0% found this document useful (0 votes)
17 views11 pages

Presentation 1

This document discusses cyber crimes and information technology fraud. It provides an overview of the history of cyber crimes dating back to the 1820s. It outlines the main types of cyber crimes such as hacking, denial of service attacks, and identity theft. It also examines the threats of cyber crimes to the banking sector, including hacking of bank accounts and credit card scams. The document discusses prevention methods like firewalls, antivirus software, and strong passwords. It analyzes the reasons for cyber crimes such as the ease of accessing data and lack of effective legislation. Finally, it outlines both the merits of cyber security like data protection and reputation management, and the demerits including high costs and challenges of implementation.

Uploaded by

Harsh Ravadka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views11 pages

Presentation 1

This document discusses cyber crimes and information technology fraud. It provides an overview of the history of cyber crimes dating back to the 1820s. It outlines the main types of cyber crimes such as hacking, denial of service attacks, and identity theft. It also examines the threats of cyber crimes to the banking sector, including hacking of bank accounts and credit card scams. The document discusses prevention methods like firewalls, antivirus software, and strong passwords. It analyzes the reasons for cyber crimes such as the ease of accessing data and lack of effective legislation. Finally, it outlines both the merits of cyber security like data protection and reputation management, and the demerits including high costs and challenges of implementation.

Uploaded by

Harsh Ravadka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

CBYER CRIMES

&
IT FRAUDS
 Overview

 History

CONTENT  Types of cyber crime

 Threats of cyber crime


& to banking sector

OUTLINE  Prevention & cyber


security

 Merits & demerits


“Cybercrime is a fast‐growing area of crime.
More and more criminals are exploiting the
speed, convenience and anonymity of the

Overview Internet to commit a diverse range of criminal


activities that know no borders, either physical or
virtual” – Interpol

The 5 most cyber attack industries

1. The Computer as a weapon


1. Health care • Using a computer to commit real world crime
2. Maunfacturing • Cyber terrorism and credit card fraud.

3. Financial services
4. Government 2. The Computer as a target
• Using a computer to attack another computer
5. Transportation • Forms of Hacking, DOS/DDOS attack, virus/worm attacks
History
 1820 – First recorded cybercrime
 1078 – The first spam email
 1982– The first virus was installed on an apple computer
T 1. Hacking (credit card)
2. Denial of Service Attack
3. Identity theft
4. Virus Dissemination

Y 5. Computer Vandalism
6. Cyber Terrorism

P OF 7. Online Fraud
8. Software Piracy
9. Forgery
10.Malicious Code
11..Malware

E 12..Phishing
13..Spam
14.Spoofing
15.Defamation

S
The cyber threats can be in many Core Banking
Forms in banking sector attacks

Such as
Identity theft

Swift server
Mobile banking
attack

Application Web
attacks defamation

Payment gateway
attacks
Hacking bank
accounts
Credit card scams Phishing
Prevention and Cyber
Security

• Firewalls
• Operating system is up‐to‐date
• Up‐to‐date anti‐virus and anti‐
spyware
•Use a pop‐up advertising blocker
• Use strong passwords
• Secure wireless network
• Reputable websites and mobile
applications
• Avoid clicking on unexpected or
unfamiliar links
REASONS FOR CYBER
CRIMES
Competence to Accumulate Data

Lack Of Legislation Laws

Issue of Cyber Security

Unproblematic to Approach

Complex

Negligence
Merits of cyber security
• Protects personal data.
• Helps preserves reputation.
• Enhances productivity.
• Assists the remote
workspace.
• Regulation compliance.
• Improves cyber posture.
• Better data management.
• Helps educate and train the
workforce.
While the benefits of cyber security are unparalleled, implementing it can be both
costly and complex. There's also a lack of skilled professionals which makes it
challenging. Additionally, human errors make it difficult to achieve a robust security
posture.
What is the disadvantages of being cyber security?
Some of the cons of working in the cyber security sector include
the constant pressure to stay ahead of new types of cyber threats, as
well as the potential risk of data breaches even with robust security
systems in place.

What is a weakness in cyber security?


A vulnerability is a weakness that can be exploited by an attacker. Thus, a
weakness is an error, typically in the software code, that might lead to a
vulnerability.

You might also like