SlideShare una empresa de Scribd logo
1 de 33
Cyber Crime & Security
Sanjeev Pokharel
MScIT-III
What is Cyber Crime?
• Cyber Crime is a term used to broadly describe criminal activity in
which computers or computer networks are a tool, a target, or a
place of criminal activity and include everything from electronic
cracking to denial of service attacks.
• Crime committed using a computer and the internet to steal a
person’s identity or illegal imports or malicious programs
• Cybercrime is nothing but where the computer used as an object or
subject of crime.
Definition of Cyber Crime
• According to Electronic Transaction Act of Nepal
Theft of computer source code,
Unauthorized access to computer system,
Destructing the computer and computer system,
Illegal publication,
Violation of privacy ,
Providing wrong information,
Compute fraud etc
– are known as computer (cyber) crime.
CYBER LAW
Electronic Transaction Act (ETA)
encompasses laws relating to:
I. Electronic and Digital Signatures
II. Computer Crime
III. Intellectual Property
IV. Data Protection and Privacy
V. Telecommunications Laws
• The Computer as a Weapon :
– using a computer (ICT resources) to attack other
computers.
• Pornography,
• Threatening Email,
• Assuming someone's Identity,
• Sexual Harassment,
• Defamation,
• Spam and Phishing
• The computer as a Target :
– using a computer to commit real world crimes.
• Viruses,
• Worms and Industrial Espionage,
• Software Piracy and
• Hacking
– Financial fraud
– Sabotage / disrupt of data/networks
– Theft of proprietary information
– System penetration from the outside
– Denial of service/Making Service Unavailable
– Unauthorized access by insiders
– Employee abuse of internet privileges
– Injection of Viruses
• type of activity performed by the intruder
Manipulate data integrity
Installed a sniffer
Stole password files
Proving/scanning systems
Trojan logons
IP spoofing
Introduced virus
Denied use of services
CYBER CRIME
• HACKING
• CHILD PORNOGRAPHY
• DENIAL OF SERVICE ATTACK
• VIRUS DISSEMINITION
• COMPUTER VANDALISM
• CYBER TERRORISM
• SOFTWARE PIRACY
• PHISHING
• CYBER STALKING
Hacking in simple terms
means an illegal intrusion
into a computer system
and/or network. It is also
known as CRACKING.
Government websites are
the hot targets of the
hackers due to the press
coverage, it receives.
Hackers enjoy the media
coverage.
The Internet is being highly used by its abusers to reach
and abuse children sexually, worldwide. As more homes
have access to internet, more children would be using
the internet and more are the chances of falling victim to
the aggression of pedophiles.
• This is an act by the criminal, who floods the bandwidth
of the victims network or fills his e-mail box with spam
mail depriving him of the services he is entitled to access
or provide
Malicious software that attaches itself to other software. (virus,
worms, Trojan Horse, web jacking, e-mail bombing etc)
 Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism.
 Transmitting virus:
These are programs that attach themselves to a file and then
circulate .
 Terrorist attacks on the Internet is by distributed denial
of service attacks, hate websites and hate emails,
attacks on sensitive computer networks, etc.
 Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of
products intended to pass for the original.
Phishing
• Phishing is just one of the many frauds on the Internet,
trying to fool people into parting with their money.
• Phishing refers to the receipt of unsolicited emails by
customers of Financial Institutions, requesting them to
enter their Username, Password or other personal
information to access their Account for some reason.
Cyber Stalking
 Cyber Stalking is use of the Internet or other electronic
means to track someone.
 This term is used interchangeably with online harassment
and online abuse.
 Stalking generally involves harassing or threatening
behaviour that an individual engages in repeatedly, such as
