29
Effective Techniques And Approaches That Ensures Cyber Security Presented by: Dr. Amitabha Yadav

Cyber security 22-07-29=013

Embed Size (px)

Citation preview

Effective Techniques And Approaches That Ensures Cyber Security

Presented by: Dr. Amitabha Yadav

CONTENTS• Introduction• Definition• History• Cyber threat evolution• Categories of cyber crime• Types of cyber crime• Types Of Cyber Attack By Percentage • Cyber Laws• Safety Techniques For Cyber Crime • Cyber Security • Advantages of Cyber Crime• Conclusion

INTRODUCTION

• The Internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.

• It is an international network of networks that consists of millions of private, public, academic, business, and government networks. Carries an extensive range of information resources and services.

• Internet also has disadvantages like Cyber crime.

• Cyber crime is illegal activity committed on the Internet.• Cybercrime is nothing but where the computer is used

as an object or subject of crime• Crime or Cybercrime, refers to any crime that involves a

computer and a network.• Crime committed using a computer and the internet to

steal the person’s identity. • illegal Imports and Malicious programs

DEFINITION of CYBER CRIME

HISTORY

• The first recorded cyber crime took place in the year 1820.

• The first spam email took place in 1978 when it was sent over the Arpanet.

• The first Virus was installed on an Apple Computer in 1982.

CYBER THREAT EVOLUTION

CATEGORIZATION OF CYBER CRIME

• The Computer as a Target: using a computer to attack other computers. Hacking, Virus/Worm attacks, DOS attack

• The Computer as a weapon: using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography.

TYPES OF CYBER CRIME

HACKING

Hacking in simple terms means an illegal intrusion into a computer system and/or network..

DENIAL OF SERVICE ATTACK

Act by the criminal, who floods the bandwidth of the victims network.

This involves flooding computer resources with more request that it can handle.

VIRUS DISSEMINATION

• Malicious software that attaches itself to other software.

• Like virus, worms, Trojan Horse, web jacking, e-mail bombing.

COMPUTER VANDALISM

• Damaging or destroying data rather than stealing.

• Transmitting virus

CYBER TERRORISM

• Use of Internet based attacks in terrorist activities.

• Technology understanding terrorists are using 512-bit encryption, which is impossible to decrypt.

SOFTWARE PIRACY

• Theft of software through the illegal copying of genuine programs.

• Distribution of products intended to pass for the original.

Credit Card Fraud

• You simply have to type credit card number into WWW page off the vendor for online transaction.

• If electronic transaction are not secured the card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.

TYPES OF CYBER ATTACK BY PERCENTAGE

• Financial fraud: 11% • Sabotage of data/networks: 17% • Theft of proprietary information: 20% • System penetration from the outside: 25% • Denial of service: 27% • Unauthorized access by insiders: 71%• Employee abuse of internet privileges: 79% • Viruses: 85%

CYBER LAW

• Cyber law is a system of law and regulation for the cyber space.

• The cyber law in India is defined under IT Act, 2000.• The IT Act 2000 attempts to change outdated laws

and provides ways to deal with cyber crimes. • Such an acts is required as people can perform

purchase transactions over the net through credit cards without fear of getting misused.

• IT Act 2000 consists of 94 section spread over 13 chapters and 4 schedules to the Act.

HOW CAN WE PROTECT?

• Read Privacy policy carefully when you submit the data through internet.

• Encryption: lots of website uses SSL (secure socket layer)to encrypt a data.

• Disable remote connectivity.

SAFETY TECHNIQUIES FOR CYBER CRIME

• Use antivirus software’s. • Insert firewalls.• Uninstall unnecessary software• Maintain backup. • Check security settings. • Stay anonymous - choose a genderless

screen name. • Never give your full name or address to

strangers. • Learn more about Internet privacy.

CYBER SECURITY

• Internet security is a branch of computer security specifically related to the Internet.

• It's objective is to establish rules and measure to use against attacks over the Internet.

Advantage of cyber security • Defend us from critical attacks.• It will defend from hacks and virus• Browse the safe website. • Internet security process all the incoming and outgoing

data on our computer• The application of cyber security used in our PC needs

update every week. • The security developers will update their database every

week once. • Hence the new virus also deleted.

CONCLUSION• The only system which is truly secure is

one which is switched off and unplugged.

• So , only way to be safe is Pay attention and Act smart.

THANK YOU

&

ANY QUESTION