SlideShare a Scribd company logo
Chapter 10
Information Security and
Cybercrime
System Analysis Design
Computer Applications in
the Society
 Education/Research
 Finance
 Government
 Healthcare
 Science
 Publishing
 Travel
 Industry  Personal Communication
 Enterprise
Internet-based Applications
Applications in the Society
Email-
Social media -
Messenger –
Security Challenges and
Vulnerabilities
Malware
(malicious software)
Viruses
Rogue software program that attaches itself to other software
programs or data files in order to be executed
Worms
Independent computer programs that copy themselves from
one computer to other computers over a network.
Trojan horses
Software program that appears to be benign but then does
something other than expected.
Malware
(malicious software)
SQL injection attacks
Hackers submit data to Web forms that exploits site’s
unprotected software and sends rogue SQL query to
database
Spyware
Small programs install themselves surreptitiously on
computers to monitor user Web surfing activity and
serve up advertising
Key loggers
Record every keystroke on computer to steal serial
numbers, passwords, launch Internet attacks
Hackers and Computer Crime
Hackers vs. crackers
• System intrusion
• System damage
• Cyber vandalism: Intentional disruption,
defacement, destruction of Web site or
corporate information system
7
Computer Crime
 Spoofing
Misrepresenting oneself by using fake e-mail
addresses or masquerading as someone else
Redirecting Web link to address different from
intended one, with site masquerading as intended
destination
 Sniffer
Eavesdropping program that monitors information
traveling over network
Enables hackers to steal proprietary information
such as e-mail, company files, etc.
Computer Crime
 Denial-of-service attacks (DoS)
• Flooding server with thousands of false requests to
crash the network.
 Distributed denial-of-service attacks (DDoS)
• Use of numerous computers to launch a DoS
 DoS utilizes a single connection, while a DDoS attack
utilizes many sources of attack traffic
Computer Crime
Defined as “any violations of criminal law that involve
a knowledge of computer technology for their
perpetration, investigation, or prosecution”
Computer may be target of crime, e.g.:
Breaching confidentiality of protected computerized data
Accessing a computer system without authority
Computer may be instrument of crime, e.g.:
Theft of trade secrets
Using e-mail for threats or harassment
Computer Crime
 Identity theft
• Theft of personal Information (social security id,
driver’s license or credit card numbers) to
impersonate someone else
 Phishing
• Setting up fake Web sites or sending e-mail
messages that look like legitimate businesses to ask
users for confidential personal data.
 Evil twins
• Wireless networks that pretend to offer trustworthy
Wi-Fi connections to the Internet
Computer Crime
 Pharming
• Redirects users to a bogus Web page, even when
individual types correct Web page address into his
or her browser
 Click fraud
• Occurs when individual or computer program
fraudulently clicks on online ad without any
intention of learning more about the advertiser or
making a purchase
 Cyber terrorism and Cyber warfare
Proof of Computer Crime
 Electronic evidence
• Evidence for white collar crimes often in digital form
Data on computers, e-mail, instant messages, e-
commerce transactions
• Proper control of data can save time and money when
responding to legal discovery request
 Computer forensics:
• Scientific collection, examination, authentication,
preservation, and analysis of data from computer
storage media for use as evidence in court of law
• Includes recovery of ambient and hidden data
What are Cyber Crime?
 Improperly accessing a computer, system, or network;
 Modifying, damaging, using, disclosing, copying, or
taking programs or data;
 Introducing a virus or other contaminant into a
computer system;
 Interfering with someone else's computer access or use;
 Falsifying email source information; and
 Stealing an information service from a provider.
 Offences against computer data and systems
 Misuse of computer devices
 Computer-related forgery
 Computer-related fraud
 Child Pornography
 Offences related to infringements of copyright
and related rights
What are Cyber Crime?
Hacker Targets
 Financial data
 Intellectual Property
 Personal data
 System Access
 Theft, modification or sale,
blackmail
 Theft, sale, personal gain
 Modification, sale
 Sabotage, backdoors,
exploitation
What the Law of Bangladesh
Says?
 If a person intentionally causes loss or damage
to any other person or organization by
any act which destroys, deletes or alters any
information residing in a computer resource or
diminishes its value or affects it by any means,
would be considered to have engaged in
hacking.
Information Security
 Security: Policies, procedures and technical
measures used to prevent unauthorized
access, alteration, theft, or physical damage to
information systems:
Physical Security
Network Security
Data Security
What Is Network Security?
 "Network security" refers to any activity designed
to protect the usability and integrity of your
network and data. It includes both hardware and
software technologies. Effective network security
manages access to the network. It targets a variety
of threats and stops them from entering or
spreading on your network.
Types of network security
 Access control
 Antivirus and antimalware software
 Application security
 Data loss prevention
 Email security
 Mobile device security
 Security information and event management
What is data security?
 Data security concerns the protection of data from
accidental or intentional but unauthorized modification,
destruction or disclosure through the use of physical
security, administrative controls, logical controls,
and other safeguards to limit accessibility.
Technologies and Tools for
Protecting Information Resources
Firewall:
• Combination of hardware and software
that prevents unauthorized users from
accessing private networks
• Technologies include:
Static packet filtering
Network address translation (NAT)
Application proxy filtering
Technologies and Tools for
Protecting Information Resources
 Intrusion detection systems:
• Monitor hot spots on corporate networks to detect and
deter intruders
• Examines events as they are happening to discover
attacks in progress
 Antivirus and antispyware software:
• Checks computers for presence of malware and can
often eliminate it as well
• Require continual updating
 Unified threat management (UTM) systems
Technologies and Tools for
Protecting Information Resources
 Securing wireless networks
- Continually changing keys
- Encrypted authentication system with
central server
Encryption:
• Transforming text or data into cipher text
that cannot be read by unintended
recipients
Technologies and Tools for Protecting
Information Resources
Technologies and Tools for
Protecting Information Resources
 Digital certificate:
 Data file used to establish the identity of users and
electronic assets for protection of online transactions
 Uses a trusted third party, certification authority (CA),
to validate a user’s identity
 CA verifies user’s identity, stores information in CA
server, which generates encrypted digital certificate
containing owner ID information and copy of owner’s
public key
Safe and Ethical Uses of Computers
 Ethics
• Principles of right and wrong that individuals, acting
as free moral agents, use to make choices to guide
their behaviors
 Professional codes of conduct
• Promulgated by associations of professionals
E.g. AMA, ABA, AITP, ACM
• Promises by professions to regulate themselves in the
general interest of society
Property Rights:
Intellectual Property
Trade secret: Intellectual work or product
belonging to business, not in the public domain.
Copyright: Statutory grant protecting intellectual
property from being copied for the life of the author,
plus 70 years.
Patents: Grants creator of invention an exclusive
monopoly on ideas behind invention for 20 years

