Uploaded by Umida Nurmuhammadovna

Кибербезопасность

advertisement
Machine Translated by Google
MAIN ASPECTS OF CYBER CRIME PREVENTION
Rules that will help you avoid becoming a victim of cybercrime http://
apr.gov.by/news/relevant/130471.html
Tests on cyberbullying https://www.mts.by/unicef/testing/
Test Assess your risk of becoming a victim of a cyber
fraudster https://madte.st/wwbDI6Hz
Leaflets https://www.mvd.gov.by/ru/media/photo/326
https://www.belta.by/infographica/view/kiberprestupnost-v-belarusi-24963/
The presentation was prepared by Elena Alikovna,
methodologist of the department of information technologies
in education of the educational institution "MGOIRO"
Machine Translated by Google
Cybercrime is a criminal activity whose purpose is
is the unauthorized use of a computer, computer network, or network device.
Most cybercrimes are committed by cybercriminals or hackers who make
money from it.
Cybercriminal activities are carried out by individuals or organizations.
Machine Translated by Google
CYBER SECURITY
Cybersecurity is the process of using
security measures to ensure privacy,
integrity and availability of data.
The goal of cybersecurity is
data protection.
Fighting cybercrime (belta.by)
Machine Translated by Google
Information security is the preservation
and protection of information, as well as its most
important elements, including systems and
equipment designed to use, store and
transmit this information.
Machine Translated by Google
In the Criminal Code of the Republic of Belarus contains a number of
articles providing for criminal liability for cybercrimes:
•Article 212 “Theft through the use of computer equipment”; •Article
349 “Unauthorized access to computer information”; •Article 350
“Modification of computer information”; •Article 351
“Computer sabotage”; •Article 352
“Illegal acquisition of computer information”; •Article 353 “Manufacture
or sale of special means for gaining unauthorized access to a computer system or network”;
•Article 354 “Development, use or distribution
of malicious programs”; •Article 355 “Violation of the rules for operating a computer
system or network”
Machine Translated by Google
Types of Cyber Crimes
• Email and Internet fraud • Identity fraud (theft and misuse of personal
information)
information)
• Theft of financial or bank card data
• Theft and sale of corporate data
• Cyber blackmail (demanding money to prevent a cyber attack)
• Ransomware attacks (a type of cyber blackmail)
• Cryptojacking (mining cryptocurrency using other people’s resources without their knowledge
owners)
• Cyber espionage (unauthorized access to data of government or commercial organizations)
Machine Translated by Google
Types of Internet fraud:
ÿ
ÿ Account Hacking (Email Fraud and Internet Fraud) ÿ Phishing
(Vishing) (Identity Fraud (theft and malicious use of personal information)) ÿ
Cyberbullying (Cyberbullying)
ÿ Suspicious Dating
(Grooming) ÿ Swatting
(introduction) emergency services are misled) ÿ
Objectionable content
ÿ Theft of financial or bank card data ÿ Theft
and sale of corporate data ÿ Cyber
blackmail (demanding money to prevent a cyber attack)
ÿ Ransomware attacks (a type of cyber
blackmail) ÿ Cryptojacking (mining cryptocurrency using someone else's
owners)
resources without their knowledge ÿ Cyber espionage (unauthorized access to government or
commercial organizations) ÿ
Gambling ÿ Wasting
parental money ÿ Viruses
Machine Translated by Google
Come on
Phishing is a type of fraud whose goal is to obtain
confidential data for access to various services (email, social network
page, online banking, etc.). logins and passwords Source
This is achieved by sending mass emails on behalf of
popular brands, as well as personal messages within various
services, for example, on behalf of banks or within social
networks. The letter often contains a direct link to a site that is
externally indistinguishable from the real one, or to a site with a
redirect.
Machine Translated by Google
Phishing: how it works
www.vkontakte.ru
www. vkomtakte.ru
www.vk.ru
www.vvk.ru
www.paypa1.com
www.paypal.com
Machine Translated by Google
Vishing
Vishing is one of the methods of fraud using social engineering,
which consists in the fact that attackers, using telephone
communication and playing a certain role (bank employee, buyer,
etc.), under various pretexts, lure confidential information from the
payment card holder or induce to perform certain actions with your
card account / payment card.
