Top Banner
Effective Techniques And Approaches That Ensures Cyber Security Presented by: Dr. Amitabha Yadav
29
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber security 22-07-29=013

Effective Techniques And Approaches That Ensures Cyber Security

Presented by: Dr. Amitabha Yadav

Page 2: Cyber security 22-07-29=013

CONTENTS• Introduction• Definition• History• Cyber threat evolution• Categories of cyber crime• Types of cyber crime• Types Of Cyber Attack By Percentage • Cyber Laws• Safety Techniques For Cyber Crime • Cyber Security • Advantages of Cyber Crime• Conclusion

Page 3: Cyber security 22-07-29=013

INTRODUCTION

• The Internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.

• It is an international network of networks that consists of millions of private, public, academic, business, and government networks. Carries an extensive range of information resources and services.

• Internet also has disadvantages like Cyber crime.

Page 4: Cyber security 22-07-29=013

• Cyber crime is illegal activity committed on the Internet.• Cybercrime is nothing but where the computer is used

as an object or subject of crime• Crime or Cybercrime, refers to any crime that involves a

computer and a network.• Crime committed using a computer and the internet to

steal the person’s identity. • illegal Imports and Malicious programs

DEFINITION of CYBER CRIME

Page 5: Cyber security 22-07-29=013

HISTORY

• The first recorded cyber crime took place in the year 1820.

• The first spam email took place in 1978 when it was sent over the Arpanet.

• The first Virus was installed on an Apple Computer in 1982.

Page 6: Cyber security 22-07-29=013

CYBER THREAT EVOLUTION

Page 7: Cyber security 22-07-29=013

CATEGORIZATION OF CYBER CRIME

• The Computer as a Target: using a computer to attack other computers. Hacking, Virus/Worm attacks, DOS attack

• The Computer as a weapon: using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography.

Page 8: Cyber security 22-07-29=013

TYPES OF CYBER CRIME

Page 9: Cyber security 22-07-29=013

HACKING

Hacking in simple terms means an illegal intrusion into a computer system and/or network..

Page 10: Cyber security 22-07-29=013

DENIAL OF SERVICE ATTACK

Act by the criminal, who floods the bandwidth of the victims network.

This involves flooding computer resources with more request that it can handle.

Page 11: Cyber security 22-07-29=013

VIRUS DISSEMINATION

• Malicious software that attaches itself to other software.

• Like virus, worms, Trojan Horse, web jacking, e-mail bombing.

Page 12: Cyber security 22-07-29=013

COMPUTER VANDALISM

• Damaging or destroying data rather than stealing.

• Transmitting virus

Page 13: Cyber security 22-07-29=013

CYBER TERRORISM

• Use of Internet based attacks in terrorist activities.

• Technology understanding terrorists are using 512-bit encryption, which is impossible to decrypt.

Page 14: Cyber security 22-07-29=013

SOFTWARE PIRACY

• Theft of software through the illegal copying of genuine programs.

• Distribution of products intended to pass for the original.

Page 15: Cyber security 22-07-29=013

Credit Card Fraud

• You simply have to type credit card number into WWW page off the vendor for online transaction.

• If electronic transaction are not secured the card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.

Page 16: Cyber security 22-07-29=013
Page 17: Cyber security 22-07-29=013
Page 18: Cyber security 22-07-29=013
Page 19: Cyber security 22-07-29=013
Page 20: Cyber security 22-07-29=013
Page 21: Cyber security 22-07-29=013

TYPES OF CYBER ATTACK BY PERCENTAGE

• Financial fraud: 11% • Sabotage of data/networks: 17% • Theft of proprietary information: 20% • System penetration from the outside: 25% • Denial of service: 27% • Unauthorized access by insiders: 71%• Employee abuse of internet privileges: 79% • Viruses: 85%

Page 22: Cyber security 22-07-29=013

CYBER LAW

• Cyber law is a system of law and regulation for the cyber space.

• The cyber law in India is defined under IT Act, 2000.• The IT Act 2000 attempts to change outdated laws

and provides ways to deal with cyber crimes. • Such an acts is required as people can perform

purchase transactions over the net through credit cards without fear of getting misused.

• IT Act 2000 consists of 94 section spread over 13 chapters and 4 schedules to the Act.

Page 23: Cyber security 22-07-29=013

HOW CAN WE PROTECT?

• Read Privacy policy carefully when you submit the data through internet.

• Encryption: lots of website uses SSL (secure socket layer)to encrypt a data.

• Disable remote connectivity.

Page 24: Cyber security 22-07-29=013

SAFETY TECHNIQUIES FOR CYBER CRIME

• Use antivirus software’s. • Insert firewalls.• Uninstall unnecessary software• Maintain backup. • Check security settings. • Stay anonymous - choose a genderless

screen name. • Never give your full name or address to

strangers. • Learn more about Internet privacy.

Page 25: Cyber security 22-07-29=013

CYBER SECURITY

• Internet security is a branch of computer security specifically related to the Internet.

• It's objective is to establish rules and measure to use against attacks over the Internet.

Page 26: Cyber security 22-07-29=013

Advantage of cyber security • Defend us from critical attacks.• It will defend from hacks and virus• Browse the safe website. • Internet security process all the incoming and outgoing

data on our computer• The application of cyber security used in our PC needs

update every week. • The security developers will update their database every

week once. • Hence the new virus also deleted.

Page 27: Cyber security 22-07-29=013

CONCLUSION• The only system which is truly secure is

one which is switched off and unplugged.

• So , only way to be safe is Pay attention and Act smart.

Page 28: Cyber security 22-07-29=013

THANK YOU

&

ANY QUESTION

Page 29: Cyber security 22-07-29=013