following a person, appearing at a person's home or place of
business, making harassing phone calls, leaving written
messages or objects, or vandalizing a person's property.
Nepali Crime Scene
The major Cyber Crimes reported, in Nepal, are
Defacement of Websites,
Spam,
Computer Virus and Worms,
Pornography,
VOIP Call Bypass,
 Creation/design of Fake /Duplicate documents ,
Phishing and
Fake Social Networking Users ID(fake facebook id in
facebook)
Bank ATM Fraud
• Internet security is a branch
of computer security specifically
related to the Internet.
• It's objective is to establish rules
and measure to use against
attacks over the Internet.
• Use antivirus software’s
• insert firewalls
• uninstall unnecessary software
• maintain backup
• check security settings
• Stay anonymous - choose a genderless screen name
• Never give your full name or address to strangers
• Don't respond to harassing or
negative messages (flames)
• Save offending messages
• Learn more about Internet
privacy
• Treat your laptop/Computer like
cash
• Cryptography and digital
signature
• Cyber Ethics and Laws
• Get out of uncomfortable or
hostile situations quickly
Contd…
• Remember that any email or instant message you send
could come back to haunt you
• Lock it when you leave it
• If you access the Internet from a shared computer,
make sure you don't leave anything behind
• Don't check the "remember my password" box.
• When you're done, make sure you log off completely by clicking
the "log off" button before you walk away.
• If possible, clear the browser cache and history.
• Trash all documents you used, and empty the recycle bin.
• Don't reply to unsolicited email messages (spam)
Contd…
• Don't Trust Links Sent in Email Messages
– Stop. Think. Click
• If you suspect malware is on your computer
– Stop, Confirm, Scan
• Backup important files on a regular basis
• Don't click on links in pop-ups or banner
advertisements
The Most Dangerous Things You Can Do
• Opening attachments from unknown
senders
• Installing unauthorized applications
• Disabling security tools.
• Giving/lending passwords
• Wireless networks are a huge risk
• Filling in web forms and registration pages
• Avoid social networking sites
Top Password Tips
• Never tell your password to anyone
• Never write down your password
• Make your password hard to guess — do not
use the name of your pet (or your child).
• Avoid using words found in a dictionary.
• Be sure that you don't use personal identifiers
in your password
• The cyber security will defend us from critical attacks.
• It helps us to browse the safe website.
• Internet security process all the incoming and outgoing
data on our computer.
• security will defend from hacks and virus.
• The application of cyber security used in our PC needs
update every week.
• The security developers will update their database every
week once. Hence the new virus also deleted
Cyber Security Strategies- Nepal
• Legal Framework
– IT Policy 2067
– Electronic Transaction Act 2063
– Telecommunication Act 1997
– Secure Password Practices 2067
• Institutional Development
– Ministry of Science Technology and Environment(MoSTE)
– Department of Information Technology(DOIT)
– Office of Controller of Certification(OCC)
– Cyber Forensics Lab
– National Information Technology Centre (NITC)
– Cyber Cell – Hanuman Dhoka
– CIB
– ITERT(Information Technology Emergency Response Team) –Under study
Conclusion
• Cyber Law of Nepal is well drafted and are capable of
handling all kinds of challenges as posed by cyber criminals.
• As internet technology advances so does the threat of cyber
crime.
• In times like these we must protect ourselves from cyber
crime. Anti-virus software, firewalls and security patches are
just the beginning.
• Never open suspicious e-mails and only navigate to trusted
sites.
• If possible Use Digital Signature for every electronic
Transactions
Cyber_Crime_Security.pptx

