1 / 10

Cyber X-Force-SMS alert system for E-mail threats

Cyber X-Force-SMS alert system for E-mail threats. ABSTRACT.

deron
Download Presentation

Cyber X-Force-SMS alert system for E-mail threats

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber X-Force-SMS alert system for E-mail threats

  2. ABSTRACT • The objective of cyber X-Force includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. Cyber Police may be defined in a general way as an unlawful act wherein the computer is either a tool or a target or both.

  3. An E-mail threat is any threat that uses the internet to facilitate cyber crime. E-mail threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ other protocols and components, such as links in email or IM, or malware attachments or on servers that access the Web. They benefit cyber criminals by stealing information for subsequent sale and help absorb infected PCs into botnets.

  4. E-mail threats pose a broad range of risks, including financial damages, identity theft, loss of confidential information/data, theft of network resources, damaged brand/personal reputation. • E-mail threats can be divided into two primary categories, based on delivery method – push and pull. Push-based threats use spam, phishing, or other fraudulent means to lure a user to a malicious (often spoofed) website which then collects information and/or injects malware. Push attacks use phishing, DNS poisoning (or pharming), and other means to appear to originate from a trusted source.

  5. Precisely-targeted push-based E-mail threats are often referred to as spear phishing to reflect the focus of their data gathering attack. Spear phishing typically targets specific individuals and groups for financial gain. • In other push-based E-mail threats, malware authors use social engineering such as enticing subject lines those reference holidays, popular personalities, sports, pornography, world events and other hot topics to persuade recipients to open the email and follow links to malicious websites or open attachments with malware that accesses the Web.

  6. Pull-based E-mail threats are often referred to as “drive-by” threats, since they can affect any website visitor. Cyber criminals infect legitimate websites, which unknowingly transmit malware to visitors or alter search results to take users to malicious websites. Upon loading the page, the user’s browser passively runs a malware downloader in a hidden HTML frame (IFRAME) without any user interaction. • We propose to design a SMS system which monitors the key actions and gets invoked if it identifies any threat key words and sends SMS to the admin along with the “Word” and the systems IP address to enable quick preventive actions.

  7. EXISTING SYSTEM • Email is a useful tool for technology savvy criminals thanks to the relative anonymity offered by it. It becomes fairly easy for anyone with even a basic knowledge of computers to become a blackmailer by threatening someone via e-mail. Individual who received E-Mail should report to the police authority, then the police will trace IP address of sender then they will trace the location. Sometimes sender may not be trapped.

  8. PROPOSED SYSTEM • In the Proposed System software can be extend to prevent high-tech crimes and cyber terrorism, and keep them from spreading, by quickly providing information gathered by the police on information security to Internet users, and increasing security awarenessAll banking institutions and businesses today run their business online. Hackers can hack your computer system and misuse our personal information and pictures. Various other dangers associated with cyber crimes are entry of virus into your system, altering your files, change of passwords, stealing credit card information and make unauthorized purchases.

  9. Hardware Configuration • Main Processor :Intel Pentium III • CPU Clock :667 MHz • Base Memory Size :128 MB • Hard Disk Capacity :10 GB (Mini) • Monitor :COMPAQ Color monitor • Keyboard :COMPAQ 104 keys

  10. SOFTWARE REQUIREMENTS • Operating System : Windows XP • Internet tool : ASP.NET • Application Development tool : C# .NET • Database : SQL SERVER 2005 • Issue tracking : Scarab • Project planning and tracking : MS Project 2000

More Related