Download - Cyber crime
![Page 1: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/1.jpg)
INTRODUCTION
TO CYBERCRIME AND SECURITY
BY PANKAJ R. KUMAWAT
![Page 2: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/2.jpg)
WHAT IS CYBERCRIME?
• USING THE INTERNET TO COMMIT A CRIME.
• IDENTITY THEFT
• HACKING
• VIRUSES
• FACILITATION OF TRADITIONAL CRIMINAL ACTIVITY
• STALKING
• STEALING INFORMATION
• CHILD PORNOGRAPHY
![Page 3: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/3.jpg)
CYBERCRIME COMPONENTS• COMPUTERS
• CELL PHONES
• PDA’S
• GAME CONSOLES
![Page 4: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/4.jpg)
HIGH-PROFILE CYBERCRIME-RELATED CASES
• TJ MAXX DATA BREACH
• 45 MILLION CREDIT AND DEBIT CARD NUMBERS STOLEN
• KWAME KILPATRICK
• CELL PHONE TEXT MESSAGES
• BTK SERIAL KILLER
• KEVIN MITNICK
![Page 5: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/5.jpg)
COMPUTER SECURITY
• CONFIDENTIALITY
• ONLY THOSE AUTHORIZED TO VIEW INFORMATION
• INTEGRITY
• INFORMATION IS CORRECT AND HASN’T BEEN ALTERED BY UNAUTHORIZED USERS OR SOFTWARE
• AVAILABILITY
• DATA IS ACCESSIBLE TO AUTHORIZED USERS
![Page 6: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/6.jpg)
COMPUTER SECURITY
Figure 1.0 – CIA Triangle
![Page 7: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/7.jpg)
COMPUTER SECURITY - THREATS
• MALWARE
• SOFTWARE THAT HAS A MALICIOUS PURPOSE
• VIRUSES
• TROJAN HORSE
• SPYWARE
![Page 8: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/8.jpg)
COMPUTER SECURITY - THREATS• INTRUSIONS
• ANY ATTEMPT TO GAIN UNAUTHORIZED ACCESS TO A SYSTEM
• CRACKING
• HACKING
• SOCIAL ENGINEERING
• WAR-DRIVING
![Page 9: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/9.jpg)
COMPUTER SECURITY - THREATS• DENIAL-OF-SERVICE (DOS)
• PREVENTION OF LEGITIMATE ACCESS TO SYSTEMS
• ALSO DISTRIBUTED-DENIAL-OF-SERVICE (DDOS)
• DIFFERENT TYPES:
• PING-OF-DEATH
• TEARDROP
• SMURF
• SYN
![Page 10: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/10.jpg)
COMPUTER SECURITY - THREATS
Figure 1.1 – DoS and DDoS Models
![Page 11: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/11.jpg)
COMPUTER SECURITY - TERMINOLOGY
• PEOPLE
• HACKERS
• WHITE HAT – GOOD GUYS. REPORT HACKS/VULNERABILITIES TO APPROPRIATE PEOPLE.
• BLACK HAT – ONLY INTERESTED IN PERSONAL GOALS, REGARDLESS OF IMPACT.
• GRAY HAT – SOMEWHERE IN BETWEEN.
![Page 12: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/12.jpg)
COMPUTER SECURITY - TERMINOLOGY
• SCRIPT KIDDIES
• SOMEONE THAT CALLS THEMSELVES A ‘HACKER’ BUT REALLY ISN’T
• ETHICAL HACKER
• SOMEONE HIRED TO HACK A SYSTEM TO FIND VULNERABILITIES AND REPORT ON THEM.
• ALSO CALLED A ‘SNEAKER’
![Page 13: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/13.jpg)
COMPUTER SECURITY - TERMINOLOGY
• SECURITY DEVICES
• FIREWALL
• BARRIER BETWEEN NETWORK AND THE OUTSIDE WORLD.
• PROXY SERVER
• SITS BETWEEN USERS AND SERVER. TWO MAIN FUNCTIONS ARE TO IMPROVE PERFORMANCE AND FILTER REQUESTS.
• INTRUSION DETECTION SYSTEMS (IDS)
• MONITORS NETWORK TRAFFIC FOR SUSPICIOUS ACTIVITY.
![Page 14: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/14.jpg)
COMPUTER SECURITY - TERMINOLOGY
• ACTIVITIES
• PHREAKING
• BREAKING INTO TELEPHONE SYSTEMS (USED IN CONJUNCTION WITH WAR-DIALING)
• AUTHENTICATION
• DETERMINES WHETHER CREDENTIALS ARE AUTHORIZED TO ACCESS A RESOURCE
• AUDITING
• REVIEWING LOGS, RECORDS, OR PROCEDURES FOR COMPLIANCE WITH STANDARDS
![Page 15: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/15.jpg)
COMPUTER SECURITY - CAREERS
• INFORMATION SECURITY ANALYST
US NATIONAL AVERAGE SALARY
Figure 1.2 – Median salary courtesy cbsalary.com
![Page 16: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/16.jpg)
COMPUTER SECURITY - CERTIFICATIONS• ENTRY-LEVEL
• SECURITY+ HTTP://WWW.COMPTIA.ORG/CERTIFICATIONS/LISTED/SECURITY.ASPX
• CIW SECURITY ANALYST WWW.CIWCERTIFIED.COM
• INTERMEDIATE
• MSCE SECURITY HTTP://WWW.MICROSOFT.COM/LEARNING/EN/US/CERTIFICATION/MCSE.ASPX#TAB3
• PROFESSIONAL
• CISSP WWW.ISC2.ORG
• SANS WWW.SANS.ORG
![Page 17: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/17.jpg)
COMPUTER SECURITY - EDUCATION
• COMMUNITY-COLLEGE
• WASHTENAW COMMUNITY COLLEGE
• COMPUTER SYSTEMS SECURITY HTTP://WWW4.WCCNET.EDU/ACADEMICINFO/CREDITOFFERINGS/PROGRAMS/DEGREE.PHP?CODE=APCSS
• COMPUTER FORENSICS HTTP://WWW4.WCCNET.EDU/ACADEMICINFO/CREDITOFFERINGS/PROGRAMS/DEGREE.PHP?CODE=APDRAD
![Page 18: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/18.jpg)
COMPUTER SECURITY - EDUCATION
• 4-YEAR COLLEGE
• EASTERN MICHIGAN UNIVERSITY
• INFORMATION ASSURANCE
• APPLIED
• NETWORK
• CRYPTOGRAPHY
• MANAGEMENT
• HTTP://WWW.EMICH.EDU/IA/UNDERGRADUATE.HTML
![Page 19: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/19.jpg)
Any Queries ????
![Page 20: Cyber crime](https://reader030.vdocuments.us/reader030/viewer/2022032514/55d4f851bb61eb691f8b4679/html5/thumbnails/20.jpg)
THANK YOU !!THANK YOU !!