CYBER SECURITY LETS FIGHT AGAINST CYBER CRIME Tanya
CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba
AGENDA Brief overview on cybersecurity and some history Cybercrime and some common types Why is cybersecurity important? Practical personal and business cybersecurity measures
WHAT IS CYBER SECURITY? Cyber Security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the internet by cyber criminals.
OTHER TYPES OF SECURITY INCLUDES…. . Communication security-protecting organization communication technology, media and content. Network Security- is the protection of networking components, connection and content. Information Security- The protection of information and its critical elements. This includes the systems and hardware that uses, stores, or transmits information.
HISTORY AND INTERESTING FACTS The first recorded cyber crime took place in 1820 The first Virus was installed on an Apple computer in 1982 when a high school student developed the EIK Cloner The first Spam email took place in 1978 when it was sent over the Arpanet
HISTORY AND INTERESTING FACTS CONTINUED…… Robert Tappan Morris created the first worm and sent it from MIT to the web and caused $50. 000 worth of damages In 1994 Vladimir Levin intruded an American bank computer and stole 10 million dollars In 1999 Jonathan James hacked into a NASA computer and had access to data worth over 1. 7 million dollars. 46% of companies have admitted to suffering financial losses due to security incidences. The total amount in 2013 was $781. 84 million.
CYBER CRIME Crime committed using a computer and the internet to steal data or information. The computer is used as an object or subject of a crime. The computer could be the target of Cybercrime. Examples: Hacking, virus/worm attacks, DOS attacks ect. The Computer can be used as a weapon to facilitate cyber crime. Examples: Cyber terrorism, Credit card fraud ect Illegal Imports such as copyright violation. Which is material copied from sources that are not public domain or compatibly licensed without the permission of copyright holder. Causes legal issues Malicious programs
TYPES OF CYBER CRIMES HACKING DENIAL OF SERVICE ATTACK VIRUS DISSEMINATION COMPUTER VANDALISM CYBER TERRORISM SOFTWARE PIRACY FRAUD
HACKING Hacking means an illegal intrusion into a computer system and/or network Also known as CRACKING Government websites are the hot target of hackers due to the type of press coverage it receives. Main motives for hackers are publicity, revenge, adventure, desire to access forbidden information, overall destructive mindset
DENIAL OF SERVICE ATTACK This act is committed by the criminal, who floods the bandwidth of the victims network or fills ones e-mail box with spam mail depriving an individual of services they are entitled to access or provide.
COMPUTER VANDALISM Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are programs that attach themselves to a file and then circulate by some channel like email.
CYBER TERRORISM Terrorist attacks on the internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks. Terrorists that are extremely technology savvy are using 512 -bit encryption which is impossible to decrypt.
SOFTWARE PIRACY Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
VIRUS DISSEMINATION Malicious software that attaches itself to other software. VIRUS, WORMS, TROJAN HORSE, WEB JACKING, EMAIL BOMBING ect are all examples.
FRAUD Credit card fraud is the misuse of a credit card to make purchases without authorization or counterfeiting a credit card. Types of credit card fraud are online credit card fraud, advance payments, stolen card numbers. The lack of face-to-face or voice interaction on the Internet provides fraudsters anonymity. Some thieves may go through the trash to find billing statements then use account information to buy things. Advanced payment is someone using a forged or counterfeit check, then an advance or overpayment is made on a stolen credit card. Because the issuer must credit the payment at the time it is made, there is no time to verify the authenticity of the check.
WHY CYBERSECURITY? Internet security is a branch of computer security specifically related to the internet. Remember, cybersecurity's objective is to establish rules and measure to use against attacks over the internet.
VIDEO
ADVANTAGES OF CYBER SECURITY Defend us from critical attacks It helps us browse safe websites Internet security processes all the incoming and outgoing data on our computer Security will defend us from hacks and viruses
SECURITY Use antivirus software's and keep them up to date! Insert firewalls Uninstall unnecessary software Maintain backup Check security settings NEVER give your full name or address to strangers Learn more about internet privacy
SECURITY CONTINUED Keep your operating system up to date with critical security updates and patches Never open emails or attachments from unknown sources Use hard to guess passwords. Try not to use words found in the dictionary. PASSWORD CRACKING TOOLS DO EXIST! Back up your computer data on disks or cds often PROTECT WIFI PASSWORD DON’T share access to your computers with strangers
SECURITY FOR BUSINESS For hardware: Tamper-resistant devices, operate a TCB, hardware watermarking For software: Secure coding practice, code obfuscation, secure design and development, formal methods For network: Firewall, intrusion prevention and detection, VPN, encryption
CONCLUDING REMARKS As internet technology advances so does the threat of cyber crime. WE MUST PROTECT OURSELVES FROM CYBER CRIME. So BE SAFE, AND LETS EDUCATE OURSELVES when it comes to cyber security.
LAST WORDS TREAT YOUR PASSWORD LIKE YOU TREAT YOUR TOOTHBRUSH. NEVER GIVE IT TO ANYONE ELSE TO USE AND CHANGE IT EVERY FEW MONTHS.
REFERENCES "2014 State of Risk Report. " Trustwave, 1 Jan. 2014. Web. 6 Apr. 2015. <https: //www 2. trustwave. com/rs/trustwave/images/2014_TW_Stateof. Risk. Repor t. pdf>. Balan, Lăcrămioara, AND Popescu, Mihai. “Credit card fraud” The USV Annals of Economics and Public Administration [Online], 11 9 Sep 2011. Conner, Marcia. "Data on Big Data. " Marc!a Conner. 18 July 2013. Web. 6 Apr. 2015. Cybersecurity Basics - Level 3 Whiteboard Video. Level 3 Communications, 2012. Film.
REFERENCES CONT. Hansen, L. and Nissenbaum, H. (2009), Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly, 53: 1155– 1175. doi: 10. 1111/j. 1468 -2478. 2009. 00572. x Jang-Jaccard, Julian, and Surya Nepal. "A Survey Of Emerging Threats In Cybersecurity. " Journal Of Computer And System Sciences 5 (2014): 973. Academic One. File. Web. 14 Apr. 2015. Roeder, D. Bruce. "Cybersecurity. " Military Review 92. 3 (2014): 3842. Master. FILE Elite. Web. 14 Apr. 2015. Schiff, Jennifer L. "6 Biggest Business Security Risks and How You Can Fight Back. " CIO, 20 Jan. 2015. Web. 6 Apr. 2015. Superior Ecommerce Analytics. Digital image. Evermerchant. 1 Jan. 2015. Web.
REFERENCES CONT. Walters, Riley. "Cyber Attacks on U. S. Companies in 2014. " The Heritage Foundation, 27 Oct. 2014. Web. 2 Apr. 2015.
- Slides: 26