Más contenido relacionado

Similar a Cyber_Crime_Security.pptx

Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
Priya Saluja
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 

Similar a Cyber_Crime_Security.pptx (20)

Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Más de bcanawakadalcollege

Más de bcanawakadalcollege (20)

Intro to Javascript.pptx
Intro to Javascript.pptxIntro to Javascript.pptx
Intro to Javascript.pptx
 
computer and software are changing.pptx
computer and software are changing.pptxcomputer and software are changing.pptx
computer and software are changing.pptx
 
tIME LINE.pptx
tIME LINE.pptxtIME LINE.pptx
tIME LINE.pptx
 
Basic HTML Tags.PPT
Basic HTML Tags.PPTBasic HTML Tags.PPT
Basic HTML Tags.PPT
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Confusion and Diffusion.pptx
Confusion and Diffusion.pptxConfusion and Diffusion.pptx
Confusion and Diffusion.pptx
 
cypher tex.ppt
cypher tex.pptcypher tex.ppt
cypher tex.ppt
 
17javascript.ppt
17javascript.ppt17javascript.ppt
17javascript.ppt
 
Logic gates and boolean algebra.ppt
Logic gates and boolean algebra.pptLogic gates and boolean algebra.ppt
Logic gates and boolean algebra.ppt
 
cybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.pptcybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.ppt
 
Hidden Surface Removal methods.pptx
Hidden Surface Removal methods.pptxHidden Surface Removal methods.pptx
Hidden Surface Removal methods.pptx
 
Hidden Surface Removal.pptx
Hidden Surface Removal.pptxHidden Surface Removal.pptx
Hidden Surface Removal.pptx
 
Lecture6.orig.ppt
Lecture6.orig.pptLecture6.orig.ppt
Lecture6.orig.ppt
 
Bezier Curve in Computer Graphics.docx
Bezier Curve in Computer Graphics.docxBezier Curve in Computer Graphics.docx
Bezier Curve in Computer Graphics.docx
 
reliable_unreliable.pptx
reliable_unreliable.pptxreliable_unreliable.pptx
reliable_unreliable.pptx
 
2D-transformation-1.pdf
2D-transformation-1.pdf2D-transformation-1.pdf
2D-transformation-1.pdf
 
computer graphics unit 1-I.pptx
computer graphics unit 1-I.pptxcomputer graphics unit 1-I.pptx
computer graphics unit 1-I.pptx
 
CG_1.pdf
CG_1.pdfCG_1.pdf
CG_1.pdf
 
File System.pptx
File System.pptxFile System.pptx
File System.pptx
 
2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf
 

Último

valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 

Último (20)

valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 

Cyber_Crime_Security.pptx

  • 1. Cyber Crime & Security Sanjeev Pokharel MScIT-III
  • 2. What is Cyber Crime? • Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. • Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs • Cybercrime is nothing but where the computer used as an object or subject of crime.
  • 3. Definition of Cyber Crime • According to Electronic Transaction Act of Nepal Theft of computer source code, Unauthorized access to computer system, Destructing the computer and computer system, Illegal publication, Violation of privacy , Providing wrong information, Compute fraud etc – are known as computer (cyber) crime.
  • 4. CYBER LAW Electronic Transaction Act (ETA) encompasses laws relating to: I. Electronic and Digital Signatures II. Computer Crime III. Intellectual Property IV. Data Protection and Privacy V. Telecommunications Laws
  • 5. • The Computer as a Weapon : – using a computer (ICT resources) to attack other computers. • Pornography, • Threatening Email, • Assuming someone's Identity, • Sexual Harassment, • Defamation, • Spam and Phishing • The computer as a Target : – using a computer to commit real world crimes. • Viruses, • Worms and Industrial Espionage, • Software Piracy and • Hacking
  • 6. – Financial fraud – Sabotage / disrupt of data/networks – Theft of proprietary information – System penetration from the outside – Denial of service/Making Service Unavailable – Unauthorized access by insiders – Employee abuse of internet privileges – Injection of Viruses
  • 7. • type of activity performed by the intruder Manipulate data integrity Installed a sniffer Stole password files Proving/scanning systems Trojan logons IP spoofing Introduced virus Denied use of services CYBER CRIME
  • 8. • HACKING • CHILD PORNOGRAPHY • DENIAL OF SERVICE ATTACK • VIRUS DISSEMINITION • COMPUTER VANDALISM • CYBER TERRORISM • SOFTWARE PIRACY • PHISHING • CYBER STALKING
  • 9. Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.
  • 10. The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles.
  • 11. • This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide
  • 12. Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc)
  • 13.
  • 14.  Damaging or destroying data rather than stealing or misusing them is called cyber vandalism.  Transmitting virus: These are programs that attach themselves to a file and then circulate .
  • 15.  Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc.
  • 16.  Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 17. Phishing • Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. • Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason.
  • 18.
  • 19.
  • 20. Cyber Stalking  Cyber Stalking is use of the Internet or other electronic means to track someone.  This term is used interchangeably with online harassment and online abuse.  Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property.
  • 21. Nepali Crime Scene The major Cyber Crimes reported, in Nepal, are Defacement of Websites, Spam, Computer Virus and Worms, Pornography, VOIP Call Bypass,  Creation/design of Fake /Duplicate documents , Phishing and Fake Social Networking Users ID(fake facebook id in facebook) Bank ATM Fraud
  • 22. • Internet security is a branch of computer security specifically related to the Internet. • It's objective is to establish rules and measure to use against attacks over the Internet.
  • 23.
  • 24. • Use antivirus software’s • insert firewalls • uninstall unnecessary software • maintain backup • check security settings • Stay anonymous - choose a genderless screen name • Never give your full name or address to strangers
  • 25. • Don't respond to harassing or negative messages (flames) • Save offending messages • Learn more about Internet privacy • Treat your laptop/Computer like cash • Cryptography and digital signature • Cyber Ethics and Laws • Get out of uncomfortable or hostile situations quickly
  • 26. Contd… • Remember that any email or instant message you send could come back to haunt you • Lock it when you leave it • If you access the Internet from a shared computer, make sure you don't leave anything behind • Don't check the "remember my password" box. • When you're done, make sure you log off completely by clicking the "log off" button before you walk away. • If possible, clear the browser cache and history. • Trash all documents you used, and empty the recycle bin. • Don't reply to unsolicited email messages (spam)
  • 27. Contd… • Don't Trust Links Sent in Email Messages – Stop. Think. Click • If you suspect malware is on your computer – Stop, Confirm, Scan • Backup important files on a regular basis • Don't click on links in pop-ups or banner advertisements
  • 28. The Most Dangerous Things You Can Do • Opening attachments from unknown senders • Installing unauthorized applications • Disabling security tools. • Giving/lending passwords • Wireless networks are a huge risk • Filling in web forms and registration pages • Avoid social networking sites
  • 29. Top Password Tips • Never tell your password to anyone • Never write down your password • Make your password hard to guess — do not use the name of your pet (or your child). • Avoid using words found in a dictionary. • Be sure that you don't use personal identifiers in your password
  • 30. • The cyber security will defend us from critical attacks. • It helps us to browse the safe website. • Internet security process all the incoming and outgoing data on our computer. • security will defend from hacks and virus. • The application of cyber security used in our PC needs update every week. • The security developers will update their database every week once. Hence the new virus also deleted
  • 31. Cyber Security Strategies- Nepal • Legal Framework – IT Policy 2067 – Electronic Transaction Act 2063 – Telecommunication Act 1997 – Secure Password Practices 2067 • Institutional Development – Ministry of Science Technology and Environment(MoSTE) – Department of Information Technology(DOIT) – Office of Controller of Certification(OCC) – Cyber Forensics Lab – National Information Technology Centre (NITC) – Cyber Cell – Hanuman Dhoka – CIB – ITERT(Information Technology Emergency Response Team) –Under study
  • 32. Conclusion • Cyber Law of Nepal is well drafted and are capable of handling all kinds of challenges as posed by cyber criminals. • As internet technology advances so does the threat of cyber crime. • In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning. • Never open suspicious e-mails and only navigate to trusted sites. • If possible Use Digital Signature for every electronic Transactions

Notas del editor

  1. Trojan Horse: secret undocumented routine embedded within a useful program, execution of the program results in execution of the routine Common motivation is data destruction