Internet based fraud
Password hacking
Viruses
Encryption and decryption keys
Firewalls
Anti-virus software
Digital Signatures and certificates
Computer-related crime.
2. Outline
Internet based fraud
Password hacking
Viruses
Encryption and decryption keys
Firewalls
Anti-virus software
Digital Signatures and certificates
Computer-related crime.
3. Internet Fraud
It is a type of fraud or deception which makes use of
the internet and could involve hiding of information or
providing incorrect information for the purpose of tricking
victims out of money, property, and inheritance.
4. Types of Internet Fraud
Credit/ Debit Card Fraud
Business Deceit
Recruitment Cheque Scam
Advance Fee Fraud
Non-Delivery of Goods/ Service Fraud
5. Password Hacking
Password cracking is the process of recovering secret
passwords from data that has been stored in or transmitted by
computer system.
7. Viruses
A virus is a small piece of software that piggybacks on real
programs in order to get executed
Once its running, it spreads by inserting copies of itself into
other executable code or documents .
Typical things that can do to PCs are:
1. Display a message
2. Erase files
3. Scramble data on a hard disk
4. Cause erratic screen behavior
5. Halt the PC
6. Many viruses do nothing obvious at all except spread!
8. Types of Viruses
Time Bomb
Logical Bomb
Worm
Boot Sector Virus
Macros Virus
Trojan Horse
9. Encryption and Decryption
Encryption is the process of converting plaintext message into a
ciphertext message.
Decryption is the process of converting ciphertext message into
a plaintext message.
The same key must be used in both processes.
The process of encryption and decryption is called cryptography.
Key
10. Types of Cryptography Keys
A cryptographic key is a string of data that is used to lock or
unlock cryptographic functions, including authentication,
authorization and encryption.
It is categorized according to how it will be used and what
properties it has. It might have one of the following
properties: Symmetric or Asymmetric, Public or Private.
algorithms use
separate keys
for encryption
and decryption
algorithms use
separate keys for
encryption and
decryption
algorithms use
separate keys
for encryption
and decryption
algorithms use
separate keys for
encryption and
decryption
11. Firewalls
It is a program or hardware device that filters the information
coming through the internet connection into your private
network or computer system.
An application firewall is a special firewall that is specifically
coded for the type of traffic it is inspecting and the most
widely developed application is web application firewall.
13. Anti-virus software
It is a sw used to prevent, detect and remove all sorts of
malware such as computer viruses, hijackers, Trojan horses,
etc.
Popular types of anti-viruses used today are:
1. Kaspersky Lab
2. McAfee Virus Scan
3. Avira Antivirus Software
4. Avast Antivirus Software
5. AVG Antivirus and Internet Security
6. Norton Antivirus Software
7. Panda Antivirus Software
15. Digital Signatures and Certificates
It is a type of asymmetric cryptography used to simulate the
security properties of a signature in digital, rather than
written, form. Digital signature schemes normally give two
algorithms, one for signing which involves the user's secret or
private key, and one for verifying signatures which involves the
user's public key. The output of the signature process is called
the "digital signature.
Digital Certificate is a data with digital signature from one
trusted Certification Authority (CA) or trusted third party. This
data contains: Who owns this certificate, Who signed this
certificate, The expired date, User name & address.
20. Computer-related crime
Refers to all the activities done with criminal intent in
cyberspace.
It may be any crime that involves a computer/mobile and a
network. The computer may have been used in the commission
of a crime, or it may be the target.
21. Classification of Computer Crimes
Fraud and financial crimes.
Cyber terrorism.
Cyber extortion.
Cyber warfare.
Additionally, computer crime can be categorized as:
Individual
Property
Government
22. Types of Computer Crimes
Hacking
Denial of Service (DoS) Attack
Cyber Stalking
Identity Theft
Malicious Software
Child Soliciting and Abuse
Computer Vandalism
Software Piracy
Virus Dissemination