SlideShare ist ein Scribd-Unternehmen logo
1 von 46
IT PROJECT
Designed by :
Drishti bhalla (1838)
Vandana vashisth (1831)
Dimpy chugh(1833)
Table of Contents
 Cyber crime
 Computer forensics
 Wifi hijacking
 Virus
 Malware
 Spam
 Phishing attacks
In the News…….
 1 out of 5 children received a
sexual solicitation or approach
over the Internet in a one-year
period of time
 California warns of massive ID
theft – personal data stolen from
computers at University of
California, Berkeley (Oct 21, 2004
IDG news service)
 Microsoft and Cisco announced a
new initiative to work together to
increase internet security
(Oct 18, 2004 )
Cyber Crime
 It’s an unlawful act wherein a
computer is a tool or a target
or both .
 Acts that are punishable by the
Information Technology Act .
 Cyber space is a virtual space
that has become as important
as real space for business,
politics and communities .
Computer Crime
 Computer used to commit a
crime
 Child porn, threatening email,
assuming someone’s identity,
sexual harassment,
defamation, spam, phishing
 Computer as a target of a
crime
 Viruses, worms, industrial
espionage, software piracy,
hacking
Computer Forensics
 What is it?
 An autopsy of a computer or network to
uncover digital evidence of a crime
 Evidence must be preserved and hold up
in a court of law
 Growing field – Many becoming
computer forensic savvy
 FBI, State and Local Police, IRS,
Homeland Security
 Defense attorneys, judges and
prosecutors
 Independent security agencies
 White hat or Ethical Hackers
Uncovering Digital Evidence
Smart Criminals don’t use their
own computers
 Floppy disks
 Zip/Jazz disks
 Tapes
 Digital cameras
 Memory sticks
 Printers
 CDs
 PDAs
 Game boxes
 Networks
 Hard drives
Digital Evidence
Criminals Hide Evidence
 Delete their files and emails
 Hide their files by encryption,
password protection, or
embedding them in unrelated files
(dll, os etc)
 Use Wi-Fi networks and cyber
cafes to cover their tracks
Forensics Uncover Evidence
 Restore deleted files and emails –
they are still really there!
 Find the hidden files through complex
password, encryption programs, and
searching techniques
 Track them down through the digital
trail - IP addresses to ISPs to the
offender
Top Cyber
Crimes
Spam
Viruses/Worms
Industrial Espionage and Hackers
Wi-Fi High Jacking
Trozan attacks
Cyber pornography
Sale of illegal articles
Email spoofing
Cyber defamation
Cyber stalking
Online gambling
Hackers are Everywhere
 Stealing data
 Industrial Espionage
 Identity theft
 Defamation
 Deleting data for fun
 A lot of bored 16 year olds late at
night
 Turning computers into zombies
 To commit crimes
 Take down networks
 Distribute porn
 Harass someone
 Ethical/white hat hackers exist too
 Help break into networks to prevent
crimes
Mafia Boy
Wireless Fidelity (Wi-Fi)
 Using antennas to create “hot spots”
 Hotspots – Internet Access (sometimes free)
 Newport Harbor - All the boats in Harbor have internet access
 San Francisco Giants Stadium – Surf the web while catching a
game
 UMass (need to register, but it’s free)
 Cambridge, MA
 Philadelphia, PA – just announced – entire city by 2006
Wi-Fi High Jacking
60-70% wireless networks are wide open…
Why are the Wi-Fi networks unprotected?
 Most people say “Our data is boring”
 But… criminals look for wireless networks
to commit their crimes
 And… the authorities will come knocking on
your door…..
Protect your Computers!
 Use anti-virus software and
firewalls - keep them up to date
 Keep your operating system up to
date with critical security updates
and patches
 Don't open emails or attachments
from unknown sources
 Use hard-to-guess passwords.
Don’t use words found in a
dictionary. Remember that
password cracking tools exist
 Back-up your computer data on
disks or CDs often
 Don't share access to your
computers with strangers
 If you have a wi-fi network,
password protect it
 Disconnect from the Internet
when not in use
 Reevaluate your security on a
regular basis
 Make sure your employees and
family members know this info
too!
Computer viruses
VIRUS
Computer virus is a program or piece of code that is loaded
onto your computer without your knowledge and runs against
your wishes. It can replicate itself and spreads from one
computer to another. All viruses are man – made in nature.
Even a simple virus is dangerous because it will quickly use all
available memory and bring the system to a halt.
COMMON COMPUTER VIRUSES
 Program viruses
These types of computer virus will infect only executable files (with
extensions like .BIN, .COM, .EXE, .OVL, .DRV, and .SYS). Once
executed, these programs load into memory, along with the virus
contained within them. Once in the memory, the virus is free to act
and infect other files or simply deliver its payload. These viruses are
friendlier as can be removed a lot easier.
 Boot viruses
The boot record program loads the operating system in the
memory at startup. These viruses replace the boot record and
move it to a different part of the hard disk, or simply overwrite it.
Once you start your operating system, it loads into memory,
along with the virus. Once the virus is in the memory, it is free to
do whatever it was programmed to do.
 Multipartite viruses
These computer viruses are hybrids, derived from boot viruses
and program viruses. They infect executable files, just like the
program viruses but, once the executable is executed, it infects
