Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.



No description

Abhi Agarwal

on 24 March 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of E-Security

Why E-security?
Popular Cyber Frauds & Scams
What is E-security?
E-security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
Internet offers many benefits to businesses,but unfortunately, with those opportunities come some e-security risks.
The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud

Some threats to security include-
malicious software eg.spyware
Intercept financial transactions, steal credit card details and access customer information.
Steal your download limit without your knowledge and at your cost.
Take over your website and modify it.
Steal sensitive business information from your business.
Cyber Crime

Trojan Attack
Virus & Worm Attack
Any illegal behavior directed by
means of electronic operations
that targets the security of computer systems & the data processed by them.
The Trojan distinguishes itself as a useful software.
It tricks users into downloading and installing
It can steal data(logins,financial data,electronic money)
It has the ability to install more malware ,modify files,monitor activity(keylogging)
It does not self replicate itself like virus.
They have the ability to replicate themselves.
They are used to harm host computers,steal information,create botnots,
It can spread to other computers.
Among the most common malware.
Cause harm by consuming bandwidth & overloading web servers.
They spread via mass emails with the worm attached.
Spies on user activity
Spyware can collect almost any type of data, including personal information like Internet surfing habits, user logins, and bank or credit account information.
It can be difficult to detect
Malware is a software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software
In law, malware is sometimes known as a computer contaminant.
It is disguised as genuine software.
Malware includes-
Phishing is the act of attemting
to acquire information such as
usernames,passwords, and
credit card details by posing
as a trustworthy entity
in an electronic communication.
The personal information is then used to access the individual's account and can result in identity theft and financial loss.
The use of electronic messaging systems to send unsolicited bulk messages (spam), especially advertising, indiscriminately.
It is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers.
Symptoms of Malware
Increased your CPU usage
Slow computer or web browsing speed
• Your Antivirus and firewall protection is unexpectedly disabled.
Freezing or crashing
Modified or deleted files
A firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server between SMTP and HTTP connections.
It Helps keeps hackers from accessing the network
Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet.
Antivirus programs and Internet security programs are useful in protecting a computer or programmable device from malware.
Such programs are used to detect and usually eliminate viruses; however, it is now common to see security suites, containing also firewalls, anti-spyware, theft protection, and so on to more thoroughly protect users.Traditionally, a user would pay for antivirus software; however, computer users now can, and do, download from a host of free security applications on the Internet.
It first surfaced in 2010 and downloads a “dislike”
icon onto your profile, went viral in May and asks you to paste a JavaScript code into your address bar – which then releases rogue malicious code.

Dislike button Facebook scam
With dating fraud, often the con artist develops a relationship with their victim through an online dating site and convinces the victim to send money to the fraudster. The requests for money can be a one-time event, or repeated over an extended period of time.
Although online dating has its dangers, three major dating services, eHarmony; Match.com and Spark Networks, have all agreed to take steps to keep their members safe from common online dating dangers
In a collection in person PayPal scheme, the scammer targets eBay auctions that allow the purchaser to personally collect the item from the seller, rather than having the item shipped, and where the seller accepts PayPal as a means of payment.
The fraudster uses a fake address with a post office box when making their bids, as PayPal will allow such an unconfirmed address. Such transactions are not covered by PayPal's seller protection policy. The fraudster buys the item, pays for it via PayPal, and then collects the item from the victim. The fraudster then challenges the sale, claiming a refund from PayPal and stating that they did not receive the item.
What can you do to be safe?
Apart from installing anti-malware & firewall softwares you can also take the following steps to be secure online-
1.Be wary of files with a double extension such as ".txt.vb" or ".jpg.exe". As a default setting, Windows often hides common file extensions, meaning that a program like Paint.exe will appear to you as simply Paint


Beware of internet pop-ups. This may seem obvious, but the real danger is that some pop-ups are designed to look like they’ve originated from your computer.

Do net enter details like your credit card number,passwords,Account details without checking the authenticity of the website.
Consider switching to a different web browser. Some web browsers are more customizable than others, allowing you more control over pop-ups, ads, tracking, and other concerns that all of us face on the internet. Firefox, for example, has a large array of privacy- and security-related add-ons that will allow you to reclaim control over your web experience.
Digital signatures assures authenticity of the source of messages.
A digital signature is a mathematical scheme for stating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message and that the message was not altered in transit .
Use Digital Signatures
-Stay Safe
Presentation Made By-
1.Abhishek Agarwal 131575
2.Akhil Aggarwal 131629
3.Manan Sethi 131619

Section -C
Bcom (Hons) Sem-2
Protection & Prevention
Full transcript