This document contains a summary of a seminar presentation on cyber crime and security given by Shishupal Nagar. The presentation defined cybercrime, discussed common types of cybercrimes like hacking and denial of service attacks. It covered cybercriminals and classifications of cybercrime. The presentation also provided safety tips for preventing cybercrime and outlined the advantages of cyber security.
The Ultimate Guide to Choosing WordPress Pros and Cons
Seminar on Cyber Crime and Security
1. Seminar Presentation
on
Cyber Crime And Security
By
Shishupal Nagar 8CSB-1(95)
DEPARTMENT OF COMPUTER SCIENCE &ENGINEERING
Jaipur Engineering College & Research Centre
Sitapura , Tonk , Road Jaipur
2. What is Cyber Crime?
Reasons for Cyber Crime
Cyber Criminals
Classification
Types of Cyber Crime
Safety tips for Cyber crime
Cyber Security
Advantage of Security
Conclusions
References
3. Cybercrime is nothing but where the computer used as an
object or subject of crime.
Crime committed using a computer and the internet to steal
a person’s identity.
Illegal imports.
Malicious programs.
4. Capacity to store data in comparatively small space
Easy to access
Complex
Negligence
Loss of evidence
5. Those who are doing crimes by using the computer as an target or
object.
Children and adolescents between the age group of 6 – 18 years
Organised hackers
Professional hackers / crackers
Dissatisfied employees
6. When Computer Is used:-
As a Target: using a computer to attack other computers.
As a weapon: using a computer to commit real world crimes.
8. Hacking in simple terms
means an illegal instruction
into a computer system
and/or network. It is also
known as CRACKING.
Government websites are the
hot targets of the hackers
due to the press coverage, it
receives. Hackers enjoy the
media coverage..
9. Sending huge volumes of e-mail
To an address or server in an attempt to overflow the mailbox
or overwhelm the server
Zip Bombing
Methods of email bombing
Mass Mailing
Link Listing
10. Changing of data before or during entry into the
computer system
Forging or counterfeiting documents used for data
entry
Exchanging valid disks and tapes with modified
replacements.
Prevention:
Regular Audits
Supervising employees
11. A series of minor attacks that together results in a larger
attack
Used for financial crimes in which criminals steal money
or resources a bit at a time from a system
Prevention:
Find indications of an attack
Random audits
Don't ignore what appear to be errors in computer-
based financial systems.
12. The sender address and other parts of the e-mail header are
altered .
From, Return-Path and Reply-To fields
Although the e-mail appears to come from the address
indicated in the From field it actually comes from another
source.
Prevention
Antivirus
Use cryptographic signatures
13.
14. This is an act by the cyber criminal to make any host network
unavailable for the guests.
These attacks are mostly done by group of people.
This is an act by the criminal, who floods the bandwidth of the
victims network or fills his e-mail box with spam mail depriving
him of the services he is entitled to access or provide.
15. Viruses are programs that attach themselves to a computer or a
file and then circulate themselves to other files and to other
computers on a network.
They usually affect the data on a computer, either by altering
or deleting it.
Programs that multiply like viruses but spread from computer
to computer are called as worms.
16. If a piece of code intentionally inserted into a software system.
That will set off a malicious function when specified
conditions are met.
Prevention:
Monitoring system
Application logs are the keys to identifying unwarranted
activity
17. Theft of software through the illegal copying of genuine
programs.
Distribution of products intended to pass for the original.
18. Use antivirus software’s
Insert firewalls
Uninstall unnecessary software
Maintain backup
Check security settings
Stay anonymous - choose a genderless
screen name
Never give your full name or address
to strangers
19. Avoiding use of Unauthorized software.
Avoid opening of unknown email.
Use internet filtering software.
Data Level Security (Using encrypting software's).
Don't respond to harassing or negative messages.
Get out of uncomfortable or hostile situations quickly.
Save offending messages.
Learn more about Internet privacy.
20.
21. Internet security is a branch of computer security specifically
related to the Internet.
It's objective is to establish rules and measure to use against
attacks over the Internet.
22. The cyber security will defend us from critical attacks.
It helps us to browse the safe website.
Internet security process all the incoming and outgoing data on
our computer.
Security will defend from hacks and viruses.
23. It is not possible to eliminate cyber crime from the cyber
space.
It is quite possible to check them.
Awareness is the first step in protecting yourself.
So we must pay attention to all those issues and protect the
World from Cyber Crime.
The IT Act is a historical step in the cyber world.