the master boot records. The scenario is similar to the boot
virus’s one: once you boot your operating system, the virus is
loaded into the memory, from where it is free to infect other
programs and replicate itself, ultimately delivering the payload.
 Polymorphic viruses
The polymorphic viruses will always change their source code
from one infection to another.
 Macro viruses
This virus is relatively new and it infects macros within a
template or document , when you open a word processing.
Steps for removing virus
 Understand the types of viruses possible :
There are a plenty of viruses that come into your systems from
many different sources like Internet, some of these viruses
include-
1. File infection virus
2. Boot sector virus
3. Worm
 Identify whether or not you have a virus :
There can be a number of reasons besides viruses as to why
your computer has slowed down, frozen, or is doing strange
things. To identify the presence of a virus, try this:
1. See if the task manager is disabled.
2. Check to see if your system is slow.
3. Check to see if your operating system won't respond to
commands, or crashes.
Have you noticed any funny messages when starting up?
 Clean it
Use a reputable, recommended anti-virus software or rush your
computer to your local trusted computer repair person .
 Use anti-virus software
 Protect your computer with a right antivirus software.
 Keep it updated and check regularly.
 Try and avoid scareware.
Malware
Malware
Malware, also known as malicious software , is software
used to disrupt computer operation, gather sensitive
information, or gain access to private computer systems.
It can appear in the form of code, scripts, active content,
and other software. 'Malware' is a general term used to
refer to a variety of forms of hostile or intrusive software.
What does a malware do ?
 Provide hackers access to your computer
 Monitor your computer activity, web habits, and even your
keystrokes and transmit this information without your
knowledge
 Lead to identity theft
 Delete files, format disks, or affect your computer's general
performance
 Make your computer act in unexpected ways, such as
exhibiting strange sounds and images or slow startup and
performance.
Steps to avoid malware
• Always be wary about opening files or clicking on "mystery
links" sent to you via email, text, instant message (IM), social
networking sites such as facebook or Twitter, ads and pop-
ups. Links, files and attachments may contain or lead to
harmful programs that can damage your system, files and the
network.
• Delete spam and suspicious emails without opening or
activating any attached files or links; don't open, forward or
reply to the email. You should be suspicious if:
• An attachment or link in an email message is unexpected or
unsolicited
• The email is not addressed to you by name
• You don't recognize the sender or the email says it is from a
"friend“
• You can't determine why the file or link was sent to you
• The file name of the attachment ends with EXE, HLP, LNK,
MDB, MDE, URL or VBE
• Do not send, forward or open electronic greeting cards,
animations, games, joke programs, chain letters, screen
savers, songs, videos or images. In addition, they can
needlessly consume system resources.
• Ensure that all current patches/updates are installed for your
computer's operating system and applications.
• Do not download or install unknown software or software from
an unknown source. Even if it is "free", you may get more
than you realized (e.g., spyware, adware, etc).
• Back up your important data and mobile devices to separate
media, such as a CD/DVD, an online back up service, flash
drive, or a server. Store backups in a safe place.
• Install anti-malware software on your computer and set it to
auto-update as frequently as the settings will allow.
• Email filtering :
ITS has implemented an email filtering system that identifies
and cleans many viruses and bad attachments out of email
messages so as to help prevent infections, break-ins, and theft
or damage of data via malicious email messages.
SPAM
Definition of SPAM
 Massmail, not personal addressed, unwanted
(commercial) content
 Recipient's personal identity and context are irrelevant
because the message is equally applicable to many
other potential recipients
Damage
 Financial loss (for provider/receiver)
 Loss of time / productivity
 Slowdown of mail traffic /
breakdown of server
PAGE RELATED TO SPAM
Summary
 Unwanted mail, without preexisting relationship
 Almost every communication channel has it‘s own
type of spam
 Counteraction: on user/operator site
 Causes damage in many areas
PHISHING
Definition of phishing
 Neogolism for password phishing
 Getting confidential personal
information from a user by pretending
to be a serious provider (e.g. bank, eBay)
Types / Functionality
 Email phishing
 Sending mails that
look trustworthy to
user
 They use tactics to
fetch the
personal information
Types / Functionality
Types / Functionality
Damage
Wide range of damage possible:
Denial of access to mail account
Identity theft (used to commit crime)
financial loss
 US 04-05: 1.2 million user suffered loss of $ 929million
 UK losses by bank fraud (mostly phishing)
 2004: £ 12.2million  2005: £ 23.2million
GO THROW THIS BEFORE LOGIN TO ANY SITE
Summary
 Getting confidential personal information
 Amount of phishing attacks grows
 User awareness
 Wide range of damage
Thank you !!!

