SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Cyber Crime & Security
Sanjeev Pokharel
MScIT-III
What is Cyber Crime?
• Cyber Crime is a term used to broadly describe criminal activity in
which computers or computer networks are a tool, a target, or a
place of criminal activity and include everything from electronic
cracking to denial of service attacks.
• Crime committed using a computer and the internet to steal a
person’s identity or illegal imports or malicious programs
• Cybercrime is nothing but where the computer used as an object or
subject of crime.
Definition of Cyber Crime
• According to Electronic Transaction Act of Nepal
Theft of computer source code,
Unauthorized access to computer system,
Destructing the computer and computer system,
Illegal publication,
Violation of privacy ,
Providing wrong information,
Compute fraud etc
– are known as computer (cyber) crime.
CYBER LAW
Electronic Transaction Act (ETA)
encompasses laws relating to:
I. Electronic and Digital Signatures
II. Computer Crime
III. Intellectual Property
IV. Data Protection and Privacy
V. Telecommunications Laws
• The Computer as a Weapon :
– using a computer (ICT resources) to attack other
computers.
• Pornography,
• Threatening Email,
• Assuming someone's Identity,
• Sexual Harassment,
• Defamation,
• Spam and Phishing
• The computer as a Target :
– using a computer to commit real world crimes.
• Viruses,
• Worms and Industrial Espionage,
• Software Piracy and
• Hacking
– Financial fraud
– Sabotage / disrupt of data/networks
– Theft of proprietary information
– System penetration from the outside
– Denial of service/Making Service Unavailable
– Unauthorized access by insiders
– Employee abuse of internet privileges
– Injection of Viruses
• type of activity performed by the intruder
Manipulate data integrity
Installed a sniffer
Stole password files
Proving/scanning systems
Trojan logons
IP spoofing
Introduced virus
Denied use of services
CYBER CRIME
• HACKING
• CHILD PORNOGRAPHY
• DENIAL OF SERVICE ATTACK
• VIRUS DISSEMINITION
• COMPUTER VANDALISM
• CYBER TERRORISM
• SOFTWARE PIRACY
• PHISHING
• CYBER STALKING
Hacking in simple terms
means an illegal intrusion
into a computer system
and/or network. It is also
known as CRACKING.
Government websites are
the hot targets of the
hackers due to the press
coverage, it receives.
Hackers enjoy the media
coverage.
The Internet is being highly used by its abusers to reach
and abuse children sexually, worldwide. As more homes
have access to internet, more children would be using
the internet and more are the chances of falling victim to
the aggression of pedophiles.
• This is an act by the criminal, who floods the bandwidth
of the victims network or fills his e-mail box with spam
mail depriving him of the services he is entitled to access
or provide
Malicious software that attaches itself to other software. (virus,
worms, Trojan Horse, web jacking, e-mail bombing etc)
 Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism.
 Transmitting virus:
These are programs that attach themselves to a file and then
circulate .
 Terrorist attacks on the Internet is by distributed denial
of service attacks, hate websites and hate emails,
attacks on sensitive computer networks, etc.
 Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of
products intended to pass for the original.
Phishing
• Phishing is just one of the many frauds on the Internet,
trying to fool people into parting with their money.
• Phishing refers to the receipt of unsolicited emails by
customers of Financial Institutions, requesting them to
enter their Username, Password or other personal
information to access their Account for some reason.
Cyber Stalking
 Cyber Stalking is use of the Internet or other electronic
means to track someone.
 This term is used interchangeably with online harassment
and online abuse.
 Stalking generally involves harassing or threatening
behaviour that an individual engages in repeatedly, such as
