CYBER SECURITY
ND
CYBERSPACE & CRIMINAL BEHAVIOR
Enrollment no Name
140760106070 Navadiya Dharmik
140760106079 Patel Kevin
Prepared by:
Guided By:Prof. Mitali H. Desai(B.E.(I.T.),M.E.(CO))
This PowerPoint Template has clean and neutral design that can be adapted to
any content and meets various market segments. With this many slides you
are able to make a complete PowerPoint Presentation that best suit your
needs.
This PowerPoint Template has clean and neutral design that can be adapted to
any content and meets various market segments. With this many slides you
are able to make a complete PowerPoint Presentation that best suit your
needs.
This PowerPoint Template has clean and neutral design that can be adapted to
any content and meets various market segments. With this many slides you
are able to make a complete PowerPoint Presentation that best suit your
needs.
CONTENT
CYBERSPACE
What is cyberspace?
Cyberspace is a domain characterized by the
use of electronics and the electromagnetic spectrum
to store, modify, and exchange data via networked
systems and associated physical infrastructures. In
effect, cyberspace can be thought of as the intercom-
nection of human beings through computers and
telecommunication, without regard to physical
geography.
The word became popular in the 1990s when
the uses of the Internet, networking, and digital
communication were all growing dramatically and the
term "cyberspace" was able to represent the many
new ideas and phenomena that were emerging.
To us, ‘cyberspace’ was
simply about managing spaces.
There was nothing esoteric about it
. Nothing digital, either. It was just
a tool. The space was concrete,
physical.
The parent term of
cyberspace is "cybernetics",
derived from the Ancient Greek
(kybernētēs, steersman, governor,
pilot), a word introduced by Norbert
Wiener for his pioneering work in
electronic communication and con-
trol science.
There are no shared definitions of cyberspace at the scientific level and every government uses a different definition.
“cyberspace is the national environment inwhich digitized information is communicated over computer networks.”
-Dictionary of Militaryand Associated
A global domain within the information environment consisting of the inter dependentnetwork of information technology infrastructures including the Internet, telecommunications networks, computer systems & and embedded processorsand controllers.
TERMS RELATED CYBERSPACE
CYBER POWER:The ability to use cyberspace to create advan
tages and influence events in the other operational environment and across the instruments of power.
INTERNET:A global computer network providing a variet
y of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
CYBER-ATTACK:
Cyber-attack is any type of offensive maneuver
employed by individuals or whole organizations that
targets computer information systems, infrastructures,
computer networks, and/or personal computer devices
by various means of malicious acts usually originating
from an anonymous source that either steals, alters, or
destroys a specified target by hacking into a susceptibl
e system.
Cyber-attacks can range from installing spyware on a PC to attempts to destroy the infrastructure of entire nations. Cyber-attacks have become increasingly sophisticated and dangerous as the Stuxnet worm recently demonstrated.
User behavior analytics and SIEM (Security information and event management) are used toprevent these attacks.
There are a number of techniques to utilize in cyber-attacks and a variety of ways to administer them to individuals or establishments on a broader Scale. Attacks are broken down into two categories, syntactic attacks and semantic attacks.
Syntactic attacks:Syntactic attacks are straight forward; it is co
nsidered malicious software which includes viruses, worms, and Trojan horses.Semantic attacks:
The use of incorrect information to damageThe credibility of target resources or to cause direct or indirect harm.
INDIA AND PAKISTAN CYBER
ATTACKS There were two such instances between India a
nd Pakistan that involved cyberspace conflicts, started i
n 1990s. Earlier cyber attacks came to known as early
as in 1999. Since then, India and Pakistan were engag
ed in a long-term dispute over Kashmir which moved in
to cyberspace. Historical accounts indicated that each
country's hackers have been repeatedly involved in att
acking each other's computing database system. The n
umber of attacks has grown yearly: 45 in 1999, 133 in
2000, 275 by the end of August 2001.
In 2010, Indian hackers
laid a cyber attack at least 36
government database websites
going by the name "Indian Cyber
Army". In 2013, Indian
hackers hacked the official web-
site of Election commission of
Pakistan in an attempt to retrieve
sensitive database information.
In retaliation, Pakistani hackers,
calling themselves "True Cyber
Army" hacked and defaced
~1,059 websites of Indian
election bodies.
Cyber crime:
Cyber crime is an activity done using computers
and internet. We can say that it is an unlawful acts wh
erein the computer either a tool or target or both.
Categories of cyber crime
• The computer as a target :- using a computer to
attacks other computer, e.g. Hacking, virus/worms
attacks, Dos attack etc.
• The computer as a weapon :- using a computer to
commit real world crime e.g. cyber terrorism, credit-
card fraud and pornography etc.
TYPES OF CYBER CRIME• Hacking
• Child pornography
• Denial of service attacks
• Virus dissemination
• Computer vandalism
• Cyber terrorism
• Software piracy
India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the Global Cyber
Crime.
Technological advances have imp
acted
criminal behavior in three ways:
1. Mass Communication Technology has transformed
media and popular culture into a powerful influence
on offender behavior.
2. Computer Technology has created new avenues
and different opportunities for criminal behavior.
3. Investigative Technology has altered methods used
by offenders and the types of crimes they engage in
.
Hypotheses in the Research
Literature on the
Influence of Mass Media on
Criminal Behavior
• Pop cultural artifacts are criminogenic contribute to
real-life crime.
• Pop cultural artifacts are cathartic – offer an outlet
for natural aggressive impulses.
The Copycat Phenomenon and
Cultural technological changes m
ay be risk
factors for criminal behavior.
• Cultural technological changes may be risk factors
for criminal behavior.
• Relevance of the copycat phenomenon to all types
of criminal behavior should be revisited.
• Integrative theoretical models offer a foundation for
empirical investigation of copycat crime.
Technology-Related Risk Factors
for Criminal Behavior
• Criminologists can no longer ignore the ways in
which media and computer technology shape
criminal behavior.
• Technology breeds false familiarity, blurs fantasy
and reality, and provides a virtual realm that media-
tes conscience. This has important implications for
the study of criminal behavior.
COPYCAT CRIME:
A crime inspired by another
crime that has been publicized in
the news media or fictionally or
artistically represented whereby
the offender incorporates aspects
of the original offense into a new
crime.
Factors that Influence Copycat Crime
• Individual Criminogenic Factors
• Relationship to Media
• Cultural Factors
• Demographic Factors
• Characteristics Of Media Source
EFFECT OF CYBER ATTACKS • DEVIANCE AND CRIMINAL SUBCULTURE IN CYBERSPACE
• Internet Gambling
• PERPETRATORS’ PERSPECTIVES AND OFFENDER USE OF T
HE INTERNET
• Identity Construction Among Hackers
• Virtual Sex Offenders:
• Self-Reported Internet Child Pornography Consumers
• Online Social Networking and Pedophilia
• Adult–Child Sex Advocacy Websites as Learning
• Environments for Crime
• The Internet as a Terrorist’s Tool: A Social Learning • Perspective
• DIGITAL PIRACY
• Value and Choice: Examining Their Roles in Digital
Piracy
• Suing the Genie Back in the Bottle: The Failed RIAA
Strategy to Deter P2P Network Users
• Criminological Predictors of Digital Piracy
• Change of Music Piracy and Neutralization: An Exami
nation Using Short-Term Longitudinal
• Digital File Sharing: An Examination of Neutralization
and Rationalization Techniques Employed by Digital
File Sharers
• CYBER VICTIMIZATION
• Cyber-Routine Activities: Empirical Examination of
Online Lifestyle, Digital Guardians, and Computer
Crime Victimization
• Adolescent Online Victimization and Constructs of
Routine Activities Theory
• Cyber Stalking: Typology, Etiology, and Victims
• Online Social Networking and Women Victims
• Malware Victimization: A Routine Activities
Framework
CYBER SECURITY
RELATIONS BETWEEN THE INTERNET AND
OTHER SEGMENTS OF CYBERSPACE
Cyber security is the protection of info-
rmation systems from theft or damage to the hardware
, the software, and to the information on them, as well
as from disruption or misdirection of the services they
provide.
Cyber security standards which enable organiz-
ations to practice safe security techniques to minimize
the number of successful cyber attacks.
Cyber security refers to the technologies and
processes designed to protect computers, networks
and data from unauthorized access, vulnerabilities and
attacks delivered via the Internet by cyber criminals.
Though, cyber security is important for network,
data and application security.
SAFETY TIPS FOR CYBER CRIME
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a genderless screen na
me.
• Never give your full username or passwords to
strangers.
• Learn more about Internet privacy.
Top Related