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Ppt
PptPpt
Ppt
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
What is malware
What is malwareWhat is malware
What is malware
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Network security
Network securityNetwork security
Network security
 
Ransomware
RansomwareRansomware
Ransomware
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant MaliRansomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant Mali
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Password Attack
Password Attack Password Attack
Password Attack
 

Andere mochten auch

Introduction To Information Systems And Informatics
Introduction To Information Systems And InformaticsIntroduction To Information Systems And Informatics
Introduction To Information Systems And InformaticsUniversity of Puerto Rico
 
Information technology system powerpoint template
Information technology system powerpoint templateInformation technology system powerpoint template
Information technology system powerpoint templatehttp://www.slideworld.com/
 
Management Information System
Management Information SystemManagement Information System
Management Information SystemVivek Kumar
 
Management Information System & Technology
Management Information System & TechnologyManagement Information System & Technology
Management Information System & TechnologyAkash Jauhari
 
Difference between DSS & ESS
Difference between DSS & ESSDifference between DSS & ESS
Difference between DSS & ESSdeepak sharma
 
Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technologymegat zainurul anuar
 
Information System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsInformation System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsVR Talsaniya
 
Management information system
Management  information systemManagement  information system
Management information systemRamya Sree
 
Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1adpafit
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)Harish Chand
 
Information system
Information systemInformation system
Information systemhiddensoul
 
Information technology ppt
Information technology ppt Information technology ppt
Information technology ppt Babasab Patil
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)Navneet Jingar
 

Andere mochten auch (15)

Introduction To Information Systems And Informatics
Introduction To Information Systems And InformaticsIntroduction To Information Systems And Informatics
Introduction To Information Systems And Informatics
 
Information technology system powerpoint template
Information technology system powerpoint templateInformation technology system powerpoint template
Information technology system powerpoint template
 
