SlideShare ist ein Scribd-Unternehmen logo
1 von 13
ARE                  YO                     SECURE
                     U                      D
      CYBER CRIME
      COMPUTING WORKSOP (CW ) PRESENTATION - SOFTWARE ENGINEERING

      SECURITY
CYBER CRIME IS NOTHING BUT WHERE THE COMPUTER
    USED AS AN OBJECT OR SUBJECT OF CRIME.

   CRIME COMMITED USING COMPUTER AND INTERNET


    CRIMINAL ACTIVITES THAT MAKE USE OF COMPUTERS OR
    NETWORKS.




CYBER                                                  1   of 10
                  COMPUTING WORKSHOP PRESENTATION
CRIME
CYBER CRIME AGAINST A PERSON



   CYBER CRIME AGAINST A PROPERTY


    CYBER CRIME AGAINST GOVERNMENT




CYBER                                               1   of 10
                  COMPUTING WORKSHOP PRESENTATION
CRIME
Other
        Scams
        20%
                                   Virus &
                Phishing           Malfare
                  30%                50%




CYBER                                              1   of 10
                 COMPUTING WORKSHOP PRESENTATION
CRIME
Social engineering is the art of manipulating people so they give up
   confidential information.



  1-Never reveal credit or security information to anyone, even your friends.


  2- If a friend urgently ask for your help,to transfer money etc, first confirm
  then proceed.
  3-Never open suspicious emails containing links by friends name, maybe
  it’s a hacker, trying to reach you from friends email.


CYBER                                                                     1   of 10
                          COMPUTING WORKSHOP PRESENTATION
CRIME
Software piracy is a huge illegal business, running into billions of dollars. These
   includes the sale of imitation software on Internet auction and classified ads



  1-It can be prevented by license. 2 types of software licensing
  management – online and offline.
  ONLINE – Software checked each time OFFLINE – Only once.

  2- Another option to use for anti piracy is to price the software low
  enough so that it is not worth while forthe hackers to hack, this is
  very subjective and is up the vendors to decide for themselves


CYBER                                                                           1   of 10
                            COMPUTING WORKSHOP PRESENTATION
CRIME
Identity theft occurs when someone obtains your personal information, such as your
   credit card data or Social Security number, to commit fraud or other crimes.



  1-Monitor your bank and credit card statements

   2-Verify your mailing address with the post office and financial
   institutions-
     Monitor your bank and credit card statements
  3-Choose secure online companies to make online transactions.




CYBER                                                                       1   of 10
                           COMPUTING WORKSHOP PRESENTATION
CRIME
Spoofing is a technique used by computer hackers to gain unauthorized access to
   our computers by sending a message with an IP address saying it is coming from
   trusted host , similarly with emails and caller ID .


  1- CALL SPOOFING - Block spoofing calls. Services such as
  trapcall.com or safercall.com allow you to block calls that display
  false caller information.
  2- EMAIL SPOOFING - Safeguard your email address and avoid
  disclosing it.. Use a spam filter, and always use an image to
  display your email online.
  3- Use of good antivirus softwares can prevent IP SPOOFING.



CYBER                                                                      1   of 10
                          COMPUTING WORKSHOP PRESENTATION
CRIME
Distributed denial-of-service attack (DDoS attack) is an attempt to make a machine
  or network resource unavailable to its intended users.



  1-Working with the Internet Service Provider (ISP) to establish quality of service
  rates to limit the amount of bandwidth one customer can utilize

  2- Using firewalls and filtering devices to filter all unnecessary ports and protocols

  3-(D)DoS-Deflate is a free open source Unix/Linux script by MediaLayer that
  automatically mitigate (D)DoS attacks.




CYBER                                                                             1   of 10
                             COMPUTING WORKSHOP PRESENTATION
CRIME
Phishing is a form of online identity theft in which fraudsters trick Internet
  users into submitting personal information to illegitimate web sites.



  1- Communicate personal information only via phone or secure web sites

  2-Do not click on links, download files or open attachments in emails from
  unknown senders

  3- Never email personal or financial information, even if you are close with
  the recipient.

  4-Beware of links in emails that ask for personal information.

CYBER                                                                     1   of 10
                          COMPUTING WORKSHOP PRESENTATION
CRIME
A salami technique is an automated form of abuse involving Trojan horses or secret
   execution of an unauthorized program that causes the unnoticed or immaterial
   debiting of small amounts of assets from a large number of sources or accounts.




  1-Don't ignore what appear to be errors incomputer-based financial or other
  accounting systems.

  2-Keep regular checks on account to see changing status.




CYBER                                                                           1   of 10
                            COMPUTING WORKSHOP PRESENTATION
CRIME
Malicious software that attaches itself to other software.




  1-Use good antivirus and firewall in order to protect yourself.

  2- Never download files, because viruses and programs like Trojan Horses and
  Keyloggers may be attached by sender.




CYBER                                                                       1    of 10
                              COMPUTING WORKSHOP PRESENTATION
CRIME
CYBERCRIME SECURITY

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 

Was ist angesagt? (20)

Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 

Andere mochten auch

Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Power point essentials #15 8°b
Power point essentials #15 8°bPower point essentials #15 8°b
Power point essentials #15 8°bforever97
 
Augustin romeo
Augustin romeoAugustin romeo
Augustin romeoleerling5
 
My biodata
My biodataMy biodata
My biodatariccot
 
Kasper en jef
Kasper en jefKasper en jef
Kasper en jefleerling5
 
Illinois supreme court decision in re pension reform litigation - May 8, 2015
Illinois supreme court decision in re pension reform litigation - May 8, 2015Illinois supreme court decision in re pension reform litigation - May 8, 2015
Illinois supreme court decision in re pension reform litigation - May 8, 2015Cook County Commissioner Bridget Gainer
 
Возможности приложения для ресторанов
Возможности приложения для ресторановВозможности приложения для ресторанов
Возможности приложения для ресторановSoGe Mobile
 
Food security bill
Food security billFood security bill
Food security billPANKAJMISHR
 
Internet Marketing Techniques That Require No SEO Knowledge
Internet Marketing Techniques That Require No SEO KnowledgeInternet Marketing Techniques That Require No SEO Knowledge
Internet Marketing Techniques That Require No SEO KnowledgeNasir Uddin Shamim
 
¿Cómo fue la cultura de Mesopotamia?
¿Cómo fue la cultura de Mesopotamia?¿Cómo fue la cultura de Mesopotamia?
¿Cómo fue la cultura de Mesopotamia?Hector Neto
 

Andere mochten auch (18)

Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Disney
DisneyDisney
Disney
 
Smart analyzer v9 product profile
Smart analyzer v9 product profileSmart analyzer v9 product profile
Smart analyzer v9 product profile
 
Power point essentials #15 8°b
Power point essentials #15 8°bPower point essentials #15 8°b
Power point essentials #15 8°b
 
Augustin romeo
Augustin romeoAugustin romeo
Augustin romeo
 
My biodata
My biodataMy biodata
My biodata
 
Kasper en jef
Kasper en jefKasper en jef
Kasper en jef
 
LIMC 01: SPEECHES
LIMC 01: SPEECHESLIMC 01: SPEECHES
LIMC 01: SPEECHES
 
Illinois supreme court decision in re pension reform litigation - May 8, 2015
Illinois supreme court decision in re pension reform litigation - May 8, 2015Illinois supreme court decision in re pension reform litigation - May 8, 2015
Illinois supreme court decision in re pension reform litigation - May 8, 2015
 
Возможности приложения для ресторанов
Возможности приложения для ресторановВозможности приложения для ресторанов
Возможности приложения для ресторанов
 
SRRV
SRRVSRRV
SRRV
 
Food security bill
Food security billFood security bill
Food security bill
 
Internet Marketing Techniques That Require No SEO Knowledge
Internet Marketing Techniques That Require No SEO KnowledgeInternet Marketing Techniques That Require No SEO Knowledge
Internet Marketing Techniques That Require No SEO Knowledge
 
¿Cómo fue la cultura de Mesopotamia?
¿Cómo fue la cultura de Mesopotamia?¿Cómo fue la cultura de Mesopotamia?
¿Cómo fue la cultura de Mesopotamia?
 

