title
Cyber Threats and
Security
Agenda
Presentation title
C 1.CIBERCRIME
2.CIBER
SECURITY
2
Cybercrime
Introduction to Cybercrime
Networks of today have simplified the communication
process and provided great opportunities in almost all
spheres, there are various types of challenges and threats
associated with their use. These threats are known as
cybercrimes. Cybercrime refers to criminal activities
carried out through digital means or the internet. It
encompasses a broad range of illegal activities that target
individuals, organizations, or even governments with the
intent of causing harm, stealing sensitive information,
financial gains, or disrupting normal operations.
Presentation title 4
Types of Cybercrime
Crimes against an individual person
Crimes against property
Crimes against an organisation/society
Crimes against an individual person
The offence that cause or attempt harm or
threat to an individual can be committed in
many forms such as : 1. Email Spoofing
2. Cyber Stalking
3. Cyber Bullying
• Email Spoofing
Email spoofing is a technique used in spam
and phishing attacks to trick users into
thinking a message came from a person or
entity they know or trust. In spoofing
attacks, the sender forges email headers so
that client software displays the fraudulent
sender address, which most users take at
face value.
Presentation title 7
Cyber Stalking
In Cyber Stalking, an attacker a victim through emails, social
media, chat rooms, blogs, instant messaging, etc. A stalker can be
an online stranger or a person known to the targeted person.
In Cyber Stalking the person can :
harass and humiliate the victim by posting false information
about him.
Monitor or view a victim’s online activities.
damage the victim’s computer by sending viruses.
Presentation title 8
Cyber Bullying
It is an act of harming or harassing through IT
in a deliberate manner. This includes insulting
remarks and threatening messages sent by
email, spreading rumors about the person
either by emails or social networking sites,
posting embarrassing photos or videos to hurt
the person, making derogatory remarks
against gender, race, religion, or nationality.
Crimes against property
• Crimes against property are crimes that destroy or deprive
an owner of property, whether or not violence is used or
threatened. These crimes affect another person's rights of
ownership or possession of property, such as money, cars,
jewelry, or drugs. Some examples of crimes against
property are theft, fraud, deception, criminal damage,
arson, forgery, and forcible entry. These crimes are
generally considered less serious than crimes against
persons, but they can still result in felony charges.
Presentation title 10
Identify Theft
It refers to the act of stealing and
misuse of someone’s personal
information. It is a major issue for
people who use the internet for online
shopping, cash transactions, and
banking services.
Presentation title 11
Phishing
Phishing is a form of social
engineering and scam where attackers deceive
people into revealing sensitive information or
installing malware such as ransomware. Phishing
attacks have become increasingly sophisticated
and often transparently mirror the site being
targeted, allowing the attacker to observe
everything while the victim is navigating the site,
and transverse any additional security boundaries
with the victim.
Presentation title 12
Pharming
Pharming is a cyberattack intended to redirect a website's traffic to
another, fake site by installing a malicious program on the computer.
Pharming can be conducted either by changing the hosts file on a
victim's computer or by exploitation of a vulnerability in DNS
server software. DNS servers are computers responsible for resolving
Internet names into their real IP addresses. Compromised DNS servers
are sometimes referred to as "poisoned". Pharming requires
unprotected access to target a computer, such as altering a customer's
home computer, rather than a corporate business server
Presentation title 13
Crimes against an
organisation/society
It is a planned and politically motivated
attack to cause large scale disorder in
computer networks. This category can
cause panic amongst the civilians. In this
category, criminals hack government
websites, military websites, or circulate
propaganda.
Presentation title 14
Virus
Presentation title 15
Mirjam Nilsson
Thank you mirjam@contoso.com
www.contoso.com