SlideShare a Scribd company logo
1 of 22
CYBER CRIME AND SECURITY
If we can defeat them sitting at
home……who needs to fight with tanks
and guns!!!!

Presented By
Lipsita Behera.
B.Sc IST, 3rd Year.
Roll-11DIS110.
RAVENSHAW UNIVERSITY.
CONTENTS










Introduction.
Definition.
History.
Cyber threat evolution.
Categories of cyber crime.
Types of cyber crime.
Prevention.
Security.
Conclusion.
INTRODUCTION
The internet in India is growing rapidly. It has given
rise to new opportunities in every field we can think of
be it entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s
own disadvantages is Cyber crime- illegal activity
committed on the internet.
DEFINING CYBER CRIME
 Crime committed using a computer and the
internet to steal data or information.
 Illegal imports.
 Malicious programs.
Cyber crime

is nothing but where
the computer used as an object
or subject of crime..
HISTORY
• The first recorded cyber crime took place
in the year 1820.
CYBER THREAT EVOLUTION
CATEGORIZATION OF CYBER CRIME

• The Computer as a Target

• The computer as a weapon
TYPES OF CYBER CRIME
•
•
•
•
•
•

Hacking
Denial of service attack
Virus Dissemination
Computer Vandalism
Cyber Terrorism
Software Piracy
HACKING
• Hacking in simple terms means an illegal
intrusion into a computer system and/or
network.
DENIAL OF SERVICE ATTACK

• Act by the criminal, who floods the
bandwidth of the victims network.
• Is his e-mail box with spam mail depriving
him of the services.
VIRUS DISSEMINATION
• Malicious software that attaches itself to
other software. (virus, worms, Trojan
Horse, web jacking, e-mail bombing etc.)
COMPUTER VANDALISM
• Damaging or destroying data rather than
stealing.
• Transmitting virus
CYBER TERRORISM
• Use of Internet based attacks in terrorist activities.
• Technology savvy terrorists are using 512-bit
encryption, which is impossible to decrypt.
SOFTWARE PIRACY
• Theft of software through the illegal copying of
genuine programs.
• Distribution of products intended to pass for the
original.
TYPES OF CYBER ATTACK BY PERCENTAGE

•
•
•
•
•
•
•
•

Financial fraud:
Sabotage of data/networks:
Theft of proprietary information:
System penetration from the outside:
Denial of service:
Unauthorized access by insiders:
Employee abuse of internet privileges
Viruses

11%
17%
20%
25%
27%
71%
79%
85%
SAFETY TIPS FOR CYBER CRIME

•
•
•
•
•
•

Use antivirus software’s.
Insert firewalls.
Uninstall unnecessary software
Maintain backup.
Check security settings.
Stay anonymous - choose a genderless screen
name.
• Never give your full name or address to strangers.
• Learn more about Internet privacy.
Security
CYBER SECURITY
• Internet security is a branch of computer security
specifically related to the Internet.
• It's objective is to establish rules and measure to
use against attacks over the Internet.
ADVANTAGES OF CYBER SECURITY

• Defend us from critical attacks.
• Browse the safe website.
• Internet security process all the incoming and
outgoing data on our computer.
CONCLUSION
Technology is destructive only in the hands of
people who do not realize that they are one
and the same process as the universe.
Cyber crime and security ppt

More Related Content

What's hot

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hackingAyush Upadhyay
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptxTushar Bisen
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationRitik Kumar
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 

What's hot (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Viewers also liked

Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & SecurityShreeraj Nair
 
Cyborg ppt presentation
Cyborg ppt presentationCyborg ppt presentation
Cyborg ppt presentationmunisai
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
brain computer-interfaces PPT
 brain computer-interfaces PPT brain computer-interfaces PPT
brain computer-interfaces PPTVijay Mehta
 
Artificial Intelligence & Robotics Enables the 4th Industrial Revolution and ...
Artificial Intelligence & Robotics Enables the 4th Industrial Revolution and ...Artificial Intelligence & Robotics Enables the 4th Industrial Revolution and ...
Artificial Intelligence & Robotics Enables the 4th Industrial Revolution and ...Alpesh Kadakia
 
The 4th Industrial Revolution - A Scenario Analysis on the Future of Production
The 4th Industrial Revolution - A Scenario Analysis on the Future of ProductionThe 4th Industrial Revolution - A Scenario Analysis on the Future of Production
The 4th Industrial Revolution - A Scenario Analysis on the Future of ProductionAntonio Auricchio
 
digital production and the 4th industrial revolution
digital production and the 4th industrial revolutiondigital production and the 4th industrial revolution
digital production and the 4th industrial revolutionRoberto Siagri
 
Blockchain - Why do we need a trust machine
Blockchain - Why do we need a trust machineBlockchain - Why do we need a trust machine
Blockchain - Why do we need a trust machineReki Wu
 
Enter into the 4th Industrial Revolution
Enter into the 4th Industrial RevolutionEnter into the 4th Industrial Revolution
Enter into the 4th Industrial RevolutionDassault Systemes
 
4th Industrial Revolution & Korean Historical Identity
 4th Industrial Revolution & Korean Historical Identity 4th Industrial Revolution & Korean Historical Identity
4th Industrial Revolution & Korean Historical IdentitySoojin Shin
 

Viewers also liked (18)

Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
אבטחת מידע לעובדים בארגון
אבטחת מידע לעובדים בארגוןאבטחת מידע לעובדים בארגון
אבטחת מידע לעובדים בארגון
 
Cyborg ppt presentation
Cyborg ppt presentationCyborg ppt presentation
Cyborg ppt presentation
 
Cyborgs Powerpoint
Cyborgs PowerpointCyborgs Powerpoint
Cyborgs Powerpoint
 
Cyborg
CyborgCyborg
Cyborg
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
brain computer-interfaces PPT
 brain computer-interfaces PPT brain computer-interfaces PPT
brain computer-interfaces PPT
 
Quantum computer ppt
Quantum computer pptQuantum computer ppt
Quantum computer ppt
 
Artificial Intelligence & Robotics Enables the 4th Industrial Revolution and ...
Artificial Intelligence & Robotics Enables the 4th Industrial Revolution and ...Artificial Intelligence & Robotics Enables the 4th Industrial Revolution and ...
Artificial Intelligence & Robotics Enables the 4th Industrial Revolution and ...
 
The 4th Industrial Revolution - A Scenario Analysis on the Future of Production
The 4th Industrial Revolution - A Scenario Analysis on the Future of ProductionThe 4th Industrial Revolution - A Scenario Analysis on the Future of Production
The 4th Industrial Revolution - A Scenario Analysis on the Future of Production
 
digital production and the 4th industrial revolution
digital production and the 4th industrial revolutiondigital production and the 4th industrial revolution
digital production and the 4th industrial revolution
 
Blockchain - Why do we need a trust machine
Blockchain - Why do we need a trust machineBlockchain - Why do we need a trust machine
Blockchain - Why do we need a trust machine
 
Enter into the 4th Industrial Revolution
Enter into the 4th Industrial RevolutionEnter into the 4th Industrial Revolution
Enter into the 4th Industrial Revolution
 
4th Industrial Revolution & Korean Historical Identity
 4th Industrial Revolution & Korean Historical Identity 4th Industrial Revolution & Korean Historical Identity
4th Industrial Revolution & Korean Historical Identity
 

Similar to Cyber crime and security ppt

cybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdfcybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdfgtxgeforce67
 
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptxcybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptxRahulDhanware2
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.pptArshad Khan
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet vimal kumar arora
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuityAlisha Korpal
 
Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Hîmãlåy Làdhä
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxMayurSapkale7
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxBigBoss647822
 
Presentation(Cyber crime & security)
Presentation(Cyber crime & security)Presentation(Cyber crime & security)
Presentation(Cyber crime & security)Ikhtiar Khan Sohan
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptxAlthafYazin
 

Similar to Cyber crime and security ppt (20)

cybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdfcybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdf
 
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptxcybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
Cyber security
Cyber security        Cyber security
Cyber security
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
Presentation(Cyber crime & security)
Presentation(Cyber crime & security)Presentation(Cyber crime & security)
Presentation(Cyber crime & security)
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Cyber crime and security ppt

  • 1. CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3rd Year. Roll-11DIS110. RAVENSHAW UNIVERSITY.
  • 3. INTRODUCTION The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet.
  • 4. DEFINING CYBER CRIME  Crime committed using a computer and the internet to steal data or information.  Illegal imports.  Malicious programs.
  • 5. Cyber crime is nothing but where the computer used as an object or subject of crime..
  • 6. HISTORY • The first recorded cyber crime took place in the year 1820.
  • 8. CATEGORIZATION OF CYBER CRIME • The Computer as a Target • The computer as a weapon
  • 9. TYPES OF CYBER CRIME • • • • • • Hacking Denial of service attack Virus Dissemination Computer Vandalism Cyber Terrorism Software Piracy
  • 10. HACKING • Hacking in simple terms means an illegal intrusion into a computer system and/or network.
  • 11. DENIAL OF SERVICE ATTACK • Act by the criminal, who floods the bandwidth of the victims network. • Is his e-mail box with spam mail depriving him of the services.
  • 12. VIRUS DISSEMINATION • Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)
  • 13. COMPUTER VANDALISM • Damaging or destroying data rather than stealing. • Transmitting virus
  • 14. CYBER TERRORISM • Use of Internet based attacks in terrorist activities. • Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 15. SOFTWARE PIRACY • Theft of software through the illegal copying of genuine programs. • Distribution of products intended to pass for the original.
  • 16. TYPES OF CYBER ATTACK BY PERCENTAGE • • • • • • • • Financial fraud: Sabotage of data/networks: Theft of proprietary information: System penetration from the outside: Denial of service: Unauthorized access by insiders: Employee abuse of internet privileges Viruses 11% 17% 20% 25% 27% 71% 79% 85%
  • 17. SAFETY TIPS FOR CYBER CRIME • • • • • • Use antivirus software’s. Insert firewalls. Uninstall unnecessary software Maintain backup. Check security settings. Stay anonymous - choose a genderless screen name. • Never give your full name or address to strangers. • Learn more about Internet privacy.
  • 19. CYBER SECURITY • Internet security is a branch of computer security specifically related to the Internet. • It's objective is to establish rules and measure to use against attacks over the Internet.
  • 20. ADVANTAGES OF CYBER SECURITY • Defend us from critical attacks. • Browse the safe website. • Internet security process all the incoming and outgoing data on our computer.
  • 21. CONCLUSION Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.