Cyber Security - Higher College of Technology · Cyber Security | Brijesh Jajal, HCT 3 Hacking Website Hack Kaspersky Lab reveals cyberattack on its corporate network that also hit

Post on 28-Jul-2020

6 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

Transcript

Cyber Security

Defending Resources

Cyber Security | Brijesh Jajal, HCT

Cyber Crimes

Cyber Security | Brijesh Jajal, HCT

Malicious software

Identity theft

Hacking

Software Theft (Piracy)

Cyber Stalking

Top 5 cyber crimes in 2015

Cyber Crimes

Cyber Security | Brijesh Jajal, HCT

Malicious software

Identity theft

Hacking

Software Theft (Piracy)

Cyber Stalking

Top 5 cyber crimes in 2015

1

Malicious software

Cyber Security | Brijesh Jajal, HCT

1

Virus : Propagates by inserting a copy of itself

Cyber Security | Brijesh Jajal, HCT

Worms: Replicates itself, without host program

Malicious software 1

Nimda (ADMIN spelled reverse) caused $530 million in damages after only one week of propagation.

Cyber Security | Brijesh Jajal, HCT

Trojan: Harmful software in the disguise

Malicious software 1

Cyber Security | Brijesh Jajal, HCT

Botnet: Bots often automate tasks and provide information or services

Malicious software 1

Cyber Security | Brijesh Jajal, HCT

Use of AVTK

Malicious software HANDLING 1

Cyber Security | Brijesh Jajal, HCT

Use of AVTK Du Blocker

Malicious software HANDLING 1

Cyber Security | Brijesh Jajal, HCT

Keylogger : Surveillance software with the capability to record every keystroke

Malicious software HANDLING 1

Cyber Security | Brijesh Jajal, HCT

Malicious software HANDLING 1

Secured Operating System

Cyber Security | Brijesh Jajal, HCT

Malicious software CHALLENGE 1

Secured Operating System

Cyber Crimes

Cyber Security | Brijesh Jajal, HCT

Malicious software

Identity theft

Hacking

Software Theft (Piracy)

Cyber Stalking

Top 5 cyber crimes in 2015

2

Cyber Security | Brijesh Jajal, HCT

Identity Theft 2

Twitter Account of Amitabh Bachchan hacked. He has 16.6 million followers.

1 Sept., 2015

Cyber Security | Brijesh Jajal, HCT

Identity Theft 2

E-mail Theft https://haveibeenpwned.com

Cyber Security | Brijesh Jajal, HCT

Identity Theft 2

ATM Skimming

Cyber Security | Brijesh Jajal, HCT

Identity Theft 2

ATM Skimming

Cyber Security | Brijesh Jajal, HCT

Identity Theft 2

ATM Skimming – Data Capture

Normal Fascia Skimmer device

Cyber Security | Brijesh Jajal, HCT

Identity Theft 2

ATM Skimming – PIN Capture

Thermo sense Layer for PIN Capturing from top Video Link

Cyber Security | Brijesh Jajal, HCT

Identity Theft HANDLING 2

ATM Skimming

ActiveEdge™ made skimmers utterly useless with a simple 90-degree change

Cyber Security | Brijesh Jajal, HCT

Identity Theft 2

Saved Passwords

Cyber Crimes

Cyber Security | Brijesh Jajal, HCT

Malicious software

Identity theft

Hacking

Software Theft (Piracy)

Cyber Stalking

Top 5 cyber crimes in 2015

3

Hacking 3

Teen hacker hits five Omani government websites. Gulf News

Cyber Security | Brijesh Jajal, HCT

Hacking 3

Website Hack

Kaspersky Lab reveals cyberattack on its corporate network that also hit high profile victims in Western countries, the Middle East and Asia. 10 July, 2015

Cyber Security | Brijesh Jajal, HCT

Hacking - HANDLING 3

NS Auditor

Cyber Security | Brijesh Jajal, HCT

Hacking - HANDLING 3

Authenticate website

The #1 trust mark on the Internet Continuous Protection

Cyber Crimes

Cyber Security | Brijesh Jajal, HCT

Malicious software

Identity theft

Hacking

Software Theft (Piracy)

Cyber Stalking

Top 5 cyber crimes in 2015

4

Cyber Security | Brijesh Jajal, HCT

Software Theft 4

Piracy Statistics

Cyber Security | Brijesh Jajal, HCT

Software Theft HANDLING 4

User checklist Developer checklist

Get terms signed -EULA Regular Audit Proof of purchase

Online key activation Sentinel Shell /API for hardware key

Cyber Crimes

Cyber Security | Brijesh Jajal, HCT

Malicious software

Identity theft

Hacking

Software Theft (Piracy)

Cyber Stalking

Top 5 cyber crimes in 2015

5

Cyber Security | Brijesh Jajal, HCT

Cyber Stalking 5

Cyber Stalking: The attacker harasses a victim using electronic communication

Risks :

Having your online accounts being taken over Having your contact details obtained and used Location and tracking of you by GPS on

mobiles, tracker devices or spyware on phones Having false profiles posted on social

networking and other

Cyber Security | Brijesh Jajal, HCT

Cyber Stalking 5

Statistics – Middle and High school students:

Cyber Security | Brijesh Jajal, HCT

Cyber Stalking 5

Case Study:

David Matusiewicz, trialed in US for Cyber stalking resulting in death. 22 June, 2015

Megan Meier (Foundation) by her mother Tina.

Cyber Security | Brijesh Jajal, HCT

Cyber Stalking HANDLING 5

How to avoid:

Use privacy settings Use Blocking and Filter Avoid filling all Profile details (Address)

Contact website operators File a complaint with the Internet Crime

Complaint Center (IC3).

Cyber Security | Brijesh Jajal, HCT

REFERENCES

http://www.forensicscolleges.com/ http://cyberbullying.org https://www.commbank.com.au http://xavier.edu

Cyber Security | Brijesh Jajal, HCT

Keep exploring . . .

top related