34722.chapter 1 Intro
34722.chapter 1 Intro
Cyber Security
Introduction to Cyber Security
• Introduction to Cybercrime
– Definition and Origins of the word
– Cyber crime and Information Technology
– Who are Cybercriminals?
– Types of Cybercriminals
– Classification of Cybercrimes
• What is crime?
• Awareness
• Training
• Legal framework
• Emergency response
• Implementation of best practices
Cybercrime and Information Security
Types of cybercriminals
Cybercriminals
Cybercriminals- Cybercriminals-
-not interested
hungry for the insiders
in recognition
recognition
Types of Cybercriminals
The computer network was used for receipt and accounting of electricity bills by
the New Delhi Municipal Council.
• Sub-class of a virus
• It has the capability to travel without any
human action
• Due to the copying nature of a worm and
its capability to travel across networks, it
worm consumes too much
system memory (or network bandwidth),
causing Web servers, network servers and
individual computers to stop responding.
Trojan Horse
Attack Types %
Viruses, malware, worms, Trojans 50%
Criminal insider 33%
Theft of data-bearing devices 28%
SQL injection 28%
Phishing 22%
Web-based attacks 17%
Social engineering 17%
Other 11%
Survival Mantra for the Netizens:
• Precaution
• Prevention
• Protection
• Preservation
• Perseverance
Survival Mantra for the Netizens: