Вы находитесь на странице: 1из 19

The Invisible Criminals Are Dangerous Than

Introduction: What It Is?


He Uses Technology As His Weapon
It Is A Criminal Activity Committed On The Internet . A Generalized Definition Of Cyber Crime May Be

Unlawful Acts Wherein The Computer Is Either A Tool Or Target Or Both.

Introduction: What It Is?


Cyber

crime offenses against technology infrastructure. Such conducts includes: Illegal access Illegal interception System interference Data interference Misuse of devices Fraud Forgery

the

information

WHY SHOULD WE CARE?


It

is important for computing professionals to understand cyberterrorism for the benefit of themselves, their profession, and society as a whole.

WHY SHOULD WE CARE?

The computer is being used as a new

weapon to obtain results similar to the use of bombs, kidnappings or assignations


The computer as the target. The computer as generator of new types of crimes. The computer as the tool of conventional crime.

THREATS TO COMPUTER SYSTEMS


Hacking Phreaking Viruses Worms Trojan horses Cyber Squatting Denial of Service Scans Sniffer Spoofing

THREATS TO COMPUTER SYSTEMS


Malicious Applets War Dialing Logic Bombs Buffer Overflow Password

Crackers Dumpster Diving Crackers Script Bunnies Insiders

Security incidents between 1995 and 2003

Types of Cyberattacks, by percentage (source- FBI)


Financial fraud

: Sabotage of data/networks: Theft of proprietary information: System penetration from the outside: Denial of service: Unauthorized access by insiders: Employee abuse of internet privileges Viruses :

11% 17% 20% 25% 27% 71% 79% 85%

PROTECTION AGAINST THREATS


Use

of firewalls to screen all communications to a system, including e-mail messages, which may carry logic bombs. All accounts should have passwords and the password should be unusual and difficult to guess.

PROTECTION AGAINST THREATS


Change the network configuration when

defects become known. Check with vendors for upgrades and patches Installation of anti-virus programs in the system can check spread of viruses and worms.

NEW TECHNOLOGY TO MONITOR CYBER CRIME


Cyber Cafe Monitoring System

(CCMS)
This Technology Comprises Of A Biometric System For Recording Fingerprints Of Persons Who Use A Workstation. This Potent System Has Some Other Features Like Facility To Take Live Snapshots, Public IP Address And MAC Address.

Importance Of Cyber Law


Cyber Law is the law governing computers and the Internet. It protect against Unauthorized access Email bombing Data diddling Logic bomb Virus / worm attack Trojan attack Internet time theft

SOLUTION TO CYBER CRIME


Cybercheck Secure Document

Interchange For Transactions And On-line Payment.


Cyberpos Acquiring Of Payment

Cards Via Internet.

SOLUTION TO CYBER CRIME


CyberCheck
Ttransfer Of Interbank Clearing From

Platina Bank To Multibank Clearing, Development Of New Software Based On XML Technology Along With Adding Digital Signature Of Customer Bank To The Standard Document.

SOLUTION TO CYBER CRIME


yberPOS
Coverage Of Major Russian Processors,

Establishing Processors.

Gateway

With

Foreign

Suggestions for better security


Use Strong Passwords. Make Regular Back-up Of Critical Data. Use Virus Protection Software. Use A Firewall As A Gatekeeper Between Your

Computer And The Internet.


Do Not Keep Computers Online When Not In Use. Do Not Open E-mail Attachments From Strangers.

CONCLUSIONTo These Without Careful Attention

Issues, The Uncontrolled Interconnection Of Existing Systems, On Which People And Organisations Are Critically Dependent, Will Continue To Create Huge, Ill-defined And Defenceless Super - Systems.

So We Must Pay Attention To All Those

Issues And Protect The World From Cyber Crime.

Вам также может понравиться