following a person, appearing at a person's home or place of
business, making harassing phone calls, leaving written
messages or objects, or vandalizing a person's property.
Nepali Crime Scene
The major Cyber Crimes reported, in Nepal, are
Defacement of Websites,
Spam,
Computer Virus and Worms,
Pornography,
VOIP Call Bypass,
 Creation/design of Fake /Duplicate documents ,
Phishing and
Fake Social Networking Users ID(fake facebook id in
facebook)
Bank ATM Fraud
• Internet security is a branch
of computer security specifically
related to the Internet.
• It's objective is to establish rules
and measure to use against
attacks over the Internet.
• Use antivirus software’s
• insert firewalls
• uninstall unnecessary software
• maintain backup
• check security settings
• Stay anonymous - choose a genderless screen name
• Never give your full name or address to strangers
• Don't respond to harassing or
negative messages (flames)
• Save offending messages
• Learn more about Internet
privacy
• Treat your laptop/Computer like
cash
• Cryptography and digital
signature
• Cyber Ethics and Laws
• Get out of uncomfortable or
hostile situations quickly
Contd…
• Remember that any email or instant message you send
could come back to haunt you
• Lock it when you leave it
• If you access the Internet from a shared computer,
make sure you don't leave anything behind
• Don't check the "remember my password" box.
• When you're done, make sure you log off completely by clicking
the "log off" button before you walk away.
• If possible, clear the browser cache and history.
• Trash all documents you used, and empty the recycle bin.
• Don't reply to unsolicited email messages (spam)
Contd…
• Don't Trust Links Sent in Email Messages
– Stop. Think. Click
• If you suspect malware is on your computer
– Stop, Confirm, Scan
• Backup important files on a regular basis
• Don't click on links in pop-ups or banner
advertisements
The Most Dangerous Things You Can Do
• Opening attachments from unknown
senders
• Installing unauthorized applications
• Disabling security tools.
• Giving/lending passwords
• Wireless networks are a huge risk
• Filling in web forms and registration pages
• Avoid social networking sites
Top Password Tips
• Never tell your password to anyone
• Never write down your password
• Make your password hard to guess — do not
use the name of your pet (or your child).
• Avoid using words found in a dictionary.
• Be sure that you don't use personal identifiers
in your password
• The cyber security will defend us from critical attacks.
• It helps us to browse the safe website.
• Internet security process all the incoming and outgoing
data on our computer.
• security will defend from hacks and virus.
• The application of cyber security used in our PC needs
update every week.
• The security developers will update their database every
week once. Hence the new virus also deleted
Cyber Security Strategies- Nepal
• Legal Framework
– IT Policy 2067
– Electronic Transaction Act 2063
– Telecommunication Act 1997
– Secure Password Practices 2067
• Institutional Development
– Ministry of Science Technology and Environment(MoSTE)
– Department of Information Technology(DOIT)
– Office of Controller of Certification(OCC)
– Cyber Forensics Lab
– National Information Technology Centre (NITC)
– Cyber Cell – Hanuman Dhoka
– CIB
– ITERT(Information Technology Emergency Response Team) –Under study
Conclusion
• Cyber Law of Nepal is well drafted and are capable of
handling all kinds of challenges as posed by cyber criminals.
• As internet technology advances so does the threat of cyber
crime.
• In times like these we must protect ourselves from cyber
crime. Anti-virus software, firewalls and security patches are
just the beginning.
• Never open suspicious e-mails and only navigate to trusted
sites.
• If possible Use Digital Signature for every electronic
Transactions
Cyber Crime & Security: Types, Prevention and Strategies

