and I need it...my email id firstname.lastname@example.org Saving..... Post Reply Close Saving..... Edit Comment Close By: tyyug (5 month(s) ago) hadchi zewine Saving..... Post Reply Close Saving..... Edit Comment Close loading.... See all Premium member Presentation Transcript Slide 1: PRESENTED BY:- PREJISH NAIR CYBER TERRORISM Slide 2: What is cyber terrorism? It is a criminal activity committed on internet. In general “It is a unlawful act wherein computer is either a tool or target or both” Slide 3: Illegal access Illegal interception System interference Data interference Misuse of devices Fraud Forgery It includes the foll conducts :- Slide 5: why should WE care ? It is important for computing professionals to understand cyber terrorism for benefit of themselves, their profession & society as whole. The computer is being used as a new weapon to obtain results similar to use of bombs, kidnapping, etc Slide 7: Threats to computer system :- Hacking Sniffing Spoofing Cont…. : Cont…. Viruses Worms Cont… : Cont… Denial of service Trojan horse Slide 10: Terrorist groups Slide 11: Types of attack done in various sectors Financial fraud 11% Theft of information 17% Denial of service 27% Unauthorized access by insider 71% Viruses 85% Slide 12: Protection against threats Use of firewalls Passwords and login- Id Antivirus Change network configuration Backup of data and information Slide 13: New technology to monitor cyber Terrorism Cyber Café Monitoring System This technology comprises of a biometric system for recording finger prints of persons who use a workstation. This potent system has some other features like facility to take live snapshots , public IP address and MAC address Slide 14: The importance of cyber law Person found doing activities such as :- Tampering with computer source documents Hacking with computer system Publishing of information which is obscene in electronic form Misrepresentation Breach of confidentiality and privacy Slide 15: Cont… Publishing digital signature false in certain particulars Publication of unlawful document for fraudulent purpose Can be charged up to rupees 1 to 3 Lakhs OR Can get imprisonment for 2 to 10 Years OR Both can be implemented according to the law Slide 16: Without careful attention to these issues, the uncontrolled interconnection of existing system on which people and organization are critically dependent will continue to create huge, ill defined and defenseless super system. So we must pay attention to all those issues and protect world from cyber crime and terrorism Conclusion Slide 17: THANKS!!! You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.