Ähnlich wie Cyber Crime and Security

presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptJatinRajput67
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up bookDiego Souza
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxjonadhe mondeja
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3Denise Bailey
 

Ähnlich wie Cyber Crime and Security (20)

presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
My presentation
My presentationMy presentation
My presentation
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 

Kürzlich hochgeladen

SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 

Kürzlich hochgeladen (20)

SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Cyber Crime and Security

  • 1. ARE YO SECURE U D CYBER CRIME COMPUTING WORKSOP (CW ) PRESENTATION - SOFTWARE ENGINEERING SECURITY
  • 2. CYBER CRIME IS NOTHING BUT WHERE THE COMPUTER USED AS AN OBJECT OR SUBJECT OF CRIME. CRIME COMMITED USING COMPUTER AND INTERNET CRIMINAL ACTIVITES THAT MAKE USE OF COMPUTERS OR NETWORKS. CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 3. CYBER CRIME AGAINST A PERSON CYBER CRIME AGAINST A PROPERTY CYBER CRIME AGAINST GOVERNMENT CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 4. Other Scams 20% Virus & Phishing Malfare 30% 50% CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 5. Social engineering is the art of manipulating people so they give up confidential information. 1-Never reveal credit or security information to anyone, even your friends. 2- If a friend urgently ask for your help,to transfer money etc, first confirm then proceed. 3-Never open suspicious emails containing links by friends name, maybe it’s a hacker, trying to reach you from friends email. CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 6. Software piracy is a huge illegal business, running into billions of dollars. These includes the sale of imitation software on Internet auction and classified ads 1-It can be prevented by license. 2 types of software licensing management – online and offline. ONLINE – Software checked each time OFFLINE – Only once. 2- Another option to use for anti piracy is to price the software low enough so that it is not worth while forthe hackers to hack, this is very subjective and is up the vendors to decide for themselves CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 7. Identity theft occurs when someone obtains your personal information, such as your credit card data or Social Security number, to commit fraud or other crimes. 1-Monitor your bank and credit card statements 2-Verify your mailing address with the post office and financial institutions- Monitor your bank and credit card statements 3-Choose secure online companies to make online transactions. CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 8. Spoofing is a technique used by computer hackers to gain unauthorized access to our computers by sending a message with an IP address saying it is coming from trusted host , similarly with emails and caller ID . 1- CALL SPOOFING - Block spoofing calls. Services such as trapcall.com or safercall.com allow you to block calls that display false caller information. 2- EMAIL SPOOFING - Safeguard your email address and avoid disclosing it.. Use a spam filter, and always use an image to display your email online. 3- Use of good antivirus softwares can prevent IP SPOOFING. CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 9. Distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. 1-Working with the Internet Service Provider (ISP) to establish quality of service rates to limit the amount of bandwidth one customer can utilize 2- Using firewalls and filtering devices to filter all unnecessary ports and protocols 3-(D)DoS-Deflate is a free open source Unix/Linux script by MediaLayer that automatically mitigate (D)DoS attacks. CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 10. Phishing is a form of online identity theft in which fraudsters trick Internet users into submitting personal information to illegitimate web sites. 1- Communicate personal information only via phone or secure web sites 2-Do not click on links, download files or open attachments in emails from unknown senders 3- Never email personal or financial information, even if you are close with the recipient. 4-Beware of links in emails that ask for personal information. CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 11. A salami technique is an automated form of abuse involving Trojan horses or secret execution of an unauthorized program that causes the unnoticed or immaterial debiting of small amounts of assets from a large number of sources or accounts. 1-Don't ignore what appear to be errors incomputer-based financial or other accounting systems. 2-Keep regular checks on account to see changing status. CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME
  • 12. Malicious software that attaches itself to other software. 1-Use good antivirus and firewall in order to protect yourself. 2- Never download files, because viruses and programs like Trojan Horses and Keyloggers may be attached by sender. CYBER 1 of 10 COMPUTING WORKSHOP PRESENTATION CRIME