More Related Content

PPTX
Ethics,security and privacy control
PPTX
CYBER CRIME - A Threat To Internet Users
PPT
Cyber crime & security final tapan
PPT
Cyber crime and forensic
PPTX
Cyber crime & law
PPT
Sahilmod 120315100301-phpapp01
PPTX
Cyber security
PPTX
Computer security and
Ethics,security and privacy control
CYBER CRIME - A Threat To Internet Users
Cyber crime & security final tapan
Cyber crime and forensic
Cyber crime & law
Sahilmod 120315100301-phpapp01
Cyber security
Computer security and

Similar to Chapter-10-Information Security and Cyber Crime.pptx (20)

PPTX
Cyber crime & security
PDF
Cyber Crime
PPTX
SECURING INFORMATION SYSTEM 1.pptx
PPTX
Cyber Crime and Security Presentation
PPTX
Basics of System Security and Tools
PPTX
unit -ii security1.pptx for Information system management
PPTX
cyber crime and security
PPT
9. Computer Ethics.ppt
PPTX
Introduction to cybercrime
PPTX
9 - Security
PPTX
Cyber Crime
PPT
Cyberterrorism
PPTX
Computer Security and their social effect and their usage.
PPSX
Cyber security awareness presentation
PPTX
computer security and its relationship to computer forensic
PDF
cybersecurityawareness-presentation-170627121043.pdf
PDF
Cyber Security
PPT
SHAILENDRA.ppt
PDF
Class 11 ca chapter 17 computer ethics and cyber crime
PPTX
Computer security
Cyber crime & security
Cyber Crime
SECURING INFORMATION SYSTEM 1.pptx
Cyber Crime and Security Presentation
Basics of System Security and Tools
unit -ii security1.pptx for Information system management
cyber crime and security
9. Computer Ethics.ppt
Introduction to cybercrime
9 - Security
Cyber Crime
Cyberterrorism
Computer Security and their social effect and their usage.
Cyber security awareness presentation
computer security and its relationship to computer forensic
cybersecurityawareness-presentation-170627121043.pdf
Cyber Security
SHAILENDRA.ppt
Class 11 ca chapter 17 computer ethics and cyber crime
Computer security
Ad

