+ All Categories
Home > Technology > Cyber crime

Cyber crime

Date post: 19-Jul-2015
Category:
Upload: -
View: 53 times
Download: 0 times
Share this document with a friend
Popular Tags:
12
Presented by: Alena Popova Cyber Terrorism
Transcript
Page 1: Cyber crime

Presented by:

Alena Popova

Cyber Terrorism

Page 2: Cyber crime

WHAT IS CYBERCRIME?

• It is a criminal activity

committed on internet.

• In general “It is a unlawful act

wherein computer is either a

tool or target or both”

Page 3: Cyber crime

IT INCLUDES THE FOLL CONDUCTS…

• llegal access

• Illegal interception

• System interference

• Data interference

• Misuse of devices

• Fraud

• Forgery

Page 4: Cyber crime

• The Motivations Behind Attacks chart confirms the prevalence of

hacktivism with 56% of occurrences, exactly the same percentage

observed in January. Cyber Crime is stable at number two, even if its

percentage dropped from 40% to 31%. It is interesting to notice, month

after month, the growing number of Cyber Espionage campaigns

discovered.

Page 5: Cyber crime

WHY SHOULD WE CARE ?

• It is important for computing

professionals to understand cyber

terrorism for benefit of themselves,

their profession & society as whole.

• The computer is being used as a new

weapon to obtain results similar to use

of bombs, kidnapping…etc.

Page 6: Cyber crime
Page 7: Cyber crime

THREATS TO COMPUTER SYSTEM

• Hacking - Computer Hacking

is a practice of peeping into

the extreme technical details

of any computer application,

program, or the whole

system in order to extend its

capabilities or alter its

functionalities. People who

rightly follow this practice of

hacking are termed as

‘hackers’.

Page 8: Cyber crime

CONTINIOUS…

• Spoofing - spoofing is a technique whereby an attacker sends fake Address

Resolution Protocol (ARP) messages onto a Local Area Network. Generally,

the aim is to associate the attacker’s MAC address with the IP address of

another host , causing any traffic meant for that IP address to be sent to the

attacker instead.

Page 9: Cyber crime

CONTINIOUS…

• Viruses

• Computer viruses have harmed millions of computer around the world. Computer virus is a small malicious software computer program that is intentionally developed to harm computer software. It spreads from computer to computer and interferes with the functioning and performance of a computer. When a computer is infected with a virus, it runs slowly and becomes sluggish. There are problems with web-browsing. It fails to run smoothly, hangs, crashes, freezes, stops responding and gets frequent errors and restarts.

Page 10: Cyber crime

PROTECTION AGAINST THREATS

• New technology to monitor cyber Terrorism Cyber Café

Monitoring System. This technology comprises of a biometric

system for recording finger prints of persons who use a

workstation.

Page 11: Cyber crime

CONCLUSION

• Without careful attention to

these issues, the uncontrolled

interconnection of existing

system on which people and

organization are critically

dependent will continue to

create huge, ill defined and

defenseless super system.

• So we must pay attention to all

those issues and protect world

from cyber crime and terrorism

Page 12: Cyber crime

Recommended