Cyber Crime and Social Media Security
-
Upload
hem-pokhrel -
Category
Technology
-
view
1.153 -
download
2
Transcript of Cyber Crime and Social Media Security
![Page 1: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/1.jpg)
Cyber Crime - Prime College
![Page 2: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/2.jpg)
Presenter’s Profile
Hem Sagar Pokhrel
MSP 2013
Prime College
Volunteer, Youth Action Nepal
Anamnagar, Kathmandu-Nepal
@NepaliSagar
www.facebook.com/
geeksagar
![Page 3: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/3.jpg)
WHAT IS CYBER CRIME ?
Computer crime or cybercrime is a
form of crime where the Internet or
computers are used as a medium to
commit crime.
![Page 4: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/4.jpg)
National Research Council,
"Computers at Risk",
1991.
"The modern thief can steal more with
a computer than with a gun.
Tomorrow's terrorist may be able to do
more damage with a keyboard than
with a bomb".
![Page 5: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/5.jpg)
TYPES OF CYBER CRIME
1. Cybercrimes against
persons.
2. Cybercrimes against
property.
3. Cybercrimes against
government.
![Page 6: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/6.jpg)
1.AGAINST PERSON
Includes various harassment of anyone
with the use of a computer such as e-
mail.
E.g.:- The Melissa virus first appeared on the internet
in March of 1999. It spread rapidly throughout
computer systems in the United States and Europe. It
is estimated that the virus caused 80 million dollars in
damages to computers worldwide.
![Page 7: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/7.jpg)
AGAINST PERSON contd..
oCyber harassment is a distinct Cybercrime.
oHarassment can be sexual, racial, religious, or other.
Persons perpetuating such harassment are also guilty
of cybercrimes.
oCyber harassment as a crime also brings us to
another related area of violation of privacy of citizens.
oNo one likes any other person invading the
invaluable and extremely touchy area of his or her
own privacy which the medium of internet grants to
the citizen.
![Page 8: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/8.jpg)
2.AGAINST PROPERTY
Include computer vandalism (destruction of others' property), transmission of harmful programmes.
E.g. : A Mumbai-based upstart engineering company lost a say and much money in the business when the rival company, an industry major, stole the technical database from their computers with the help of a corporate cyber spy.
![Page 9: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/9.jpg)
3.AGAINST GOVERNMENT
An individual "cracks" into a
government or military maintained
website or systems.
This crime manifests itself into
terrorism .
E.g. Group like LUZSEC Anonymous
![Page 10: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/10.jpg)
Why learn about CYBER CRIME ?
Everybody is using COMPUTERS.
New generation is growing up with computers
Terrorist targeted the teenagers.
Conventional crimes like Forgery,, extortion,,
kidnapping are being committed with the help
of computers.
MOST IMPORTANT - Monetary transactions
are moving on to the INTERNET
![Page 11: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/11.jpg)
IN SHORT
Cyber CRIME is any
crime where Computer is
a target. Computer is a tool of
crime Computer is incidental
to crime
![Page 12: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/12.jpg)
VICTIMS
Desperados and greedy
people
Unskilled &
Inexperienced
Unlucky people
![Page 13: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/13.jpg)
Hacker and Cracker
A Hacker is a person who just wants to know the
inner workings of computer systems, helping to
improve them if they detect flaws in their security.
A Cracker is a person with high skills in computer
systems (the same way that hackers), these skills are
regularly used for personal benefit or for harm.
![Page 14: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/14.jpg)
HACKING Illegal intrusion into a computer system without
the permission of the computer owner/user.
Types1. Ethical hacking &2. Non- ethical hacking
![Page 15: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/15.jpg)
VIRUS DISSEMINATION
Malicious software that
attaches itself to other
software.e.g.:-1. Virus, worms, 2. Trojan Horse, 3. Time bomb,4. Logic Bomb,
![Page 16: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/16.jpg)
SOFTWARE PRIVACY
Theft of software through the illegal copying
of genuine programs or the counterfeiting
and distribution of products intended to pass
for the original.
Retail revenue losses worldwide are ever
increasing due to this crime Can be done in
various ways
E.g.:-End user copying, Hard disk loading,
Counterfeiting,
Illegal downloads from the internet etc.
![Page 17: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/17.jpg)
INTERNET RELAY CHAT
Internet Relay Chat (IRC) servers have chat
rooms in which people from anywhere the
world can come together and chat with each
other.
Criminals use it for meeting co-conspirators.
Hackers use it for discussing their exploits /
sharing the techniques.