Gr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information SystemsGr 12 Difference Between IT an Information Systems
Gr 12 Difference Between IT an Information Systems
 
Management Information System
Management Information SystemManagement Information System
Management Information System
 
Management Information System & Technology
Management Information System & TechnologyManagement Information System & Technology
Management Information System & Technology
 
Difference between DSS & ESS
Difference between DSS & ESSDifference between DSS & ESS
Difference between DSS & ESS
 
Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technology
 
Information System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsInformation System Concepts & Types of Information Systems
Information System Concepts & Types of Information Systems
 
Management information system
Management  information systemManagement  information system
Management information system
 
Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)
 
Information system
Information systemInformation system
Information system
 
IT ppt
IT pptIT ppt
IT ppt
 
Information technology ppt
Information technology ppt Information technology ppt
Information technology ppt
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)
 

Ähnlich wie Information Technology - System Threats

Ähnlich wie Information Technology - System Threats (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
M
MM
M
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer security.pptx
Computer security.pptxComputer security.pptx
Computer security.pptx
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
virus
virusvirus
virus
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 

Mehr von Drishti Bhalla

Propositions - Discrete Structures
Propositions - Discrete Structures Propositions - Discrete Structures
Propositions - Discrete Structures Drishti Bhalla
 
Physical Layer Numericals - Data Communication & Networking
Physical Layer  Numericals - Data Communication & NetworkingPhysical Layer  Numericals - Data Communication & Networking
Physical Layer Numericals - Data Communication & NetworkingDrishti Bhalla
 
Determinants - Mathematics
Determinants - MathematicsDeterminants - Mathematics
Determinants - MathematicsDrishti Bhalla
 
Matrices - Mathematics
Matrices - MathematicsMatrices - Mathematics
Matrices - MathematicsDrishti Bhalla
 
Mid point line Algorithm - Computer Graphics
Mid point line Algorithm - Computer GraphicsMid point line Algorithm - Computer Graphics
Mid point line Algorithm - Computer GraphicsDrishti Bhalla
 
Unix Memory Management - Operating Systems
Unix Memory Management - Operating SystemsUnix Memory Management - Operating Systems
Unix Memory Management - Operating SystemsDrishti Bhalla
 
Collections Api - Java
Collections Api - JavaCollections Api - Java
Collections Api - JavaDrishti Bhalla
 
Airline Reservation System - Software Engineering
Airline Reservation System - Software EngineeringAirline Reservation System - Software Engineering
Airline Reservation System - Software EngineeringDrishti Bhalla
 
Performance Management and Feedback - SHRM
Performance Management and Feedback - SHRMPerformance Management and Feedback - SHRM
Performance Management and Feedback - SHRMDrishti Bhalla
 
Computer System Architecture - BUN instruction
Computer System Architecture - BUN instructionComputer System Architecture - BUN instruction
Computer System Architecture - BUN instructionDrishti Bhalla
 
King of acids -Sulphuric Acid H2SO4
King of acids -Sulphuric Acid H2SO4King of acids -Sulphuric Acid H2SO4
King of acids -Sulphuric Acid H2SO4Drishti Bhalla
 
Software Metrics - Software Engineering
Software Metrics - Software EngineeringSoftware Metrics - Software Engineering
Software Metrics - Software EngineeringDrishti Bhalla
 
Binary Search - Design & Analysis of Algorithms
Binary Search - Design & Analysis of AlgorithmsBinary Search - Design & Analysis of Algorithms
Binary Search - Design & Analysis of AlgorithmsDrishti Bhalla
 
CNF & Leftmost Derivation - Theory of Computation
CNF & Leftmost Derivation - Theory of ComputationCNF & Leftmost Derivation - Theory of Computation
CNF & Leftmost Derivation - Theory of ComputationDrishti Bhalla
 
Fd & Normalization - Database Management System
Fd & Normalization - Database Management SystemFd & Normalization - Database Management System
Fd & Normalization - Database Management SystemDrishti Bhalla
 

Mehr von Drishti Bhalla (16)

