Professional Documents
Culture Documents
HISTORY
Thomas Draper
1970
s Kevin Mitnick,
Early 1988 16,USA
Gary McKinnon,
USA
Enter the 1990s
34% in
2013 – up
from last
year’s 15%.
Significant
Increase
43% in
government, and
NOW
up from last
year’s 19% .
deterrence
stability
What IsThreat?
Cyber
CYBER
•Hackers &
THREAT •Organised
Crime Groups Hacktivists
•Industrial
•Terrorists Spies
PHISHIN
G
DATA
BREACH
•DENIAL OF SERVICE
•MALWARE
•RANSOMWARE
•PASSWORD ATTACKS
Don’t be
an Easy
Bait
TERRORISM
TARGET
IMPACT
METHOD OF
ACTION
TOOLS OF
ATTACK
DOMAIN
THREAT
SOFTWARE
S
MALWARE
CREDITIDENTITY
CARD THEFT
CYBER CRIME
AS A Hacking, Virus
Attack, DOS Attack
TARGET
AS A Cyber Terrorism,
Credit Card Fraud
WEAPON
INFORMATION TECHNOLOGY ACT, 2000
DIGITAL ELECTRONIC
SIGNATURE GOVERNANCE
PENALTIES OFFENCES
&
ADJUDICATION
“Prevention is Better
Than Cure”
SUPERVISION
ENCRYPT
ION
AUTHENTIC
ATION
WHAT is
ENCRYPTION!?
TYPES
ENCRYPTION IN THE
HANDS OF
INTRUDERS!!
Advanced Encryption
Standard (AES)
GOPALA DALMIA
ERO0236353
SONIA DHAR
ERO0236642
DIMPLE SARAF
ERO0234801
ARATI KUMARI SINGH
ERO0236742
SNEHA MODI