![Page 18: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/18.jpg)
DDOS ATTACK
malicious action typically taken against a
computer system such as a server or
webpage host. Server Flooding is achieved by causing a
server to attempt to respond to an excessive number of users simultaneously
Server crashing is typically achieved through a malicious piece of software that uses a flaw or weakness in the server programming to cause the server to crash and be inaccessible until restarted.
![Page 19: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/19.jpg)
Email Bombing
Form of denial of service attack that floods
an inbox and mail server with messages.
This type of attack can be a nuisance on a
low level, but it can also become a serious
problem.
There are a variety of techniques that can be
used to address email bombing. Maintaining -multiple email addresses for different activities can help.
![Page 20: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/20.jpg)
NET EXTORTION
Copying the company’s
confidential data in order to
extort paid company for huge
amount.
![Page 21: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/21.jpg)
CYBER DEFAMATION
The Criminal sends emails containing
defamatory matters to all concerned off the
victim or post the defamatory matters on a
website..
E.g.:-(disgruntled employee may do this
against boss,, ex-boys friend against girl,,
divorced husband against wife etc.)
![Page 22: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/22.jpg)
PHISHING
It is technique of pulling out
confidential information from
the bank/financial
institutional account holders
by deceptive means.
![Page 23: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/23.jpg)
PHISHINGIt is technique of pulling out confidential
information from the bank/financial institutional
account holders by deceptive means.
![Page 24: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/24.jpg)
PHISHINGIt is technique of pulling out confidential
information from the bank/financial institutional
account holders by deceptive means.
![Page 25: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/25.jpg)
How to be secure then .???
1. Enabled the “Always use HTTPS” setting for
Facebook, Twitter, Outlook, Gmail, Google and all the
other online services.
2. Offers via an unknown person or offers that are too good
to be true should be suspect.
3. Don’t click the links in emails. Always go to the
source or manually type in the address in your web
browser.
4. Don’t use a debit card online. If your debit card is
compromised that’s money out of your bank account.
Credit cards provide more protection and less liability.
![Page 26: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/26.jpg)
How to be secure then .???
5. Secure your PC. Update your critical security patches
and anti-virus and only shop from a secured Internet
connection.
6. Change your password often and use combination
of Uppercase, Lowercase, Special characters and
characters as password.
![Page 27: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/27.jpg)
CYBER CRIME AND
SOCIAL MEDIA
![Page 28: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/28.jpg)
Do take advantage of privacy settings and
encourage your friends to do the same
Do ask questions before clicking a link.
Do accept friend requests with caution. D
Don’t include too much identifying information.
Don’t automatically trust everyone.
Facebook Security
![Page 29: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/29.jpg)
Stay Updated
Secure Web Hosts
Moderate the comment
Backups
Twitter Security
![Page 30: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/30.jpg)
Never share personal
information
Don’t be too specific
Link your twitter account
Don’t spit excessive personal
information, this is about as
dangerous on any other social
network. if necessary.
Twitter Security Don’t tweet about moving
servers, changing passwords or any other type of situation where your security could be compromised more easily.
Review applications that use your twitter account with other networking sites like Facebook only
![Page 31: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/31.jpg)
•Stay Updated
•Secure Web Hosts
•Moderate the comment
•Backups
How To Secure Your Blog
![Page 32: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/32.jpg)
Malware bytes' Anti-
Malware
True Crypt
CCleaner
Flash Cookie Remover
Offline Protection
![Page 33: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/33.jpg)
Security Tips | Smartphone Users
Install anti-virus software, and keep it
updated.
Use a PIN code or pattern lock on your phone.
Turn off geo-tagging, or turn off photo auto-
uploads.
Avoid location "check-ins.“
Don't store passwords on the phone.
Enable remote 'wiping' of data.
Encrypt public Wi-Fi transmissions.
![Page 34: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/34.jpg)
Our Expectation Now Onwards
Conscious about Electronic Transaction act 2064
Don't edit images in unwanted manner and also do
not like, share ,tag and post such edited images in
any Social Networking sites.
Do not keep multi accounts of same sites | delete if
you already have.
Use privacy setting to avoid cyber theft.
Hide your Geographical Location as far as
practicable.
![Page 35: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/35.jpg)
![Page 36: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/36.jpg)
![Page 37: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/37.jpg)
References
facebook.com/security
fass10012041.wordpress.com
forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-
DNS
en.wikipedia.org/wiki/
f-secure.com/weblog/
totaldefense.com/securityblog.aspx
twitter.com/safety
![Page 38: Cyber Crime and Social Media Security](https://reader036.fdocuments.us/reader036/viewer/2022062513/5559942ed8b42a14638b522b/html5/thumbnails/38.jpg)
THANK YOU