Top Banner
CYBERCRIME Group Members: Danushka Nirmal De Silva(4240138) Ahmad Akmal Afiq(4237323) Yadiy Zakwan(4240960)
31

Cybercrime(this)

May 18, 2015

Download

Technology

Yadiy Zak-One

Cyber crime for Information System Risk & Security.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cybercrime(this)

CYBERCRIME

Group Members: Danushka Nirmal De Silva(4240138)

Ahmad Akmal Afiq(4237323)

Yadiy Zakwan(4240960)

Page 2: Cybercrime(this)

INTRODUCTION SUMMARY DEFINITIONS HISTORY TYPES OF CYBERCRIME STATISTICS CASE STUDY (1 & 2) PREVENTION CONCLUSION

Page 3: Cybercrime(this)

SUMMARY The internet is growing rapidly. Rise in new opportunities in the modern

world. Internet also has its own disadvantages

which is :

Page 4: Cybercrime(this)

WHAT IS CYBERCRIME ?

Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs

the computer used as an object or subject of crime

Page 5: Cybercrime(this)

HISTORY Abacus is the earliest and simplest form of computer

which dates back about 3500 B.C and was used in some parts of the world such as China

First recorded cyber crime dates back to 1820

Joseph-Marie Jacquard had a textile manufacture introduced the loom

The loom threatened the employees in the firm who then decided to sabotage it in order to discourage Jacquard from further use of the loom

Page 6: Cybercrime(this)

Cont’d

First spam email took place in 1978 when it was sent over the Arpanet

The first virus was installed on an Apple computer in 1982

Page 7: Cybercrime(this)

TYPES OF CYBERCRIMES Hacking Child Pornography Denial of Service(DoS) Virus Dissemination Computer Vandalism Cyber Terrorism Software Piracy

Page 8: Cybercrime(this)

HACKING Illegal intrusion into a computer system

and/or network Hackers writes or use ready-made computer

programs to attack the target computer Includes breaking into a computer with

intention to steal, damage, modify or monitor data or settings within a system

Page 9: Cybercrime(this)

CHILD PORNOGRAPHY The internet is being highly used by its

abusers to reach and abuse children sexually, worldwide

Nowadays, more homes have internet access, more children would be using the internet and high chances of falling victim to paedophiles

Page 10: Cybercrime(this)

Denial of Service The criminal floods the bandwidth of victims

network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide

Page 11: Cybercrime(this)

VIRUS DISSEMINITION Malicious software that attaches itself to

other software Circulate themselves to other files and to

other computers on a network Affect the data on a computer, either by

altering or deleting it

Page 12: Cybercrime(this)
Page 13: Cybercrime(this)

COMPUTER VANDALISM An act of damaging or destroying data rather

than stealing or misusing them

Page 14: Cybercrime(this)

CYBER TERRORISM It is the actual use of computers and internet

technology to cause intimidation and destruction

Uses the internet or network to destroy or damage computers for political reasons

Cyber terrorists could hack into a pharmaceutical company’s computers, changing the formula of some essential medication and causing thousands to die

Page 15: Cybercrime(this)

SOFTWARE PIRACY Theft of software through an illegal act of

copying a genuine programs or the counterfeiting and distribution of products intended to pass for the original

Copying and using computer programs in violation of copyrights and trade secret laws

Retail revenue losses worldwide are ever increasing due to software piracy

Page 16: Cybercrime(this)

STATISTICS

Page 17: Cybercrime(this)

STATISTICS(cont..)

Page 18: Cybercrime(this)

CASE STUDY 1CYBER CRIMINALS TARGET SKYPE, FACEBOOK & WINDOWS USER

Page 19: Cybercrime(this)

CASE STUDY 1

Cyber criminals target social network & Windows users with Blackhole malware.

Disuised as Windows licences, Facebook account verification, Skype voicemail notifications & spam messages.

Biggest dangers Internet users face.

Page 20: Cybercrime(this)

Users who click the malicious Blackhole links & downloaded the files were infected with a Trojan virus.

Spam email campaign targeted Facebook users with a message claiming that their account was locked and needed to be re-verified.

The links led to Blackhole exploits and a Zeus Trojan disguised as an Adobe Flash Player download.

Page 21: Cybercrime(this)

Users should verify the source and destination of any link before clicking

they should never run executable files unless they are positive that the source is legitimate

Page 22: Cybercrime(this)

CASE STUDY 2HACKING OF US DRONE TECHNOLOGY

Page 23: Cybercrime(this)

CASE STUDY 2 Chinese hackers increasingly attracted to

US drone technology Hacker group “Comment Crew” hacked US

military network stealing classified information of US military drones.

They targeted both large companies, including US military contractors & military firms focused on drone technology.

Page 24: Cybercrime(this)

Chinese drone identical to US Predator drone.

US drone market could be the first victim of Chinese espionage.

Page 25: Cybercrime(this)

PREVENTION

Antivirus & Anti Spyware software Firewalls Cryptography Cyber Law & Ethics

Page 26: Cybercrime(this)

Antivirus & Anti Spyware software

to identify and eliminate computer viruses and other malicious software.

to restrict backdoor program, trojans

and other spywares to be installed on the computer.

Page 27: Cybercrime(this)

Firewalls protects a computer network from

unauthorized access. guards an internal computer network

against malicious access from outside the network.

Page 28: Cybercrime(this)

Cryptography

science of encrypting and decrypting information.

Encryption is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender & the recipient.

A number of cryptographic methods have been developed and some of them are still not cracked.

Page 29: Cybercrime(this)

Cyber Laws & Ethics

Responsibility of every individual to follow cyber ethics and cyber laws.

ISP should provide high level security at their severs

Security software as a protection Essential features in the cyber world

today.

Page 30: Cybercrime(this)

CONCLUSION Cybercrimes increase with the rapidly

growing internet technology. It is not possible to eliminate

cybercrimes. It is quite possible to

check them. Awareness is always the

first step to protect yourself.

Page 31: Cybercrime(this)