+ All Categories
Home > Documents > Cybercrime Namita Mam

Cybercrime Namita Mam

Date post: 04-Apr-2018
Category:
Upload: ekta-paliwal
View: 223 times
Download: 0 times
Share this document with a friend

of 19

Transcript
  • 7/31/2019 Cybercrime Namita Mam

    1/19

    The Invisible CriminalsAre Dangerous Than

  • 7/31/2019 Cybercrime Namita Mam

    2/19

    Introduction: What It Is?He Uses Technology As His

    Weapon

    It Is A Criminal Activity Committed On The Internet .

    A Generalized Definition Of Cyber Crime May Be

    Unlawful Acts Wherein The Computer Is Either A

    Tool Or Target Or Both.

  • 7/31/2019 Cybercrime Namita Mam

    3/19

    Introduction: What It Is?

    Cyber crime offenses against the informationtechnology infrastructure.

    Such conducts includes:

    Illegal access Illegal interception

    System interference

    Data interference

    Misuse of devices Fraud

    Forgery

  • 7/31/2019 Cybercrime Namita Mam

    4/19

    WHY SHOULD WE CARE?

    It is important for computing

    professionals to understand cyber-terrorism for the benefit of themselves,

    their profession, and society as a

    whole.

  • 7/31/2019 Cybercrime Namita Mam

    5/19

    WHY SHOULD WE CARE?The computer is being used as a newweapon to obtain results similar to the

    use of bombs, kidnappings orassignations The computer as the target.

    The computer as generator of new types of

    crimes. The computer as the tool of conventional

    crime.

  • 7/31/2019 Cybercrime Namita Mam

    6/19

    THREATS TO COMPUTER

    SYSTEMS Hacking

    Phreaking

    Viruses

    Worms

    Trojan horses

    Cyber Squatting

    Denial of Service

    Scans

    Sniffer

    Spoofing

  • 7/31/2019 Cybercrime Namita Mam

    7/19

    THREATS TO COMPUTER

    SYSTEMS Malicious Applets

    War Dialing

    Logic Bombs

    Buffer Overflow

    PasswordCrackers

    Dumpster Diving

    Crackers

    Script Bunnies

    Insiders

  • 7/31/2019 Cybercrime Namita Mam

    8/19

    Security incidents between

    1995 and 2003

  • 7/31/2019 Cybercrime Namita Mam

    9/19

    Financial fraud : 11%

    Sabotage of data/networks: 17%

    Theft of proprietary information: 20%

    System penetration from the outside: 25%

    Denial of service: 27%

    Unauthorized access by insiders: 71%Employee abuse of internet privileges 79%

    Viruses : 85%

    Types of Cyberattacks,Types of Cyberattacks,

    by percentage (by percentage (source-source- FBI)FBI)

  • 7/31/2019 Cybercrime Namita Mam

    10/19

    PROTECTION AGAINST

    THREATSUse of firewalls to screen all

    communications to a system, including

    e-mail messages, which may carry logic

    bombs.

    All accounts should have passwords andthe password should be unusual and

    difficult to guess.

  • 7/31/2019 Cybercrime Namita Mam

    11/19

  • 7/31/2019 Cybercrime Namita Mam

    12/19

  • 7/31/2019 Cybercrime Namita Mam

    13/19

  • 7/31/2019 Cybercrime Namita Mam

    14/19

    SOLUTION TO CYBER

    CRIMECybercheck Secure Document

    Interchange For Transactions And

    On-line Payment.

    Cyberpos Acquiring Of Payment

    Cards Via Internet.

  • 7/31/2019 Cybercrime Namita Mam

    15/19

    SOLUTION TO CYBER

    CRIMECyberCheck

    Ttransfer Of Interbank Clearing FromPlatina Bank To Multibank Clearing,

    Development Of New Software Based On

    XML Technology Along With AddingDigital Signature Of Customer Bank ToThe Standard Document.

  • 7/31/2019 Cybercrime Namita Mam

    16/19

    SOLUTION TO CYBER

    CRIME

    yberPOS

    Coverage Of Major Russian Processors,

    Establishing Gateway With Foreign

    Processors.

  • 7/31/2019 Cybercrime Namita Mam

    17/19

    Suggestions for better security

    Use Strong Passwords.

    Make Regular Back-up Of Critical Data.

    Use Virus Protection Software.Use A Firewall As A Gatekeeper Between Your

    Computer And The Internet.

    Do Not Keep Computers Online When Not In Use.

    Do Not Open E-mail Attachments From Strangers.

  • 7/31/2019 Cybercrime Namita Mam

    18/19

    CONCLUSION Without Careful Attention To These Issues, TheUncontrolled Interconnection Of Existing Systems, On

    Which People And Organisations Are Critically

    Dependent, Will Continue To Create Huge, Ill-definedAnd Defenceless Super - Systems.

    So We Must Pay Attention To All Those

    Issues And Protect The World From

    Cyber Crime.

  • 7/31/2019 Cybercrime Namita Mam

    19/19


Recommended