Download Cyber_ppt_part1

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
A Step Into The Computer Underground
“By Understanding The Enemy
We Are Better Prepared To Defend Ourselves”
1
INTRODUCTION
This tutorial provides some basic information and practical
suggestions for protecting your personal information and
computer from cyber-attacks. Cyber-safety topics covered include:
What is
Cyber-safety?
Consequences of
Inaction
Cyber-safety Threats
Cyber-safety Actions
at Home
2
WHAT IS CYBER SAFETY
Cyber-safety is a
common term used to
describe a set of
practices, measures
and/or actions you
can take to protect
personal information
and your computer
from attacks.
3
Security -The new face of Information
Technology Services
4
WHAT DO YOU
DO ONLINE?
Cybercrime : Top 20 Countries
India stands 11th in the ranking for Cyber Crime in the
World, constituting 3% of the Global Cyber Crime.
6
WHY INDIA?
A rapidly growing online user base
121 Million Internet Users
65 Million Active Internet Users, up by 28% from
51 million in 2010
50 Million users shop online on Ecommerce and
Online Shopping Sites
46+ Million Social Network Users
346 million mobile users had subscribed to Data
Packages.
Source: IAMAI; Juxt; wearesocial 2011
7
CYBER CRIMES
We can categorize Cyber crimes in
two ways
The Computer as a Target :-using a
computer to attack other computers.
e.g. Hacking, Virus/Worm attacks,
DOS attack etc.
The computer as a weapon :-using a
computer to commit real world
crimes.
e.g. Cyber Terrorism, IPR violations,
Credit card frauds, EFT frauds,
Pornography etc.
8
WHAT ARE CYBER SAFETY THREATS
Viruses
Viruses infect computers through email
attachments and file sharing. They delete files,
attack other computers, and make your
computer run slowly and can cause problem for
the whole network..
Hackers
Hackers are people who “trespass” into your
computer from a remote location. They may use
your computer to send spam or viruses, host a
Web site and cause computer malfunctions.
Identity Thieves
Spyware
People who obtain unauthorized access to your
personal information, such as Social Security and
financial account numbers. They then use this
information to commit crimes such as fraud or
theft.
Spyware is software that “piggybacks” on programs
you download, gathers information about your
online habits, and transmits personal information
without your knowledge.
These cyber-safety threats are responsible for
various Cyber Crimes
9
Internet Safety Risks
• Cyberbullying
• Posting personal /inappropriate
information
• Online Predators
• Sexting
• Phishing
• Cyber terrorism
• Defamation
• Sale of illegal articles
• Online gambling (Lottery)
• Email spoofing
• Email Bombing
• Email spamming
• Financial Frauds
• Exposure to inappropriate content
10