Propositions - Discrete Structures
Propositions - Discrete Structures Propositions - Discrete Structures
Propositions - Discrete Structures
 
Physical Layer Numericals - Data Communication & Networking
Physical Layer  Numericals - Data Communication & NetworkingPhysical Layer  Numericals - Data Communication & Networking
Physical Layer Numericals - Data Communication & Networking
 
Determinants - Mathematics
Determinants - MathematicsDeterminants - Mathematics
Determinants - Mathematics
 
Matrices - Mathematics
Matrices - MathematicsMatrices - Mathematics
Matrices - Mathematics
 
Holy Rivers - Hindi
Holy Rivers - HindiHoly Rivers - Hindi
Holy Rivers - Hindi
 
Mid point line Algorithm - Computer Graphics
Mid point line Algorithm - Computer GraphicsMid point line Algorithm - Computer Graphics
Mid point line Algorithm - Computer Graphics
 
Unix Memory Management - Operating Systems
Unix Memory Management - Operating SystemsUnix Memory Management - Operating Systems
Unix Memory Management - Operating Systems
 
Collections Api - Java
Collections Api - JavaCollections Api - Java
Collections Api - Java
 
Airline Reservation System - Software Engineering
Airline Reservation System - Software EngineeringAirline Reservation System - Software Engineering
Airline Reservation System - Software Engineering
 
Performance Management and Feedback - SHRM
Performance Management and Feedback - SHRMPerformance Management and Feedback - SHRM
Performance Management and Feedback - SHRM
 
Computer System Architecture - BUN instruction
Computer System Architecture - BUN instructionComputer System Architecture - BUN instruction
Computer System Architecture - BUN instruction
 
King of acids -Sulphuric Acid H2SO4
King of acids -Sulphuric Acid H2SO4King of acids -Sulphuric Acid H2SO4
King of acids -Sulphuric Acid H2SO4
 
Software Metrics - Software Engineering
Software Metrics - Software EngineeringSoftware Metrics - Software Engineering
Software Metrics - Software Engineering
 
Binary Search - Design & Analysis of Algorithms
Binary Search - Design & Analysis of AlgorithmsBinary Search - Design & Analysis of Algorithms
Binary Search - Design & Analysis of Algorithms
 
CNF & Leftmost Derivation - Theory of Computation
CNF & Leftmost Derivation - Theory of ComputationCNF & Leftmost Derivation - Theory of Computation
CNF & Leftmost Derivation - Theory of Computation
 
Fd & Normalization - Database Management System
Fd & Normalization - Database Management SystemFd & Normalization - Database Management System
Fd & Normalization - Database Management System
 

Kürzlich hochgeladen

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 

Kürzlich hochgeladen (20)

