Introduction To Cyber Security
Introduction To Cyber Security
.
Banking Options
Cyber Crimes
Cyber crime
Criminal Activity
No great differences
Only difference is the medium through which crime is
committed
Knives and weapons vs port scanners, viruses, and worm to
gain access
Against groups or individuals
Intention is embezzlement of money or something of value
Physical presence of criminal at the site of crime is not must
What are Cyber Crime Threats
Damage to reputation and morale
Theft of identifiable information
IP theft including theft of data
Service disruption
Financial loss
Regulatory risks
Cost of investigation and damage control
Motives and Reasons for Cyber Crime
Greed
Power
Publicity
Revenge
Adventure
Desire to access forbidden information
Destructive mind set
Aspects of Technology that make Cyber Crime an
Easier Option
Coders
Kids
Drops
Mobs
Classification of Cyber Crimes
• E-mail Spoofing
A spoofing mail is the formation of email messages by impersonating
correspondent identity.
It shows its origin to be different from which actually it originates.
• E-mail Spamming
Spam is a message also called as junk mail; send with a web link or
business proposal.
Clicking on this link or replying to commercial offer send to a phishing
website or set up a malware in your workstation.
Crime against Individual
Cyber Defamation
Act of imputing any individual with intention to lower the person in the
estimation of the right-thinking members of society generally or to cause
him to be ignored or sidestepped or to rendering him to hate, disrespect or
ridicule.
Cyber Stalking
stalking is "pursuing stealthily”
following a person's movements across the Internet by posting messages
(sometimes threatening) on the bulletin boards frequented by the victim,
entering the chat-rooms visited by the victim, continually attacking the
victim with emails, etc.
Crime against Property
• Credit Card Frauds
Online fraud and cheating are most money-spinning trades that are rising
nowadays in the cyber space.
• Cyber terrorism
• Cyber warfare
• Denial of service
• Intellectual property theft
• Computer vandalism
Techniques of Cyber Crimes
• Dumpster diving – Treasure in trash
• Wire tapping – penetrate telecom networks
• Eavesdropping on emanations – pick up data from signals
• Denial of service – load a computer with numerous requests
• Phishing / Masquerading – use a mail message to look like a real site
• Data attacks -
• Unauthorised copying of data
• Trap doors
• Traffic analysis
• Harassment
• Software piracy
• Session hijacking
Risk Management
• Process of identifying critical information assets, assessing
the risks, threats and vulnerabilities that these assets face,
estimating the impact of these risks and launching
countermeasures
• Countermeasures:-
• Accepting the risk
• Transferring the risk
• Avoiding the risk
• Applying control
Security Controls
• Specify, design, implement, operate and maintain security controls
• Security Managemnent Framework – ISO/IEC 27002
• Cryptography
• Encryption
Thanks