Cyber Security
Introduction to cybersecurity tools and cyber
attack
Cybersecurity roles, processes and operating
system security
Cybersecurity compliance, Framework and
system administration
Network security and Database
Content
Introduction
Categories of Cyber crime
Types of Cyber crime
Types of Security tools
Advantage of Cybersecurity
Safety tips to Cyber crime
References
Introduction
The Internet in India is growing rapidly. There are two sides to a
coin. Internet also has it's own disadvantages is cyber crime-illegal
activity committed on the Internet.
Crime committed using a computer and the internet to steal a
person's identity or illegal imports or malicious programs. Cyber
crime is an activity done using computers and the internet.
Cyber security refers to the technologies and processes designed
to protect computers, networks and data from unauthorized
access and attacks delivered via the internet by cyber criminals.
Though, cyber security is important for the network, data and
application security.
The objective of cyber security is to establish rules and measure to
use against attacks over the internet.
What is cyber security
Cyber security is the protection of internet-connected
systems, including hardware, software and data,
from cyber attacks.
In a computing context, security comprises cyber
security and physical security -- both are used by
enterprises to protect against unauthorized access to
data centers and other computerized systems
In formation security, which is designed to maintain
the confidentiality, integrity and availability of data,
is a subset of cyber security.
SECURITY & PRIVACY
Security privacy
Security refers to how Privacy relates to any
your personal rights you have to
information is protected control your personal
information and how it's
used
Example:Privacy Policies
Principles of computer security
Types of cyber crime
Hacking
Phishing
Denial of service
Scam Email
Spyware , Adware
Malware (Trojan, Virus, Worms etc.)
ATM Skimming and point of Scale Crimes
Ransomware
HACKING
Hacking in simple
terms means
illegal
intrusion into a
computer system and a
network
It is also known as a
cracking government
websites are the hackers
due to the press
coverage, it receives
PHISHING
Phishing is a fraudulent attempt usually made
through email to steal your personal information.
Phishing is the attempt to obtain sensitive
information such as username, password and
credit card details often for malicious reasons
through an electronic communication (such as E-
mail )
A common online phishing scam starts with an
email message that appears to come from a
trusted source but actually directs recipients to
provide information to a fraudulent web site.
PHISHING
DENIAL OF SERVICE
The is an act by the criminals who floods the bandwidth
of the victims network.
In the DoS attack, a hacker uses a single internet
connection to either exploit a software vulnerability or
flood a target with fake request –usually in an attempt to
exhaust server resources
On the other hand, DDoS attacks are launched from
multiple connected devices that are distributed across
the internet.
DoS = When a single host attacks.
DDoS = when multiple hosts attack simultaneously and
continuously.
DENIAL OF SERVICE (DDOS)
SCAM EMAIL
Email Spam is the electronic version of junk
mail. It involves sending unwanted messages,
often unsolicited advertising, to a large
number of recipients. Spam is a serious
security concern as it can be used to deliver
Trojan horses, viruses, worms, spyware, and
targeted phishing attacks.
SCAM EMAIL
Email Spam is the electronic version of junk
mail. It involves sending unwanted messages,
often unsolicited advertising, to a large
number of recipients. Spam is a serious
security concern as it can be used to deliver
Trojan horses, viruses, worms, spyware, and
targeted phishing attacks.
SCAM EMAIL
MALWARE
It's malicious software (such as Virus, Worms &
Trojan), which specifically designed to disrupt or
damage computer system or mobile device.
Hackers use malware for any number of reasons
such as, extracting personal information or
passwords, stealing money, or preventing owners
from accessing their device.
Viruses are programs that attach themselves to a
computer or a file and then circulate themselves to
other files and to other computers on a network.
They usually affect the data on a computer and
mobile device either by altering or deleting it.
worms are standalone software and do not
require a host program or human help to
propagate.
Trojan is a type of malware that pretends to
be something useful, helpful, or fun while
actually causing harm or stealing data.
Trojans are often silently downloading other
malware (e.g. spyware, adware, ransomware)
on an infected device as well.
MALWARE
SPYWARE
Spyware is software installed without your
knowledge or consent that can monitor your
online activities and collect personal
information while you're online
Spyware is malicious software that enters a
user's computer, gathers data from the device
and user, and sends it to third parties without
their consent
SPYWARE
ADWARE
Adware is a type of malware that bombards
you with endless ads and pop-up windows
that could potentially be dangerous for your
device. The best way to remove adware is to
use an adware removal tool.
RANSOMWARE
Ransomware is as scary as it sounds. Hackers use this
technique to lock you out of your devices and demand
a ransom in return for access. Ransomware puts you
in a sticky situation, so it's best to know how to avoid
it.
Ransomware (a.k.a. rogueware or scareware) restricts
access to your computer system and demands that a
ransom is paid in order for the restriction to be
removed. The most dangerous ransomware attacks
are caused by Wannacry, Petya, Cerber and Locky
ransomware. The money which suppose to be paid to
remove ransomware from your system which is called
ransom money
RANSOMWARE
ATM Skimming and Point of Scale Crimes
It is a technique of compromising the ATM
machine by installing a skimming device a top the
machine keypad to appear as a genuine keypad or
a device made to be affixed to the card reader to
look like a part of the machine
Additionally, malware that steals credit card data
directly can also be installed on these devices.
Successful implementation of skimmers cause in
ATM machine to collect card numbers and
personal identification number codes that are
later replicated to carry out fraudulent
transaction
TYPES OF CYBER ATTACKS