IS 63499 Part 1

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

CHAPTER 10

CYBER THREATS
AND SECURITY
Mirrthika Shree
VII A​
LEARNING IN THIS CHAPTER
• Introduction​
• Cybercrime
 Cybercrimes against an individual
 Cybercrimes against property
 Cybercrimes against
society/organization
• Types of Virus
• Cyber Security
 Antivirus
 Encryption software
INTRODUCTION
• Computers and internet have become an inseparable part
of our daily life.
• It is beneficial for sharing information with people in
any corner of the world.
• It is also used in schools, government and private
offices, and other public spaces.
• Networks of today have simplified the communication
process and provided great opportunities in almost all
spheres
• But, there are various types of challenges and threats
associated with the use of these networks of today.

• These threats are known as cybercrimes.


CYBERCRIME
Cybercrime is the use of a computer as an instrument to further illegal ends. It
includes:
• Credit card account theft • Imitating documents and
currency
• Internet frauds
• Harassing others
• Ordering goods in our name
• Mischief mongering
• Extracting mobile phone
• Sending threatening messages
contacts
etc.
• Forgery
There are three types of cybercrime:

CYBERCRIME

Crime against an Crime against Crime against an


individual person property organization / society
CYBERCRIMES AGAINST AN
INDIVIDIUAL PERSON
This category of cybercrime involves someone causing
harm to someone else through internet.

CYBERCRIMES AGAINST
AN INDIVIDIUAL PERSON

E-MAIL CYBER CYBER


SPOOFING STALKING BULLYING
A person talking to someone
A person receiving a The criminal sends
unknown and then the attacker
fake message in embarrassing photos,
harasses the person, viewing
which he clicks the insulting remarks,
the online activities of the
link and then the rumors, and derogatory
person, and sending viruses.
malware enters the comments based on race,
system religion, etc.
CYBERCRIMES AGAINST
PROPERTY
Cybercrimes against property are the cybercrimes against all forms
of property include unauthorized computer trespassing through
cyberspace, computer vandalism, transmission of harmful
programs, and unauthorized possession of computerized
information.

CYBERCRIMES AGAINST
AN INDIVIDIUAL PERSON

IDENTITY THEFT PHISHING PHARMING


The person’s personal info A person receiving a A piece of malicious code
like name, date of birth, fake message in is installed on a computer
account number, credit/debit which he clicks the which misdirects to
card number which are link and updates his fraudulent websites to
misused to obtain genuine details which goes to obtain personal info.
documents the attacker
CYBERCRIMES AGAINST
ORGANIZATION/SOCIETY
It is a planned and politically motivated attack which causes panic among civilians
where they hack government or military sites.

• TRANSMITTING VIRUS
 A computer virus is a type of malicious software, or malware, that spreads
between computers and causes damage to data and software without the
knowledge of the host. 
Computer viruses aim to disrupt systems, cause major operational issues, and
result in data loss and leakage. They are designed to spread across programs and
systems.
CYBERCRIMES AGAINST
ORGANIZATION/SOCIETY
• CYBER VANDALISM
It is the creation of malicious programs to erase the hard drive.

• HACKING
It refers to the illegal entry into a computer or network for fun or for stealing bank account details

• CYBER SQUATING
It refers to the act of using the goodwill of a trademark belonging to someone and getting benefit out of it.

• FORGERY
It is an act of imitating or making a false copy of documents

• CYBER EXORTION
It is a crime when the victim is attacked and then demanded to pay money to stop further attacks.

• CYBER TERRORISM
It is used to conduct terrorism through the use of computers to create fear and panic.
TYPES OF VIRUS
• Boot sector virus • Polymorphic Virus
It damages the boot sector of a hard disc or This virus exists in many forms. It changes
floppy drive. It becomes active at the time of the binary pattern to avoid deduction by
booting and destroys the hard disc antivirus.
Eg., Disc killer, stone virus, etc. Eg., Elkern, Marburg, Satan bug, etc.

• Program file virus • Network Virus


This virus infects the executable files with This spreads through a local network area.
the intention of causing permanent damage It searches to attack its new prey through
or making it unreadable the net. When it finishes, it moves on to
Eg., Sunday, Cascade, etc, next computer.
Eg., Nimda, SQL Slammer
• Multipartite Virus
It is a hybrid of Boot Sector and Program • Marco Virus
File virus. It gets entry into the computer and When opening the files, the virus gets
then starts spreading into the system loaded into the main memory and destroys
gradually. the hard disc. Once marco virus is in your
Eg., Invader, Flip, Tequila, etc. computer, all the files you produce will be
infected.
CYBER
SECURITY
CYBER SECURITY
Cyber security are the collection of technologies which defend computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks.

• ANTIVIRUS
An antivirus product is a program designed to detect and remove viruses and other kinds of malicious
software from your computer or laptop. 
Eg., McAfee, AVG Antivirus, Quick Heal, etc…

• FIREWALLS
A Firewall is a network security device that monitors and filters incoming and outgoing network traffic
based on an organization's previously established security policies.

• ENCRYPTION SOFTWARE
It is used to protect data from being stolen, changed, or
compromised. It is a process of converting our electronic data
to a form which easily cannot be understood.
ANTIVIRUS

Features of Antivirus:

• Full System scans


• Custom Scan
• Virus Definitions
• Actions taken by antivirus
 Repair it
 Delete it
 Quarantine it
ENCRYPTION SOFTWARE

BIOMETRICS PASSWORDS BACKUPS COOKIES

A person is verified It is a text message


It is a secret code
by the means of given to a web
which guarantees It is the process of
his/her unique browser by a web
the system is only making duplicate
biological or browser. It saves
accessed by copies of data
physical this user specific
authorized users.
characteristics data in a text file
THANK YOU
Mirrthika Shree
VII A

You might also like