Recently uploaded (20)

PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
PDF
algorithms-16-00088-v2hghjjnjnhhhnnjhj.pdf
PDF
flutter Launcher Icons, Splash Screens & Fonts
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
dse_final_merit_2025_26 gtgfffffcjjjuuyy
PDF
B.Tech (Electrical Engineering ) 2024 syllabus.pdf
PPTX
Glazing at Facade, functions, types of glazing
PDF
Top 10 read articles In Managing Information Technology.pdf
PDF
Queuing formulas to evaluate throughputs and servers
PPTX
Soil science - sampling procedures for soil science lab
PDF
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
PPT
Ppt for engineering students application on field effect
PPTX
Security-Responsibilities-in-the-Cloud-Azure-Shared-Responsibility-Model.pptx
PDF
Monitoring Global Terrestrial Surface Water Height using Remote Sensing - ARS...
PPTX
TE-AI-Unit VI notes using planning model
PDF
6th International Conference on Artificial Intelligence and Machine Learning ...
PDF
International Journal of Information Technology Convergence and Services (IJI...
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
algorithms-16-00088-v2hghjjnjnhhhnnjhj.pdf
flutter Launcher Icons, Splash Screens & Fonts
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
dse_final_merit_2025_26 gtgfffffcjjjuuyy
B.Tech (Electrical Engineering ) 2024 syllabus.pdf
Glazing at Facade, functions, types of glazing
Top 10 read articles In Managing Information Technology.pdf
Queuing formulas to evaluate throughputs and servers
Soil science - sampling procedures for soil science lab
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
Ppt for engineering students application on field effect
Security-Responsibilities-in-the-Cloud-Azure-Shared-Responsibility-Model.pptx
Monitoring Global Terrestrial Surface Water Height using Remote Sensing - ARS...
TE-AI-Unit VI notes using planning model
6th International Conference on Artificial Intelligence and Machine Learning ...
International Journal of Information Technology Convergence and Services (IJI...
Ad