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 

Information Technology - System Threats

  • 1. IT PROJECT Designed by : Drishti bhalla (1838) Vandana vashisth (1831) Dimpy chugh(1833)
  • 2. Table of Contents  Cyber crime  Computer forensics  Wifi hijacking  Virus  Malware  Spam  Phishing attacks
  • 3.
  • 4. In the News…….  1 out of 5 children received a sexual solicitation or approach over the Internet in a one-year period of time  California warns of massive ID theft – personal data stolen from computers at University of California, Berkeley (Oct 21, 2004 IDG news service)  Microsoft and Cisco announced a new initiative to work together to increase internet security (Oct 18, 2004 )
  • 5. Cyber Crime  It’s an unlawful act wherein a computer is a tool or a target or both .  Acts that are punishable by the Information Technology Act .  Cyber space is a virtual space that has become as important as real space for business, politics and communities .
  • 6. Computer Crime  Computer used to commit a crime  Child porn, threatening email, assuming someone’s identity, sexual harassment, defamation, spam, phishing  Computer as a target of a crime  Viruses, worms, industrial espionage, software piracy, hacking
  • 7. Computer Forensics  What is it?  An autopsy of a computer or network to uncover digital evidence of a crime  Evidence must be preserved and hold up in a court of law  Growing field – Many becoming computer forensic savvy  FBI, State and Local Police, IRS, Homeland Security  Defense attorneys, judges and prosecutors  Independent security agencies  White hat or Ethical Hackers
  • 8. Uncovering Digital Evidence Smart Criminals don’t use their own computers  Floppy disks  Zip/Jazz disks  Tapes  Digital cameras  Memory sticks  Printers  CDs  PDAs  Game boxes  Networks  Hard drives
  • 9. Digital Evidence Criminals Hide Evidence  Delete their files and emails  Hide their files by encryption, password protection, or embedding them in unrelated files (dll, os etc)  Use Wi-Fi networks and cyber cafes to cover their tracks Forensics Uncover Evidence  Restore deleted files and emails – they are still really there!  Find the hidden files through complex password, encryption programs, and searching techniques  Track them down through the digital trail - IP addresses to ISPs to the offender
  • 10. Top Cyber Crimes Spam Viruses/Worms Industrial Espionage and Hackers Wi-Fi High Jacking Trozan attacks Cyber pornography Sale of illegal articles Email spoofing Cyber defamation Cyber stalking Online gambling
  • 11. Hackers are Everywhere  Stealing data  Industrial Espionage  Identity theft  Defamation  Deleting data for fun  A lot of bored 16 year olds late at night  Turning computers into zombies  To commit crimes  Take down networks  Distribute porn  Harass someone  Ethical/white hat hackers exist too  Help break into networks to prevent crimes Mafia Boy
  • 12. Wireless Fidelity (Wi-Fi)  Using antennas to create “hot spots”  Hotspots – Internet Access (sometimes free)  Newport Harbor - All the boats in Harbor have internet access  San Francisco Giants Stadium – Surf the web while catching a game  UMass (need to register, but it’s free)  Cambridge, MA  Philadelphia, PA – just announced – entire city by 2006
  • 13. Wi-Fi High Jacking 60-70% wireless networks are wide open… Why are the Wi-Fi networks unprotected?  Most people say “Our data is boring”  But… criminals look for wireless networks to commit their crimes  And… the authorities will come knocking on your door…..
  • 14. Protect your Computers!  Use anti-virus software and firewalls - keep them up to date  Keep your operating system up to date with critical security updates and patches  Don't open emails or attachments from unknown sources  Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist  Back-up your computer data on disks or CDs often  Don't share access to your computers with strangers  If you have a wi-fi network, password protect it  Disconnect from the Internet when not in use  Reevaluate your security on a regular basis  Make sure your employees and family members know this info too!
  • 15.
  • 17. VIRUS Computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It can replicate itself and spreads from one computer to another. All viruses are man – made in nature. Even a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.
  • 18. COMMON COMPUTER VIRUSES  Program viruses These types of computer virus will infect only executable files (with extensions like .BIN, .COM, .EXE, .OVL, .DRV, and .SYS). Once executed, these programs load into memory, along with the virus contained within them. Once in the memory, the virus is free to act and infect other files or simply deliver its payload. These viruses are friendlier as can be removed a lot easier.  Boot viruses The boot record program loads the operating system in the memory at startup. These viruses replace the boot record and move it to a different part of the hard disk, or simply overwrite it. Once you start your operating system, it loads into memory, along with the virus. Once the virus is in the memory, it is free to do whatever it was programmed to do.
