Cyber_crime_presentation

Views:
 
Category: Education
     
 

Presentation Description

No description available.

Comments

By: pradeepjalla (134 month(s) ago)

Hello Sir, I take this opportunity to thank each one of you, for the unconditional support and the help you have shown over the past 8 months. First Indian corporation has been a great platform for me to learn and put them to practice, I kindly request you to relieve me from my services. I would like to serve a one month notice period effective from tomorrow, i.e. 04/07/2007.

Presentation Transcript

CYBER CRIME:

CYBER CRIME The Invisible Criminals Are Dangerous Than The Visible One…

Introduction: What It Is? “He Uses Technology As His Weapon”:

Introduction: What It Is ? “He Uses Technology As His Weapon” It Is A Criminal Activity Committed On The Internet . A Generalized Definition Of Cyber Crime May Be “Unlawful Acts Wherein The Computer Is Either A Tool Or Target Or Both” .

Introduction: What It Is? :

Introduction: What It Is ? Cyber crime offenses against the information technology infrastructure. Such conducts includes: Illegal access Illegal interception System interference Data interference Misuse of devices Fraud Forgery

WHY SHOULD WE CARE?:

WHY SHOULD WE CARE? It is important for computing professionals to understand cyber-terrorism for the benefit of themselves, their profession, and society as a whole.

WHY SHOULD WE CARE?:

WHY SHOULD WE CARE? The computer is being used as a new weapon to obtain results similar to the use of bombs, kidnappings or assignations…… The computer as the target. The computer as generator of new types of crimes. The computer as the tool of conventional crime.

THREATS TO COMPUTER SYSTEMS:

THREATS TO COMPUTER SYSTEMS Hacking Phreaking Viruses Worms Trojan horses Cyber Squatting Denial of Service Scans Sniffer Spoofing

THREATS TO COMPUTER SYSTEMS:

THREATS TO COMPUTER SYSTEMS Malicious Applets War Dialing Logic Bombs Buffer Overflow Password Crackers Dumpster Diving Crackers Script Bunnies Insiders

Security incidents between 1995 and 2003 :

Security incidents between 1995 and 2003

Security Incidents by Type :

Security Incidents by Type

PowerPoint Presentation:

Financial fraud : 11% Sabotage of data/networks: 17% Theft of proprietary information: 20% System penetration from the outside: 25% Denial of service: 27% Unauthorized access by insiders: 71% Employee abuse of internet privileges 79% Viruses : 85% Types of Cyberattacks, by percentage ( source- FBI)

PROTECTION AGAINST THREATS:

PROTECTION AGAINST THREATS Use of firewalls to screen all communications to a system, including e-mail messages, which may carry logic bombs. All accounts should have passwords and the password should be unusual and difficult to guess.

PROTECTION AGAINST THREATS:

PROTECTION AGAINST THREATS Change the network configuration when defects become known. Check with vendors for upgrades and patches Installation of anti-virus programs in the system can check spread of viruses and worms.

NEW TECHNOLOGY TO MONITOR CYBER CRIME:

NEW TECHNOLOGY TO MONITOR CYBER CRIME Cyber Cafe Monitoring System (CCMS) – This Technology Comprises Of A Biometric System For Recording Fingerprints Of Persons Who Use A Workstation. This Potent System Has Some Other Features Like Facility To Take Live Snapshots, Public IP Address And MAC Address.

Importance of Cyber Law :

Importance of Cyber Law Cyber Law is the law governing computers and the Internet . Unauthorized access Email bombing         Data diddling Logic bomb                 Virus / worm attack Trojan attack        Internet time theft      

SOLUTION TO CYBER CRIME :

SOLUTION TO CYBER CRIME Cybercheck – Secure Document Interchange For Transactions And On-line Payment. Cyberpos – Acquiring Of Payment Cards Via Internet.

SOLUTION TO CYBER CRIME:

SOLUTION TO CYBER CRIME CyberCheck – Ttransfer Of Interbank Clearing From “Platina” Bank To Multibank Clearing, Development Of New Software Based On XML Technology Along With Adding Digital Signature Of Customer Bank To The Standard Document.

SOLUTION TO CYBER CRIME:

SOLUTION TO CYBER CRIME С yberPOS – Coverage Of Major Russian Processors, Establishing Gateway With Foreign Processors.

Suggestions for better security:

Suggestions for better security Use Strong Passwords. Make Regular Back-up Of Critical Data. Use Virus Protection Software. Use A Firewall As A Gatekeeper Between Your Computer And The Internet. Do Not Keep Computers Online When Not In Use. Do Not Open E-mail Attachments From Strangers.

CONCLUSION:

CONCLUSION Without Careful Attention To These Issues, The Uncontrolled Interconnection Of Existing Systems, On Which People And Organisations Are Critically Dependent, Will Continue To Create Huge, Ill-defined And Defenceless Super - Systems . S o We Must Pay Attention To All Those Issues And Protect The World From Cyber Crime.

PowerPoint Presentation:

Thank You By Shruthi.D

authorStream Live Help