cyber crime and cyber security

20
CYBER SECURITY PRESENTING BY: KAZI SAZED SALMAN ID: 2015210001045 MUSTARY UMMA ASHA ID: 2015210001029 slideshare.net/ssalman69

Upload: sazed-salman

Post on 10-Jan-2017

316 views

Category:

Internet


6 download

TRANSCRIPT

Page 1: Cyber Crime and Cyber Security

CYBER SECURITYPRESENTING BY:

KAZI SAZED SALMAN ID: 2015210001045MUSTARY UMMA ASHA ID:

2015210001029

slideshare.net/ssalman69

Page 2: Cyber Crime and Cyber Security

WHAT IS CYBER SECURITY

Cyber security is the protection of computer & network systems for preventing - • Theft•Damage to the hardware & software•Misdirection of the information

Page 3: Cyber Crime and Cyber Security

WHY CYBER SECURITY IS IMPORTANT

• To ensure data protection•Restrict unauthorized users• Prevent losing data• Ensuring privacy & confidentiality• To keep safe from the cyber crime

Page 4: Cyber Crime and Cyber Security

WHAT IS CYBER CRIME

• Crime committed using a computer and the internet to steal data or information.• Illegal imports.• Malicious programs.

Page 5: Cyber Crime and Cyber Security

A FEW REMARKABLE HISTORIES

1971 – John Draper builds a ‘blue box’ that reproduces a 26kHz tone, which allows to make free calls.

1981 – Ian Murphy, becomes first convict of a computer crime, broke into a super shop’s computers and changed the billing clock so that people receive discounted rates during normal business hours.

1986 – “Brain” the first standard computer virus released.

1988 – National Bank of Chicago, first victim of $70-million computer theft.

Page 6: Cyber Crime and Cyber Security

1991 – Kevin Poulsen was captured for selling military secrets

1994 – A 16 year old UK student, got arrested for accessing computers at the Korean Atomic Research Institute, NASA and several US govt. agencies.

1996 – Russian cracker attempts to extort $100K from thousands of customers' credit card numbers

2007 – First cyber warfare in Estonia2010 – WikiLeaks released Iraq War documents

and Afghan War documents

A FEW REMARKABLE HISTORIES (CONT.)

Page 7: Cyber Crime and Cyber Security

CYBERCRIMES IN 2013

Page 8: Cyber Crime and Cyber Security

RECENT ATTACK IN BANGLADESH

• In February 2016, US$951 million had been illegally transferred from Bangladesh Bank.• Issued via the SWIFT network. • Withdrawn from a Bangladesh Bank account at the

Federal Reserve Bank of New York.• $20 million traced in Sri Lanka (since recovered) and

$81 million in the Philippines (about $18 million recovered). • The Federal Reserve Bank of NY blocked the

remaining thirty transactions, amounting to $850 million, at the request of Bangladesh Bank.

Page 9: Cyber Crime and Cyber Security

TYPES OF CYBER CRIME

A.HackingB.Theft / PiracyC.Cyber stalking (spying)D.Identity theftE.Malicious programF. Child soliciting & abuse

Page 10: Cyber Crime and Cyber Security

HACKING

• A person’s computer is broken into so that his personal or sensitive information can be accessed.• A hacker uses a variety of

software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location slideshare.net/ssalman69

Page 11: Cyber Crime and Cyber Security

THEFT / PIRACY

• Copyright infringement (piracy) occurs when a person violates copyrights and downloads music, movies, games and software.• The owner of the copyright

gets no monetary value of his work from the pirated users.

Page 12: Cyber Crime and Cyber Security

CYBER STALKING

• This is a kind of online harassment wherein the victim is subjected to a barrage of online messages, emails & pictures by the stalker.• Typically, these stalkers

know their victims and they use the internet to stalk & spy.

Page 13: Cyber Crime and Cyber Security

IDENTITY THEFT

• A criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to withdraw money or to buy things online in the victim’s name.• It can result in major financial

losses for the victim and even spoil the victim’s credit history.

Page 14: Cyber Crime and Cyber Security

MALICIOUS SOFTWARE

• The software is used to gain access to a system to steal information or data or causing damage to other software or data present in the system• These can be Internet-

based software or programs that are used to disrupt a network

Page 15: Cyber Crime and Cyber Security

TYPES OF CYBER ATTACK

Financial fraud: 11%Sabotage of data/networks: 17%Theft of proprietary information: 20%System penetration from the outside: 25%Denial of service: 27%Unauthorized access by insiders: 71%Employee abuse of internet privileges 79%Viruses 85%

Page 16: Cyber Crime and Cyber Security

CYBER SECURITY STAGES

PersonalSecurity

Organizational

Security

NationalSecurity

Page 17: Cyber Crime and Cyber Security

PERSONAL SECURITY

• Never click on unknown links in emails.• Do not give out personal information.• Use recommended antivirus.• Do not run non-familiar application.• Keep information private in the social media.• Keep operating system, browser, anti-virus

and other critical software up to date.

Page 18: Cyber Crime and Cyber Security

ORGANIZATIONAL SECURITY

• Cloud Backup & Pay for Premium Cloud Security• Call in an IT Security Consultant when needed• Don’t let employees download any software

without permission• Never share official files in social media• Use portable drives with care• Use business level antivirus software

Page 19: Cyber Crime and Cyber Security

NATIONAL CYBER SECURITY

• Constructing & applying proper laws for cyber crime• Confidential files should be shared with high

care• Protect national bandwidth from being

abused• Taking proper steps to prevent hackers &

piracy• Giving high priority on the development of IT

sector

Page 20: Cyber Crime and Cyber Security

THANKS EVERYONE…

IF YOU HAVE ANY QUERY, PLEASE FEEL FREE TO ASK.

slideshare.net/ssalman69