Cyber Crime!!!: Welcome To OUR Presentation

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 21

Cyber Crime!!!

WELCOME TO
OUR
PRESENTATION
Topic

1. Hacking And Cybercrime


2. A survey of Cyber Attack Detection Strategies
3. Cybercrime And Its Impact In Bangladesh
What Is Cyber Crime ??
Criminal Has No Religion !
Life is not a game !!
The Offences and Categories of
Cybercrime

Five offenses as cyber-crime:


1. Unauthorized access,
2. Damage to computer data or programs,
3. Sabotage to hinder the functioning of a computer system or
network,
4. Unauthorized interception of data to, from and within a
system or network,
5. And computer spying.
Cyber Attacks

 Denial of Service Attacks


 Remote to Local (User) Attacks (R2L)
 User to Root Attacks (U2R)
 Probing
Who Are The Cyber Criminals??

 Identity Thieves
 Internet Stalkers
 Phishing Scammers
 Cyber Terrorists
 General People
The Reasons To Commit Cyber Crimes
Hackers Normal People
 For Learning  To Make Fun Of
 Win Challenge
 To Get Malevolent
 To Seek Publicity
 To Take Revenge
 To Take Revenge
 To Make Mischief
 To Earn Money
 Psychological Problem
IMPACT OF CYBERCRIME

 Impact Of Cybercrime Against Individuals


 Impacts against Individuals Property

 Impact Of Cybercrime Against Organizations

 Impact Of Cybercrime Against The Government


Impact Of Cybercrime Against
Individuals

 Harassment via e-mails


 Cyber-stalking
 Pornography
 Defamation
 E-mail spoofing
 Fraud & Cheating
 Fraud & cheating on mobile banking (Bkash , Ukash)
Impacts against Individuals Property

 Computer Vandalism
 Transmitting Virus/Worms
 Logic Bombs
 Trojan Attacks
 Web Jacking
 Internet Time Thefts
 Intellectual Property Crimes / Distribution of Pirated Software
Impact Of Cybercrime Against
Organizations

 Unauthorized Control/Access over Computer System


 Possession of unauthorized information
 Software Pirate and Copyright
 Financial Institutions are at risk
Impact Of Cybercrime Against The
Government
Cyber Attacks Detection Strategies

 Intrusion Detection Systems (IDS)


 Misuse Detection/Misbehavior Detection
 Signature based Approach
 Anomaly Detection
 Analysis Approach
1. Misuse/misbehavior
2. Artificial Immune System
3. Anomaly
Some Solution To Prevent Cyber Attacks

 Embedded Programming Approach


 Agent based Approach

 Software Engineering Approach

 Artificial Intelligence Approach


Overview
Any Question??
Connecting To Free Wi-fi Hotspots
Is Safe, Right? 
References
1. https://www.britannica.com/topic/cybercrime
2. http://www.cybercitizenship.org/crime/crime.html.
3. Nataliya B. Sukhai, Hacking And Cybercrime
4. https://en.wikipedia.org/wiki/Cyberattack
5. Jamal Raiyn, A survey of Cyber Attack Detection
Strategies
6. Badsha Mia, CYBERCRIME AND ITS IMPACT IN
BANGLADESH: A QUEST FOR NECESSARY
LEGISLATION
7.https://google.com
8. http://mason.gmu.edu/~tlincoln/conclusion.html

You might also like