Weitere ähnliche Inhalte

Ähnlich wie Cyber Crime & Security: Types, Prevention and Strategies

Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation Priya Saluja
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxMayurSapkale7
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Cybercrime
CybercrimeCybercrime
CybercrimeFraz Ali
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Deepam Aggarwal
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 

Ähnlich wie Cyber Crime & Security: Types, Prevention and Strategies (20)

Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Mehr von bcanawakadalcollege (20)

Intro to Javascript.pptx
Intro to Javascript.pptxIntro to Javascript.pptx
Intro to Javascript.pptx
 
computer and software are changing.pptx
computer and software are changing.pptxcomputer and software are changing.pptx
computer and software are changing.pptx
 
tIME LINE.pptx
tIME LINE.pptxtIME LINE.pptx
tIME LINE.pptx
 
Basic HTML Tags.PPT
Basic HTML Tags.PPTBasic HTML Tags.PPT
Basic HTML Tags.PPT
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Confusion and Diffusion.pptx
Confusion and Diffusion.pptxConfusion and Diffusion.pptx
Confusion and Diffusion.pptx
 
cypher tex.ppt
cypher tex.pptcypher tex.ppt
cypher tex.ppt
 
17javascript.ppt
17javascript.ppt17javascript.ppt
17javascript.ppt
 
Logic gates and boolean algebra.ppt
Logic gates and boolean algebra.pptLogic gates and boolean algebra.ppt
Logic gates and boolean algebra.ppt
 
cybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.pptcybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.ppt
 
Hidden Surface Removal methods.pptx
Hidden Surface Removal methods.pptxHidden Surface Removal methods.pptx
Hidden Surface Removal methods.pptx
 
Hidden Surface Removal.pptx
Hidden Surface Removal.pptxHidden Surface Removal.pptx
Hidden Surface Removal.pptx
 
Lecture6.orig.ppt
Lecture6.orig.pptLecture6.orig.ppt
Lecture6.orig.ppt
 
Bezier Curve in Computer Graphics.docx
Bezier Curve in Computer Graphics.docxBezier Curve in Computer Graphics.docx
Bezier Curve in Computer Graphics.docx
 
reliable_unreliable.pptx
reliable_unreliable.pptxreliable_unreliable.pptx
reliable_unreliable.pptx
 
2D-transformation-1.pdf
2D-transformation-1.pdf2D-transformation-1.pdf
2D-transformation-1.pdf
 
computer graphics unit 1-I.pptx
computer graphics unit 1-I.pptxcomputer graphics unit 1-I.pptx
computer graphics unit 1-I.pptx
 
CG_1.pdf
CG_1.pdfCG_1.pdf
CG_1.pdf
 
File System.pptx
File System.pptxFile System.pptx
File System.pptx
 
2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf
 

Kürzlich hochgeladen

On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Kürzlich hochgeladen (20)

