Anda di halaman 1dari 26

INTRODUCTION TO

CYBERCRIME AND SECURITY


DIYTP 2009
What is a Cyber Crime?
 Cyber crime encompasses any criminal act dealing
with computers and networks (called hacking).
Additionally, cyber crime also includes traditional
crimes conducted through the Internet.’
What is Cybercrime?
 Using the Internet to commit a crime.
 Identity Theft
 Hacking

 Viruses

 Facilitation of traditional criminal activity


 Stalking

 Stealing information
Cybercrime Components
 Computers

 Cell Phones

 PDA’s

 Game Consoles
Cyber Threats

Cyberwar

Cyber Cyber Terrorism


Threats

Cyber Crimes
Computer Security - Threats

 Malware
 Software that has a malicious purpose
 Viruses
 Trojan
horse
 Spyware
Computer Security - Threats
Intrusions
 Any attempt to gain unauthorized access to a system
 Cracking

 Hacking

 Social Engineering

 War-driving
What is a Cyber Security
 ‘Cyber security is the body of technologies, processes
and practices designed to protect networks,
computers, programs and data from attack, damage
or unauthorized’
Importance of Cyber Security
• Digitization: Is a need not an option.
• Dependency of internet, a day without internet
service makes you feel like you are in stone
age, totally disconnected from everyone
everything.
• Growing Network of Internet users
• Trends of e-services in Pakistan
• Very Low level security (both internal and
external)
Importance of Cyber Security
Cyberspace
 Non-physical terrain created by computer systems
 Internet
 Online Banking
 ATM
 Smart Devices
 Social Media
 LAN
 VPN … etc
Importance of Cyber Security
 A DIGITAL YOU exist on the cyberspace
roaming around the globe, unprotected
 Password, firewalls and other such basic

security techniques are not enough


 Most importantly National Security at RISK
Changing Trends in Pakistan
 Internet Users in Pakistan is 30 Million in 2013

Changing
Trends in
Pakistan

Source: CIA World Fact-book


Most Watched Country
 The 2013 global surveillance disclosure by a former
contractor for the United States of America’s (USA) National
Security Agency (NSA) revealed that the agency has also
been tapping the phones and hacking the emails of
thousands of Pakistanis.
 PRISM (surveillance program) since 2007
Cyber Attacks

Pakistan stands 4th in the list of the countries


experienced most cyber attacks

Cyber
Attacks
Computer Security
 Confidentiality
 Only those authorized to view information

 Integrity
 Informationis correct and hasn’t been altered by
unauthorized users or software

 Availability
 Data is accessible to authorized users
Computer Security
Computer Security - Terminology
 People
 Hackers
 White Hat – Good guys. Report hacks/vulnerabilities to
appropriate people.
 Black Hat – Only interested in personal goals, regardless of
impact.
 Gray Hat – Somewhere in between.
Computer Security - Terminology
 Script Kiddies
 Someone that calls themselves a ‘hacker’ but really isn’t

 Ethical Hacker
 Someone hired to hack a system to find vulnerabilities
and report on them.
 Also called a ‘sneaker’
Computer Security - Terminology
 Security Devices
 Firewall
 Barrier between network and the outside world.
 Proxy server
 Sits
between users and server. Two main functions are to
improve performance and filter requests.
 Intrusion Detection Systems (IDS)
 Monitors network traffic for suspicious activity.
Computer Security - Terminology
 Activities
 Phreaking
 Breaking into telephone systems (used in conjunction with
war-dialing)
 Authentication
 Determines whether credentials are authorized to access a
resource
 Auditing
 Reviewing logs, records, or procedures for compliance with
standards
Computer Security - Certifications
 Entry-level
 Security+

 CIW Security Analyst


 Intermediate
 MSCE Security
 Professional
 CISSP

 SANS
Computer Security - Education
 Community-college

 Computer Systems Security


 Computer Forensics
Computer Security - Education
 4-Year College
 Eastern Michigan University
 Information Assurance
 Applied
 Network
 Cryptography
 Management
Introduction CERT
• CERT – Computer Emergency Response Team
• The concept of CERT was first started by Carnegie Mellon University, US
• It was started in 1988, against the first internet worm known as Morris
Worm
• It was established as an incident response team
• Now it has evolved to
• identify and address existing and potential threats

• notify system administrators and other technical personnel

• coordinate with vendors and incident response teams world wide

• Basically, CERT purpose is to ensure Cyberspace Security


• CERT agenda is Prevent, Detect and Respond to cyber threats
Worlds Practices

Worldwide, there are more than 250 organizations that


use the name "CERT" or a similar name and deal with
cybersecurity response.

US- AusCERT MyCERT CERT-In


CERT
MyCERT
US-CERT MyCERT
(Malaysian CERT-In
Computer Emerg
ency Response
US-CERT is 24- AUS-CERT Team) is
CERT-In is
hour operational operational since
1997 operational
since 2003
since 2004
AUS-CERT Number of
Number of Formed in cyber security
incidents 1993 self- incidents 22,000 incidents
Reported by funded referred to reported to
MyCERT is
federal agencies organization 15,000 in 2011 CERT-In in 2012
to US-CERT is based at The which was
controlled up to
48,800 in 2012 University of 8,000 in 2013
Queensland

Anda mungkin juga menyukai