cyber security - higher college of technology · cyber security | brijesh jajal, hct 3 hacking...
TRANSCRIPT
Cyber Security
Defending Resources
Cyber Security | Brijesh Jajal, HCT
Cyber Crimes
Cyber Security | Brijesh Jajal, HCT
Malicious software
Identity theft
Hacking
Software Theft (Piracy)
Cyber Stalking
Top 5 cyber crimes in 2015
Cyber Crimes
Cyber Security | Brijesh Jajal, HCT
Malicious software
Identity theft
Hacking
Software Theft (Piracy)
Cyber Stalking
Top 5 cyber crimes in 2015
1
Malicious software
Cyber Security | Brijesh Jajal, HCT
1
Virus : Propagates by inserting a copy of itself
Cyber Security | Brijesh Jajal, HCT
Worms: Replicates itself, without host program
Malicious software 1
Nimda (ADMIN spelled reverse) caused $530 million in damages after only one week of propagation.
Cyber Security | Brijesh Jajal, HCT
Trojan: Harmful software in the disguise
Malicious software 1
Cyber Security | Brijesh Jajal, HCT
Botnet: Bots often automate tasks and provide information or services
Malicious software 1
Cyber Security | Brijesh Jajal, HCT
Use of AVTK
Malicious software HANDLING 1
Cyber Security | Brijesh Jajal, HCT
Use of AVTK Du Blocker
Malicious software HANDLING 1
Cyber Security | Brijesh Jajal, HCT
Keylogger : Surveillance software with the capability to record every keystroke
Malicious software HANDLING 1
Cyber Security | Brijesh Jajal, HCT
Malicious software HANDLING 1
Secured Operating System
Cyber Security | Brijesh Jajal, HCT
Malicious software CHALLENGE 1
Secured Operating System
Cyber Crimes
Cyber Security | Brijesh Jajal, HCT
Malicious software
Identity theft
Hacking
Software Theft (Piracy)
Cyber Stalking
Top 5 cyber crimes in 2015
2
Cyber Security | Brijesh Jajal, HCT
Identity Theft 2
Twitter Account of Amitabh Bachchan hacked. He has 16.6 million followers.
1 Sept., 2015
Cyber Security | Brijesh Jajal, HCT
Identity Theft 2
E-mail Theft https://haveibeenpwned.com
Cyber Security | Brijesh Jajal, HCT
Identity Theft 2
ATM Skimming
Cyber Security | Brijesh Jajal, HCT
Identity Theft 2
ATM Skimming
Cyber Security | Brijesh Jajal, HCT
Identity Theft 2
ATM Skimming – Data Capture
Normal Fascia Skimmer device
Cyber Security | Brijesh Jajal, HCT
Identity Theft 2
ATM Skimming – PIN Capture
Thermo sense Layer for PIN Capturing from top Video Link
Cyber Security | Brijesh Jajal, HCT
Identity Theft HANDLING 2
ATM Skimming
ActiveEdge™ made skimmers utterly useless with a simple 90-degree change
Cyber Security | Brijesh Jajal, HCT
Identity Theft 2
Saved Passwords
Cyber Crimes
Cyber Security | Brijesh Jajal, HCT
Malicious software
Identity theft
Hacking
Software Theft (Piracy)
Cyber Stalking
Top 5 cyber crimes in 2015
3
Hacking 3
Teen hacker hits five Omani government websites. Gulf News
Cyber Security | Brijesh Jajal, HCT
Hacking 3
Website Hack
Kaspersky Lab reveals cyberattack on its corporate network that also hit high profile victims in Western countries, the Middle East and Asia. 10 July, 2015
Cyber Security | Brijesh Jajal, HCT
Hacking - HANDLING 3
NS Auditor
Cyber Security | Brijesh Jajal, HCT
Hacking - HANDLING 3
Authenticate website
The #1 trust mark on the Internet Continuous Protection
Cyber Crimes
Cyber Security | Brijesh Jajal, HCT
Malicious software
Identity theft
Hacking
Software Theft (Piracy)
Cyber Stalking
Top 5 cyber crimes in 2015
4
Cyber Security | Brijesh Jajal, HCT
Software Theft 4
Piracy Statistics
Cyber Security | Brijesh Jajal, HCT
Software Theft HANDLING 4
User checklist Developer checklist
Get terms signed -EULA Regular Audit Proof of purchase
Online key activation Sentinel Shell /API for hardware key
Cyber Crimes
Cyber Security | Brijesh Jajal, HCT
Malicious software
Identity theft
Hacking
Software Theft (Piracy)
Cyber Stalking
Top 5 cyber crimes in 2015
5
Cyber Security | Brijesh Jajal, HCT
Cyber Stalking 5
Cyber Stalking: The attacker harasses a victim using electronic communication
Risks :
Having your online accounts being taken over Having your contact details obtained and used Location and tracking of you by GPS on
mobiles, tracker devices or spyware on phones Having false profiles posted on social
networking and other
Cyber Security | Brijesh Jajal, HCT
Cyber Stalking 5
Statistics – Middle and High school students:
Cyber Security | Brijesh Jajal, HCT
Cyber Stalking 5
Case Study:
David Matusiewicz, trialed in US for Cyber stalking resulting in death. 22 June, 2015
Megan Meier (Foundation) by her mother Tina.
Cyber Security | Brijesh Jajal, HCT
Cyber Stalking HANDLING 5
How to avoid:
Use privacy settings Use Blocking and Filter Avoid filling all Profile details (Address)
Contact website operators File a complaint with the Internet Crime
Complaint Center (IC3).
Cyber Security | Brijesh Jajal, HCT
REFERENCES
http://www.forensicscolleges.com/ http://cyberbullying.org https://www.commbank.com.au http://xavier.edu
Cyber Security | Brijesh Jajal, HCT
Keep exploring . . .