Chapter-10-Information Security and Cyber Crime.pptx

  • 1. Chapter 10 Information Security and Cybercrime System Analysis Design
  • 2. Computer Applications in the Society  Education/Research  Finance  Government  Healthcare  Science  Publishing  Travel  Industry  Personal Communication  Enterprise
  • 3. Internet-based Applications Applications in the Society Email- Social media - Messenger –
  • 5. Malware (malicious software) Viruses Rogue software program that attaches itself to other software programs or data files in order to be executed Worms Independent computer programs that copy themselves from one computer to other computers over a network. Trojan horses Software program that appears to be benign but then does something other than expected.
  • 6. Malware (malicious software) SQL injection attacks Hackers submit data to Web forms that exploits site’s unprotected software and sends rogue SQL query to database Spyware Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising Key loggers Record every keystroke on computer to steal serial numbers, passwords, launch Internet attacks
  • 7. Hackers and Computer Crime Hackers vs. crackers • System intrusion • System damage • Cyber vandalism: Intentional disruption, defacement, destruction of Web site or corporate information system 7
  • 8. Computer Crime  Spoofing Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else Redirecting Web link to address different from intended one, with site masquerading as intended destination  Sniffer Eavesdropping program that monitors information traveling over network Enables hackers to steal proprietary information such as e-mail, company files, etc.
  • 9. Computer Crime  Denial-of-service attacks (DoS) • Flooding server with thousands of false requests to crash the network.  Distributed denial-of-service attacks (DDoS) • Use of numerous computers to launch a DoS
  • 10.  DoS utilizes a single connection, while a DDoS attack utilizes many sources of attack traffic
  • 11. Computer Crime Defined as “any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution” Computer may be target of crime, e.g.: Breaching confidentiality of protected computerized data Accessing a computer system without authority Computer may be instrument of crime, e.g.: Theft of trade secrets Using e-mail for threats or harassment
  • 12. Computer Crime  Identity theft • Theft of personal Information (social security id, driver’s license or credit card numbers) to impersonate someone else  Phishing • Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data.  Evil twins • Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet
  • 13. Computer Crime  Pharming • Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser  Click fraud • Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase  Cyber terrorism and Cyber warfare
  • 14. Proof of Computer Crime  Electronic evidence • Evidence for white collar crimes often in digital form Data on computers, e-mail, instant messages, e- commerce transactions • Proper control of data can save time and money when responding to legal discovery request  Computer forensics: • Scientific collection, examination, authentication, preservation, and analysis of data from computer storage media for use as evidence in court of law • Includes recovery of ambient and hidden data
  • 15. What are Cyber Crime?  Improperly accessing a computer, system, or network;  Modifying, damaging, using, disclosing, copying, or taking programs or data;  Introducing a virus or other contaminant into a computer system;  Interfering with someone else's computer access or use;  Falsifying email source information; and  Stealing an information service from a provider.
  • 16.  Offences against computer data and systems  Misuse of computer devices  Computer-related forgery  Computer-related fraud  Child Pornography  Offences related to infringements of copyright and related rights What are Cyber Crime?
  • 17. Hacker Targets  Financial data  Intellectual Property  Personal data  System Access  Theft, modification or sale, blackmail  Theft, sale, personal gain  Modification, sale  Sabotage, backdoors, exploitation
  • 18. What the Law of Bangladesh Says?  If a person intentionally causes loss or damage to any other person or organization by any act which destroys, deletes or alters any information residing in a computer resource or diminishes its value or affects it by any means, would be considered to have engaged in hacking.
  • 19. Information Security  Security: Policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems: Physical Security Network Security Data Security
  • 20. What Is Network Security?  "Network security" refers to any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network.
  • 21. Types of network security  Access control  Antivirus and antimalware software  Application security  Data loss prevention  Email security  Mobile device security  Security information and event management
  • 22. What is data security?  Data security concerns the protection of data from accidental or intentional but unauthorized modification, destruction or disclosure through the use of physical security, administrative controls, logical controls, and other safeguards to limit accessibility.
  • 23. Technologies and Tools for Protecting Information Resources Firewall: • Combination of hardware and software that prevents unauthorized users from accessing private networks • Technologies include: Static packet filtering Network address translation (NAT) Application proxy filtering
  • 24. Technologies and Tools for Protecting Information Resources  Intrusion detection systems: • Monitor hot spots on corporate networks to detect and deter intruders • Examines events as they are happening to discover attacks in progress  Antivirus and antispyware software: • Checks computers for presence of malware and can often eliminate it as well • Require continual updating  Unified threat management (UTM) systems
  • 25. Technologies and Tools for Protecting Information Resources  Securing wireless networks - Continually changing keys - Encrypted authentication system with central server
  • 26. Encryption: • Transforming text or data into cipher text that cannot be read by unintended recipients Technologies and Tools for Protecting Information Resources
  • 27. Technologies and Tools for Protecting Information Resources  Digital certificate:  Data file used to establish the identity of users and electronic assets for protection of online transactions  Uses a trusted third party, certification authority (CA), to validate a user’s identity  CA verifies user’s identity, stores information in CA server, which generates encrypted digital certificate containing owner ID information and copy of owner’s public key
  • 28. Safe and Ethical Uses of Computers  Ethics • Principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors  Professional codes of conduct • Promulgated by associations of professionals E.g. AMA, ABA, AITP, ACM • Promises by professions to regulate themselves in the general interest of society
  • 29. Property Rights: Intellectual Property Trade secret: Intellectual work or product belonging to business, not in the public domain. Copyright: Statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years. Patents: Grants creator of invention an exclusive monopoly on ideas behind invention for 20 years