  • 19.  Multipartite viruses These computer viruses are hybrids, derived from boot viruses and program viruses. They infect executable files, just like the program viruses but, once the executable is executed, it infects the master boot records. The scenario is similar to the boot virus’s one: once you boot your operating system, the virus is loaded into the memory, from where it is free to infect other programs and replicate itself, ultimately delivering the payload.  Polymorphic viruses The polymorphic viruses will always change their source code from one infection to another.
  • 20.  Macro viruses This virus is relatively new and it infects macros within a template or document , when you open a word processing.
  • 21. Steps for removing virus  Understand the types of viruses possible : There are a plenty of viruses that come into your systems from many different sources like Internet, some of these viruses include- 1. File infection virus 2. Boot sector virus 3. Worm
  • 22.  Identify whether or not you have a virus : There can be a number of reasons besides viruses as to why your computer has slowed down, frozen, or is doing strange things. To identify the presence of a virus, try this: 1. See if the task manager is disabled. 2. Check to see if your system is slow. 3. Check to see if your operating system won't respond to commands, or crashes. Have you noticed any funny messages when starting up?
  • 23.  Clean it Use a reputable, recommended anti-virus software or rush your computer to your local trusted computer repair person .
  • 24.  Use anti-virus software  Protect your computer with a right antivirus software.  Keep it updated and check regularly.  Try and avoid scareware.
  • 26. Malware Malware, also known as malicious software , is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software.
  • 27. What does a malware do ?  Provide hackers access to your computer  Monitor your computer activity, web habits, and even your keystrokes and transmit this information without your knowledge  Lead to identity theft  Delete files, format disks, or affect your computer's general performance  Make your computer act in unexpected ways, such as exhibiting strange sounds and images or slow startup and performance.
  • 28.
  • 29. Steps to avoid malware • Always be wary about opening files or clicking on "mystery links" sent to you via email, text, instant message (IM), social networking sites such as facebook or Twitter, ads and pop- ups. Links, files and attachments may contain or lead to harmful programs that can damage your system, files and the network. • Delete spam and suspicious emails without opening or activating any attached files or links; don't open, forward or reply to the email. You should be suspicious if: • An attachment or link in an email message is unexpected or unsolicited • The email is not addressed to you by name • You don't recognize the sender or the email says it is from a "friend“ • You can't determine why the file or link was sent to you • The file name of the attachment ends with EXE, HLP, LNK, MDB, MDE, URL or VBE
  • 30. • Do not send, forward or open electronic greeting cards, animations, games, joke programs, chain letters, screen savers, songs, videos or images. In addition, they can needlessly consume system resources. • Ensure that all current patches/updates are installed for your computer's operating system and applications. • Do not download or install unknown software or software from an unknown source. Even if it is "free", you may get more than you realized (e.g., spyware, adware, etc). • Back up your important data and mobile devices to separate media, such as a CD/DVD, an online back up service, flash drive, or a server. Store backups in a safe place.
  • 31. • Install anti-malware software on your computer and set it to auto-update as frequently as the settings will allow. • Email filtering : ITS has implemented an email filtering system that identifies and cleans many viruses and bad attachments out of email messages so as to help prevent infections, break-ins, and theft or damage of data via malicious email messages.
  • 32.
  • 33. SPAM
  • 34. Definition of SPAM  Massmail, not personal addressed, unwanted (commercial) content  Recipient's personal identity and context are irrelevant because the message is equally applicable to many other potential recipients
  • 35. Damage  Financial loss (for provider/receiver)  Loss of time / productivity  Slowdown of mail traffic / breakdown of server
  • 37. Summary  Unwanted mail, without preexisting relationship  Almost every communication channel has it‘s own type of spam  Counteraction: on user/operator site  Causes damage in many areas
  • 39. Definition of phishing  Neogolism for password phishing  Getting confidential personal information from a user by pretending to be a serious provider (e.g. bank, eBay)
  • 40. Types / Functionality  Email phishing  Sending mails that look trustworthy to user  They use tactics to fetch the personal information
  • 43. Damage Wide range of damage possible: Denial of access to mail account Identity theft (used to commit crime) financial loss  US 04-05: 1.2 million user suffered loss of $ 929million  UK losses by bank fraud (mostly phishing)  2004: £ 12.2million  2005: £ 23.2million
  • 44. GO THROW THIS BEFORE LOGIN TO ANY SITE
  • 45. Summary  Getting confidential personal information  Amount of phishing attacks grows  User awareness  Wide range of damage