Cybercrime_and_Information_Security_25Slides.pptx

TamilSelvi165 0 views 28 slides Oct 15, 2025
Slide 1
Slide 1 of 28
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28

About This Presentation

Cybercrime and cyber security


Slide Content

Cybercrime and Information Security Overview, Types, Challenges & Prevention

Introduction to Cybercrime Crime involving computers and networks. Computer may be used as a tool or target. Examples: Fraud, identity theft, privacy breach. Growing with digitalization in commerce, government, entertainment . Crimes that aim at computer networks or devices. These types of crimes involve different threats (like virus, bugs etc.) and denial-of-service ( DoS ) attacks. 2. Crimes that use computer networks to commit other criminal activities. These types of crimes include cyber stalking, financial fraud or identity theft.

Cybercrime and Information Security The terms Cyber Security and Information Security are often used interchangeably. As they both are responsible for the security and protecting the computer system from threats and information breaches and often Cybersecurity and information security are so closely linked that they may seem synonymous and unfortunately, they are used synonymously.

Importance of Cybercrime Awareness Threatens personal, organizational, and national security. Impacts financial health, trust, and safety. Opportunities for cybercriminals increase with Internet usage Cybercrime has grown as the computer became central to fields like commerce, entertainment, and government. It may endanger a person or a nation’s security and financial health. | | .

Categories of Cybercrime 1. Crimes targeting computer networks/devices. 2. Crimes using computer networks for other crimes . : **Category 1 Crimes Aiming at Networks/Devices** | These crimes involve different threats (like virus, bugs, etc.) and Denial-of-Service ( DoS ) attacks . Category 2: Crimes Using Networks for Activity** | These crimes utilize computer networks to commit other criminal activities, such as cyber stalking, financial fraud, or identity theft. | |

Examples – Targeting Devices Virus, Worms, Trojan horses. Denial of Service (DoS) attacks. Ransomware, Spyware.

Examples – Using Networks Phishing and Identity theft. Cyberstalking , Cyberbullying. Financial frauds, Data breaches . Cyber Security vs. Information Security (CS vs. IS): Introduction** | The terms Cyber Security and Information Security are often used interchangeably, even though they are distinct, as both protect the computer system from threats and information breaches

Introduction to Cybersecurity Protection of systems, networks, and data in cyberspace. Defends against unauthorized access and cyberattacks . :** Practice of protecting data from outside the resource on the internet; protects cyberspace from cyber attacks. **IS:** Protecting information from unauthorized users, access, data modification, or removal; deals with the protection of data from any form of threat. | |

Introduction to Information Security Protection of information assets (digital or physical). Ensures confidentiality, integrity, and availability (CIA ). The terms Cyber Security and Information Security are often used interchangeably, even though they are distinct, as both protect the computer system from threats and information breaches. |

Cybersecurity vs Information Security – Core Differences Cybersecurity focuses on online data protection. Information security protects all data (digital + physical). Cybersecurity = cyberspace only; InfoSec = all forms of information . :** Practice of protecting data from outside the resource on the internet; protects cyberspace from cyber attacks. **IS:** Protecting information from unauthorized users, access, data modification, or removal; deals with the protection of data from any form of threat. | |

Threats and Goals Cybersecurity threats: Hacking, malware, phishing. Information Security threats: Theft, espionage, human error. Goal of both: Protect data and ensure confidentiality, integrity, availability . :** Scope is to protect anything in the cyber realm; deals with danger in cyberspace. **IS:** Scope is for information irrespective of the realm; deals with the protection of data from any form of threat. Attacks and Defense** | **CS:** Strikes against cyber crimes, cyber frauds, and law enforcement. **IS:** Strikes against unauthorized access, disclosure, modification, and disruption. CS acts as the first line of defense, while IS comes into play when security is breached.

Professionals & Defence Cybersecurity professionals handle active threats. InfoSec professionals develop policies and procedures. Cybersecurity acts as first line of defence ; InfoSec follows breaches . CS Professionals:** Deal with the prevention of active threats or APT. **IS Professionals:** Responsible for policies, processes, and organizational roles that assure confidentiality, integrity, and availability; they are the foundation of data security. |

Technologies & Skills Cybersecurity tools: Firewalls, IDS, Antivirus. InfoSec tools: Encryption, Access control, DLP. Cybersecurity requires networking & coding; InfoSec requires risk management & compliance knowledge . CS Goal:** Protects digital information against unauthorized access, use, disclosure, disruption, modification, or destruction. **IS Goal:** Protects confidentiality, integrity, and availability of all types of information, regardless of the medium. Technologies rely on firewalls, antivirus, and IDS (CS) vs. encryption, access controls, and data loss prevention (IS). | |

Skills and Threat Landscape** | **CS Skills:** Requires specialized knowledge of computer systems, networks, programming, and software development. **IS Skills:** Requires knowledge of risk management, compliance, legal, and regulatory issues, as well as technical knowledge. CS deals with constantly evolving threats; IS deals with a wide range of threats including physical security breaches and insider threats. |

Classification of Cybercrime Cybercrime categorized based on motive and nature of crime.

Cyber Terrorism Use of computers/internet to threaten lives or cause fear. Targets critical infrastructure. Example: Attacks on power grids or air traffic systems.

Cyber Extortion Hackers threaten systems demanding money. Example: Ransomware demanding cryptocurrency payment.

Cyber Warfare Nation-state attacks using digital means. Offensive and defensive cyber operations. Example: Espionage or disruption of enemy networks.

Internet Fraud Fake websites, phishing, online scams. Deception to steal money or property.

Cyberstalking Repeated online harassment via messages, emails, or social media. May escalate to offline harassment if ineffective online.

Challenges – Lack of Awareness Many users unaware of cyber rights and safe practices.

Challenges – Anonymity & Underreporting Cybercriminals can hide identity using VPNs or dark web. Many cases go unreported.

Challenges – Skilled Offenders & Weak Punishments Offenders are usually technically proficient. Limited strict enforcement except in severe crimes.

Prevention – Passwords and Authentication Use strong, unique passwords. Avoid reusing or sharing passwords.

Prevention – Security Software Install trusted antivirus and firewalls. Regularly scan devices for malware.

Prevention – Safe Online Behaviour Keep social media accounts private. Avoid public Wi-Fi for transactions. Do not open unknown emails or attachments.

Prevention – System Maintenance Regular software updates and patches. Backup data frequently.

Conclusion & References Cybercrime is a major digital-age threat. Cybersecurity and Information Security ensure protection. Prevention begins with awareness and responsible behavior. References: Government cyber portals, CERT-In, UGC sources.
Tags