A presentation about cyber crime and its security.It have all information about hacking,phishing,ddos,cracking,social engineering,crimes and all illegal online crime.
1. ARE YO SECURE
U D
CYBER CRIME
COMPUTING WORKSOP (CW ) PRESENTATION - SOFTWARE ENGINEERING
SECURITY
2. CYBER CRIME IS NOTHING BUT WHERE THE COMPUTER
USED AS AN OBJECT OR SUBJECT OF CRIME.
CRIME COMMITED USING COMPUTER AND INTERNET
CRIMINAL ACTIVITES THAT MAKE USE OF COMPUTERS OR
NETWORKS.
CYBER 1 of 10
COMPUTING WORKSHOP PRESENTATION
CRIME
3. CYBER CRIME AGAINST A PERSON
CYBER CRIME AGAINST A PROPERTY
CYBER CRIME AGAINST GOVERNMENT
CYBER 1 of 10
COMPUTING WORKSHOP PRESENTATION
CRIME
4. Other
Scams
20%
Virus &
Phishing Malfare
30% 50%
CYBER 1 of 10
COMPUTING WORKSHOP PRESENTATION
CRIME
5. Social engineering is the art of manipulating people so they give up
confidential information.
1-Never reveal credit or security information to anyone, even your friends.
2- If a friend urgently ask for your help,to transfer money etc, first confirm
then proceed.
3-Never open suspicious emails containing links by friends name, maybe
it’s a hacker, trying to reach you from friends email.
CYBER 1 of 10
COMPUTING WORKSHOP PRESENTATION
CRIME
6. Software piracy is a huge illegal business, running into billions of dollars. These
includes the sale of imitation software on Internet auction and classified ads
1-It can be prevented by license. 2 types of software licensing
management – online and offline.
ONLINE – Software checked each time OFFLINE – Only once.
2- Another option to use for anti piracy is to price the software low
enough so that it is not worth while forthe hackers to hack, this is
very subjective and is up the vendors to decide for themselves
CYBER 1 of 10
COMPUTING WORKSHOP PRESENTATION
CRIME
7. Identity theft occurs when someone obtains your personal information, such as your
credit card data or Social Security number, to commit fraud or other crimes.
1-Monitor your bank and credit card statements
2-Verify your mailing address with the post office and financial
institutions-
Monitor your bank and credit card statements
3-Choose secure online companies to make online transactions.
CYBER 1 of 10
COMPUTING WORKSHOP PRESENTATION
CRIME
8. Spoofing is a technique used by computer hackers to gain unauthorized access to
our computers by sending a message with an IP address saying it is coming from
trusted host , similarly with emails and caller ID .
1- CALL SPOOFING - Block spoofing calls. Services such as
trapcall.com or safercall.com allow you to block calls that display
false caller information.
2- EMAIL SPOOFING - Safeguard your email address and avoid
disclosing it.. Use a spam filter, and always use an image to
display your email online.
3- Use of good antivirus softwares can prevent IP SPOOFING.
CYBER 1 of 10
COMPUTING WORKSHOP PRESENTATION
CRIME
9. Distributed denial-of-service attack (DDoS attack) is an attempt to make a machine
or network resource unavailable to its intended users.
1-Working with the Internet Service Provider (ISP) to establish quality of service
rates to limit the amount of bandwidth one customer can utilize
2- Using firewalls and filtering devices to filter all unnecessary ports and protocols
3-(D)DoS-Deflate is a free open source Unix/Linux script by MediaLayer that
automatically mitigate (D)DoS attacks.
CYBER 1 of 10
COMPUTING WORKSHOP PRESENTATION
CRIME
10. Phishing is a form of online identity theft in which fraudsters trick Internet
users into submitting personal information to illegitimate web sites.
1- Communicate personal information only via phone or secure web sites
2-Do not click on links, download files or open attachments in emails from
unknown senders
3- Never email personal or financial information, even if you are close with
the recipient.
4-Beware of links in emails that ask for personal information.
CYBER 1 of 10
COMPUTING WORKSHOP PRESENTATION
CRIME
11. A salami technique is an automated form of abuse involving Trojan horses or secret
execution of an unauthorized program that causes the unnoticed or immaterial
debiting of small amounts of assets from a large number of sources or accounts.
1-Don't ignore what appear to be errors incomputer-based financial or other
accounting systems.
2-Keep regular checks on account to see changing status.
CYBER 1 of 10
COMPUTING WORKSHOP PRESENTATION
CRIME
12. Malicious software that attaches itself to other software.
1-Use good antivirus and firewall in order to protect yourself.
2- Never download files, because viruses and programs like Trojan Horses and
Keyloggers may be attached by sender.
CYBER 1 of 10
COMPUTING WORKSHOP PRESENTATION
CRIME