Cybersecurity - Adam
Cybersecurity - Adam
FOCUS ON
PRESENTED BY PHIRI A
MALCOLM MOFFATT COLLEGE OF EDUCATION
© 2021
CYBER CRIMES
1
9/17/2022
DEFINITIONS
Cyber Attack: is a deliberate exploitation of
computer systems and networks of
information society
Hacking: refers to unlawful access to a
computer system
Hacker: a hacker is someone who exploits
weaknesses in a computer system or computer
network
DEFINITIONS
COMPUTER FRAUD:
Illegal means by which people (fraudsters) intend to
deceive, misrepresent, destroy, steal information, or
cause harm to others by accessing information
through deceptive ways. E.g piracy, social engineering.
2
9/17/2022
3
9/17/2022
4
9/17/2022
CATEGORIES OF CYBER
CRIME
Cyber Crime may be basically
divided into three (3) categories-
• Against Persons
• Against Property
• Against Government
CATEGORIES OF CYBER
CRIME
Against Person
• distribution, posting, and dissemination of obscene material,
indecent exposure and Child pornography
5
9/17/2022
CATEGORIES OF CYBER
CRIME
Against Property
• unauthorized computer trespassing through cyberspace
• computer vandalism,
• transmission of harmful programs,
• unauthorized possession of computerized information.
CATEGORIES OF CYBER
CRIME
Against Government
• Hactivism
• Cyber Terrorism
6
9/17/2022
HACTIVISM
Hacktivism is the act of misusing a computer system
or network for a socially or politically motivated
reason. Hacktivism is a two dimension technic which
involve hacking activities that maybe just from curious
purposes and less harmless as compared to terrorism
intentions which are meant for destruction.
HACTIVISM
7
9/17/2022
CYBER TERRORISM
CYBER TERRORISM
Common examples of cyberterrorism are hacking into computer
systems, introducing viruses to vulnerable networks, web site
defacing, Denial-of-service attacks, or terroristic threats made via
electronic communication. Sabotage of systems in various fields
(water, manufacturing, intelligence and banking systems).
Terrorist would overload network systems, abuse public lines by using
virtue weapons such as logic bombs, Trojan horses, viruses etc.
8
9/17/2022
CYBER STALKING
• Cyberstalking is a crime in which the attacker harasses a
victim using electronic communication, such as e-mail or
instant messaging (IM), or messages posted .. E.g. on WhatsApp,
twitter, Facebook etc.
• Stalkers would;
• Discredit your place
• Use your Image - defamation / defacement
• Personal details
CYBER BULLYING
• the use of digital technologies. It can take place on social media, messaging
platforms, gaming platforms and mobile phones. It is repeated behavior,
aimed at scaring, angering or shaming those who are targeted.
• E.g.
• Posting lies about a person
• Embarrassing photos
• Posting Threatening information
9
9/17/2022
CHILD PORNOGRAPHY
CHILD PORNOGRAPHY
10
9/17/2022
CONT…
• Files can be protected in a variety of ways
including:
• The use of passwords for user access to the
computer network and on individual user areas
and/or files.
• Restricting user access to only those areas of the
computer network they need to access.
CONT…
• Encrypting means encoding (scrambling)
data to stop unauthorised people being able
to read the data.
• Only users who have the key to the code
can decode (decrypt) the data.
11
9/17/2022
CONT…
• Encryption is particularly useful when data is being sent
over a WAN system (e.g. the Internet)
• Encryption is used by online businesses to protect a
customer’s confidential financial data (e.g. credit card
details) from being accessed by someone who could use
that data fraudulently.
• World’s best encryption tool: is the Pretty Good Privacy(
PGP). Provides cryptographic privacy and authentication
for data communication. Encrypts texts, emails, files, disk
partitions etc.
CYBER CRIME
Vandalism
Obscene Content
Fraud
Software Piracy
Harassment
Cyber Stalking
Child Pornography
12
9/17/2022
THE END
“ours is a journey”
13