Machine Translated by Google
Sit down
Smishing is a type of phishing via SMS. Scammers
send the victim an SMS message containing a link to a phishing
site and motivating her to enter this site. Alternatively, the victim is
asked to send confidential information in a reply SMS
message, concerning
payment details or personal access parameters for
information and payment resources on the Internet.
Machine Translated by Google
Scam
SCAM - A type of Internet fraud when an attacker first gains the user's
trust and then deceives him.
Most often, scammers meet their victims on social networks, forums or
dating sites.
Machine Translated by Google
Cyber attack
A cyber attack - or hacker attack - is a
malicious intervention in a
company’s information system, hacking of
websites and applications, personal accounts
and devices.
The main goals are to benefit from
using this data or blackmailing the owners.
There are entire hacker groups that hack
websites, infrastructures and services
Machine Translated by Google
Cyberbullying
Cyberbullying is a type of bullying using Internet technologies, including insults,
threats, slander, compromising information and blackmail, using personal messages or public
channel.
This is intimidation, humiliation, bullying, physical or psychological terror,
carried out in a virtual environment using the Internet and mobile phone
and aimed at causing fear in another and thereby subjugating him.
While regular bullying uses verbal and physical acts of violence, including
psychological violence, cyberbullying does not require personal presence. All actions are
carried out using emails, messages in instant messengers and social networks,
as well as by posting photos and video materials containing information harmful to the victim’s
reputation on the public network.
Machine Translated by Google
Swatting
Matching is a tactic of harassment, which
is implemented by sending a false call to
a particular service. For example, people
report mining attacks with the goal of causing
confusion and panic in a specific place. Source
Machine Translated by Google
Digital hygiene
Digital hygiene is a set of rules, following
which a person ensures
information security (not anonymity, but
protection) on the Internet.
Machine Translated by Google
Cybersecurity Reference Materials
ÿ
http://www.mogileviro.by/?page_id=6798
Machine Translated by Google
Links to supporting material. Sample handouts for
cybersecurity awareness.
ÿ
• Prevention leaflets • Website of the
Ministry of Internal Affairs of the Republic of Belarus
• Cybercrime in Belarus
• How to avoid becoming a victim of vishing
• How to avoid becoming a victim of phishing
• How to avoid becoming a victim of Internet scammers
• How to avoid becoming a victim of a cybercriminal. Bank card protection
Machine Translated by Google
How to avoid becoming a victim of cybercrime
• Regularly update your software and operating system, including antivirus
software • Use complex passwords
• Do not open attachments in spam emails • Do not click on
links in spam emails or sites you do not trust • Do not provide personal information without making
sure transmission channel security • Contact the company directly if you receive a suspicious
request • Carefully check the addresses of the websites you visit • Carefully review
your bank statements
Cyberlikbez (mvd.gov.by)
The main reason for cybercrimes is
insufficient digital literacy of citizens
Machine Translated by Google
Top 8 dirty schemes
CALL FROM THE BANK
RAISING MONEY FOR TREATMENT
LETTER FROM A FRIEND
CHEAP THINGS
APARTMENTS FOR RENT
BUSY SHOPPER
DRAWINGS AND LOTTERIES (=GIVING AWAY FOR FREE)
JUST CALL ME
Machine Translated by Google
Basic rules for “communicating” with telephone scammers
Basic rule: do not provide data Call back Ask a
security
question No links Do not transfer
money Do not call
Don't read spam emails
back Transfer error:
contact the bank
Check sources
All these rules are basic when dealing with scammers, but new ways of deception are invented every day.
Machine Translated by Google
If you nevertheless become a
victim of cybercriminals, you must contact the
main department for combating cybercrime
of the criminal police of the Ministry of Internal
Affairs by phone:
102
8-(0222)-295-324
8-(0222)-295-319
Machine Translated by Google
There is no universal
protection against threats.
ÿ
Machine Translated by Google
A joint project between MTS and the United Nations Children's Fund (UNICEF) to prevent cyberbullying among
children and adolescents
MTS and UNICEF launched a joint campaign “For a Safe Childhood” (mts.by)
Download