Date post: | 04-Apr-2018 |
Category: |
Documents |
Upload: | ekta-paliwal |
View: | 223 times |
Download: | 0 times |
of 19
7/31/2019 Cybercrime Namita Mam
1/19
The Invisible CriminalsAre Dangerous Than
7/31/2019 Cybercrime Namita Mam
2/19
Introduction: What It Is?He Uses Technology As His
Weapon
It Is A Criminal Activity Committed On The Internet .
A Generalized Definition Of Cyber Crime May Be
Unlawful Acts Wherein The Computer Is Either A
Tool Or Target Or Both.
7/31/2019 Cybercrime Namita Mam
3/19
Introduction: What It Is?
Cyber crime offenses against the informationtechnology infrastructure.
Such conducts includes:
Illegal access Illegal interception
System interference
Data interference
Misuse of devices Fraud
Forgery
7/31/2019 Cybercrime Namita Mam
4/19
WHY SHOULD WE CARE?
It is important for computing
professionals to understand cyber-terrorism for the benefit of themselves,
their profession, and society as a
whole.
7/31/2019 Cybercrime Namita Mam
5/19
WHY SHOULD WE CARE?The computer is being used as a newweapon to obtain results similar to the
use of bombs, kidnappings orassignations The computer as the target.
The computer as generator of new types of
crimes. The computer as the tool of conventional
crime.
7/31/2019 Cybercrime Namita Mam
6/19
THREATS TO COMPUTER
SYSTEMS Hacking
Phreaking
Viruses
Worms
Trojan horses
Cyber Squatting
Denial of Service
Scans
Sniffer
Spoofing
7/31/2019 Cybercrime Namita Mam
7/19
THREATS TO COMPUTER
SYSTEMS Malicious Applets
War Dialing
Logic Bombs
Buffer Overflow
PasswordCrackers
Dumpster Diving
Crackers
Script Bunnies
Insiders
7/31/2019 Cybercrime Namita Mam
8/19
Security incidents between
1995 and 2003
7/31/2019 Cybercrime Namita Mam
9/19
Financial fraud : 11%
Sabotage of data/networks: 17%
Theft of proprietary information: 20%
System penetration from the outside: 25%
Denial of service: 27%
Unauthorized access by insiders: 71%Employee abuse of internet privileges 79%
Viruses : 85%
Types of Cyberattacks,Types of Cyberattacks,
by percentage (by percentage (source-source- FBI)FBI)
7/31/2019 Cybercrime Namita Mam
10/19
PROTECTION AGAINST
THREATSUse of firewalls to screen all
communications to a system, including
e-mail messages, which may carry logic
bombs.
All accounts should have passwords andthe password should be unusual and
difficult to guess.
7/31/2019 Cybercrime Namita Mam
11/19
7/31/2019 Cybercrime Namita Mam
12/19
7/31/2019 Cybercrime Namita Mam
13/19
7/31/2019 Cybercrime Namita Mam
14/19
SOLUTION TO CYBER
CRIMECybercheck Secure Document
Interchange For Transactions And
On-line Payment.
Cyberpos Acquiring Of Payment
Cards Via Internet.
7/31/2019 Cybercrime Namita Mam
15/19
SOLUTION TO CYBER
CRIMECyberCheck
Ttransfer Of Interbank Clearing FromPlatina Bank To Multibank Clearing,
Development Of New Software Based On
XML Technology Along With AddingDigital Signature Of Customer Bank ToThe Standard Document.
7/31/2019 Cybercrime Namita Mam
16/19
SOLUTION TO CYBER
CRIME
yberPOS
Coverage Of Major Russian Processors,
Establishing Gateway With Foreign
Processors.
7/31/2019 Cybercrime Namita Mam
17/19
Suggestions for better security
Use Strong Passwords.
Make Regular Back-up Of Critical Data.
Use Virus Protection Software.Use A Firewall As A Gatekeeper Between Your
Computer And The Internet.
Do Not Keep Computers Online When Not In Use.
Do Not Open E-mail Attachments From Strangers.
7/31/2019 Cybercrime Namita Mam
18/19
CONCLUSION Without Careful Attention To These Issues, TheUncontrolled Interconnection Of Existing Systems, On
Which People And Organisations Are Critically
Dependent, Will Continue To Create Huge, Ill-definedAnd Defenceless Super - Systems.
So We Must Pay Attention To All Those
Issues And Protect The World From
Cyber Crime.
7/31/2019 Cybercrime Namita Mam
19/19