@ Manipal Institute of Technology Manipal
@ Manipal Institute of Technology Manipal
MANIPAL
P (A constituent wnit of MAHE, Manipal)
‘sirt MANIPAL INSTITUTE OF TECHNOLOGY
MANIPAL
T (A constituent unit of MAHE, Manipal)
Objectives
To understand
* Computer Security
Cyber Crime
* Cybercrime also known as Computer crime, refers to any crime that involves
* The computer may have been used in the commission of a crime, or it may be the target.
* Experts defined Cybercrime as "Offences that are committed against individuals or groups
of individuals with a criminal motive to intentionally harm the reputation of the victim or
cause physical or mental harm to the victim directly or indirectly, using modern
telecommunication networks such as Internet (Chat rooms, emails, notice boards and
Cyber Crime
Subscription____
Information
Competitor
Websites ——. °
o—— Drug Trafficking
o——— Private Communications
o—— Political Protests
o—llegal Information
TOR Enc
Accessible
Indexed for Search Engines
Surface Web
Little illegal activity
Relatively small in size
« Bank credential: $1,000 plus (6% of the total dollar amount in the
account)
« U.S. credit card with track data (account number, expiration date,
name and more): $12
commit crime.
Online Gambling
Intellectual Property Crimes
Email spoofing
oA
Cyber defamation
Cyber stalking
1. Financial crimes
2. Online gambling
There are millions of websites; all hosted on servers
abroad, that offer online gambling.
4. Email spoofing
* A spoofed email is one that appears to originate from one source but actually
has been sent from another source.
Address Spoofing
Mail from A using C address [email protected]
A
Spammer
5. Cyber Defamation
* This occurs when defamation takes place with the help of computers and / or
the Internet.
* Example: Someone publishes defamatory matter about someone on a website
or sends e-mails containing defamatory information to all of that person's
contacts.
Defamation
=
Dam:
reputs
6. Cyber stalking
* Cyber stalking involves following a person's movements across the Internet by
posting messages (sometimes threatening) on the bulletin boards frequented by
the victim, entering the chat-rooms frequented by the victim, constantly
bombarding the victim with emails etc.
A. Unauthorized Access
* Hacking is also the act by which other forms of cyber-crime (e.g., fraud,
A. Theft of information
A. Email Bombing
* This refers to sending large number of emails to the victim resulting in the
victim's email account (in case of an individual) or mail servers (in case of a
A. Salami Attacks
* These attacks are often used in committing financial crime and are based on
single case.
* E.g. a bank employee inserts a program, into the bank's servers, that deducts a
small amount of money (say 5 cents a month) from the account of every
holder.
handle, causing the resource (e.g. a web server) to crash thereby denying
“a
S > E \ TARGET SERVER
AT]‘ACKER P — -
o -E
ZOMBIES
bttp://effectbacking.blogspot.com
B. Virus
* Viruses are programs that attach themselves to a computer or a file and then
\V.
'4
r
' & 4
——
B. Logic Bombs
*Some viruses may be termed logic bombs because they lie dormant
31/12/2010 p/W/Y
C:\WINDOWS\S.EXE
AUTOSTART « VISIBLE
Activate Bomb
B. Trojan Attacks
* An unauthorized program which functions from inside what seems to be an
[o- —y
2=
e
~
Change? —=
Transmit? -
C. Worm
* Worms, unlike viruses do not need the host to attach themselves to. They merely
make functional copies of themselves and do this repeatedly till they eat up all the
\Y
vr4
oes
=
D. Web Jacking
* This occurs when someone forcefully takes control of a website (by cracking the
E. Cyber-Terrorism
Computer Security
* Computer security (also known as cyber security or IT security) is information
well as computer networks such as private and public networks, including the
Internet as a whole.
* Computer Security is the protection of computing systems and the data that they
store or access.
Computer Security
* Computer Security covers all the processes and mechanisms by which computer-
» Computer security also includes protection from unplanned events and natural
disasters.
* 90% of security safeguards rely on the computer user ("YOU") to adhere to good
computing practices
* Example: The lock on the door is the 10%. You remembering to lock the lock,
checking to see if the door is closed, ensuring others do not prop the door open,
keeping control of the keys, etc. is the 90%. You need both parts for effective
security.
* This means that everyone who uses a computer needs to understand how to keep
* Many cyber security threats are largely avoidable. Some key steps that everyone
—Use good, cryptic passwords that can't be easily guessed and keep your
passwords secret
—Make sure your operating system and applications are protected with all
—Make sure your computer is protected with up-to-date antivirus and anti-
spyware software
* To help reduce the risk, look for https in the URL and the little padlock that
appears in the URL bar or in a corner of the browser window before you enter
any sensitive information or a password.
* Loss of employee and public trust, embarrassment, bad publicity, media coverage, news
reports
Summary
* Computer Security