On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 

Cyber Crime & Security: Types, Prevention and Strategies

  • 1. Cyber Crime & Security Sanjeev Pokharel MScIT-III
  • 2. What is Cyber Crime? • Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. • Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs • Cybercrime is nothing but where the computer used as an object or subject of crime.
  • 3. Definition of Cyber Crime • According to Electronic Transaction Act of Nepal Theft of computer source code, Unauthorized access to computer system, Destructing the computer and computer system, Illegal publication, Violation of privacy , Providing wrong information, Compute fraud etc – are known as computer (cyber) crime.
  • 4. CYBER LAW Electronic Transaction Act (ETA) encompasses laws relating to: I. Electronic and Digital Signatures II. Computer Crime III. Intellectual Property IV. Data Protection and Privacy V. Telecommunications Laws
  • 5. • The Computer as a Weapon : – using a computer (ICT resources) to attack other computers. • Pornography, • Threatening Email, • Assuming someone's Identity, • Sexual Harassment, • Defamation, • Spam and Phishing • The computer as a Target : – using a computer to commit real world crimes. • Viruses, • Worms and Industrial Espionage, • Software Piracy and • Hacking
  • 6. – Financial fraud – Sabotage / disrupt of data/networks – Theft of proprietary information – System penetration from the outside – Denial of service/Making Service Unavailable – Unauthorized access by insiders – Employee abuse of internet privileges – Injection of Viruses
  • 7. • type of activity performed by the intruder Manipulate data integrity Installed a sniffer Stole password files Proving/scanning systems Trojan logons IP spoofing Introduced virus Denied use of services CYBER CRIME
  • 8. • HACKING • CHILD PORNOGRAPHY • DENIAL OF SERVICE ATTACK • VIRUS DISSEMINITION • COMPUTER VANDALISM • CYBER TERRORISM • SOFTWARE PIRACY • PHISHING • CYBER STALKING
  • 9. Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.
  • 10. The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles.
  • 11. • This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide
  • 12. Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc)
  • 13.
  • 14.  Damaging or destroying data rather than stealing or misusing them is called cyber vandalism.  Transmitting virus: These are programs that attach themselves to a file and then circulate .
  • 15.  Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc.
  • 16.  Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 17. Phishing • Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. • Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason.
  • 18.
  • 19.
  • 20. Cyber Stalking  Cyber Stalking is use of the Internet or other electronic means to track someone.  This term is used interchangeably with online harassment and online abuse.  Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property.
  • 21. Nepali Crime Scene The major Cyber Crimes reported, in Nepal, are Defacement of Websites, Spam, Computer Virus and Worms, Pornography, VOIP Call Bypass,  Creation/design of Fake /Duplicate documents , Phishing and Fake Social Networking Users ID(fake facebook id in facebook) Bank ATM Fraud
  • 22. • Internet security is a branch of computer security specifically related to the Internet. • It's objective is to establish rules and measure to use against attacks over the Internet.
  • 23.
  • 24. • Use antivirus software’s • insert firewalls • uninstall unnecessary software • maintain backup • check security settings • Stay anonymous - choose a genderless screen name • Never give your full name or address to strangers
  • 25. • Don't respond to harassing or negative messages (flames) • Save offending messages • Learn more about Internet privacy • Treat your laptop/Computer like cash • Cryptography and digital signature • Cyber Ethics and Laws • Get out of uncomfortable or hostile situations quickly
  • 26. Contd… • Remember that any email or instant message you send could come back to haunt you • Lock it when you leave it • If you access the Internet from a shared computer, make sure you don't leave anything behind • Don't check the "remember my password" box. • When you're done, make sure you log off completely by clicking the "log off" button before you walk away. • If possible, clear the browser cache and history. • Trash all documents you used, and empty the recycle bin. • Don't reply to unsolicited email messages (spam)
  • 27. Contd… • Don't Trust Links Sent in Email Messages – Stop. Think. Click • If you suspect malware is on your computer – Stop, Confirm, Scan • Backup important files on a regular basis • Don't click on links in pop-ups or banner advertisements
  • 28. The Most Dangerous Things You Can Do • Opening attachments from unknown senders • Installing unauthorized applications • Disabling security tools. • Giving/lending passwords • Wireless networks are a huge risk • Filling in web forms and registration pages • Avoid social networking sites
  • 29. Top Password Tips • Never tell your password to anyone • Never write down your password • Make your password hard to guess — do not use the name of your pet (or your child). • Avoid using words found in a dictionary. • Be sure that you don't use personal identifiers in your password
  • 30. • The cyber security will defend us from critical attacks. • It helps us to browse the safe website. • Internet security process all the incoming and outgoing data on our computer. • security will defend from hacks and virus. • The application of cyber security used in our PC needs update every week. • The security developers will update their database every week once. Hence the new virus also deleted
  • 31. Cyber Security Strategies- Nepal • Legal Framework – IT Policy 2067 – Electronic Transaction Act 2063 – Telecommunication Act 1997 – Secure Password Practices 2067 • Institutional Development – Ministry of Science Technology and Environment(MoSTE) – Department of Information Technology(DOIT) – Office of Controller of Certification(OCC) – Cyber Forensics Lab – National Information Technology Centre (NITC) – Cyber Cell – Hanuman Dhoka – CIB – ITERT(Information Technology Emergency Response Team) –Under study
  • 32. Conclusion • Cyber Law of Nepal is well drafted and are capable of handling all kinds of challenges as posed by cyber criminals. • As internet technology advances so does the threat of cyber crime. • In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning. • Never open suspicious e-mails and only navigate to trusted sites. • If possible Use Digital Signature for every electronic Transactions

Hinweis der Redaktion

  1. Trojan Horse: secret undocumented routine embedded within a useful program, execution of the program results in execution of the routine Common motivation is data destruction