SlideShare une entreprise Scribd logo
1  sur  21
AJAY SINGH
B.TECH EC 3RD YEAR
1006331007
What is Cyberspace And
Cybercrime
Cyberspace
An electronic medium of computer system within which people
can communicate do research, or simply window shop.
Cybercrime
Crime committed using a computer and the internet i.e.
where the computer used as an object or subject of crime.
History
-The first recorded cyber crime took place in the year
1820.
-The first spam email took place in 1978 when it was
sent over the Arpanet
-The first VIRUS was installed on an Apple computer in
1982
Types of cyber crime
-Hacking
-Child pornography
-Computer vandalism
-DoS attack
-Virus Dissemination
-Software Piracy
-Net Extortion
-Phishing
-Spoofing

Hacking
-Illegal intrusion into a computer system and/or network.
i.e. Unauthorized access
Hacking Tools
• Keyloggers
• Sniffers
 Key loggers are provide
logging which you press on
the keyboard buttons.
 Hackers can steal your
passwords or your personal
informations.
Key loggers

 is computer software or computer hardware that can
intercept and log traffic passing over a digital network or
part of a network.
 Hackers can sniff your packets with some softwares or
hardwares and they can steal your creadit card
numbers, paswords or e-mails.
Sniffers
Child pornography
-Abuse children/teens sexually
-More children would be using the internet and more are the
chances of falling victim to the aggression of pedophiles
Computer vandalism
-Damaging or destroying data rather than stealing or reusing
DoS attack
-Floods the bandwidth of the victims network or fills his e-
mail box with spam mail depriving him of the services he is
entitled to access
Software piracy
-Theft of software through the illegal copying of genuine
programs

Virus Dissemination
 -Malicious software that attaches itself to other software (virus,
worms, Trojan Horse)
 Computer viruses can damage your computer software system
even cause collapse your system.
 İts can delete your files
Net extortion
-Copying the companies confidential data in order to extort said
company for huge amount
Phishing
-Act of sending an e-mail to a user falsely claiming to be an
established legitimate enterprise in an attempt to scam the user into
surrendering private information that will be used for identity theft
Spoofing
-Getting one computer on a network to pretend to have the identity
off another computer,, usually one with special access privileges ,so
as to obtain access to the other computers on the network.
Cyber crime threatens national security
-Ex union home minister Shivraj Patil said that the rising level of
cyber crime is an indication of an enormous threat to national
security.
-Everything is being operated through computer and hence the risk
increases.
-India is at eleventh position , U.S. being the first
-Increase in number of cases reported
Cyber security
-Involves protection of sensitive personal & business information
through prevention, detection and response to different online
attacks
-Protects from attacks by detecting and preventing

15-441 Networks Fall 2002 16
Why do we need
security?
 Protect vital information while still allowing access
to those who need it
 Trade secrets, medical records, etc.
 Provide authentication and access control for
resources
 Ex: AFS
 Guarantee availability of resources
 Ex: 5 9’s (99.999% reliability)

17
Who is vulnerable?
 Financial institutions and banks
 Internet service providers
 Pharmaceutical companies
 Government and defense agencies
 Contractors to various government agencies
 Multinational corporations
 ANYONE ON THE NETWORK
Do’s
-Install a firewall , pop-up blocker
-Ensure your virus definitions are up to date
-Use strong passwords , don’t give personal information unless
required(not even phone number)
-Use secure connections
-Disable file sharing , turn off internet when not in use
-Use spam filters , delete spam immediately
-Use various passwords for various accounts
-Don’t believe in everything you read online
-Open attachments carefully
-Beware of promises to make fast profits
-Be smart , don’t act foolish and help in spreading spam
Conclusion
The only system which is truly secure is one which is switched
off and unplugged.
So , only way to be safe is Pay attention and
Act smart.

References
 http://img208.imageshack.us/img208/1195/chart.jpg
 http://www.howdoigetridofspyware.com/wp-
content/uploads/2009/03/isitsafecompressed.jpg
 http://computersafetytips.files.wordpress.com/2008/12/comp
uter-virus-picturejpg.jpg
 http://wwwdelivery.superstock.com/WI/223/1614/PreviewC
omp/SuperStock_1614R-10559.jpg
 http://www.microsoft.com/protect/images/viruses/diagram.
jpg
 http://www.gulfnews.com/images/08/09/16/16_bz_atm_ban
k_hacker01_5.gif
 http://www.terminally-incoherent.com/blog/wp-
content/uploads/2007/12/hackers.png


Contenu connexe

Tendances

Tendances (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ppt
PptPpt
Ppt
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 

En vedette

En vedette (14)

Dissertation - Cyber Security
Dissertation - Cyber Security Dissertation - Cyber Security
Dissertation - Cyber Security
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacks
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Software Development Techniques
Software Development TechniquesSoftware Development Techniques
Software Development Techniques
 
Principles of Information Technology
Principles of Information TechnologyPrinciples of Information Technology
Principles of Information Technology
 
Information Security (Dissertation)
Information Security (Dissertation)Information Security (Dissertation)
Information Security (Dissertation)
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Office 365: Do’s and Don’ts, Lessons learned from the field
Office 365: Do’s and Don’ts, Lessons learned from the fieldOffice 365: Do’s and Don’ts, Lessons learned from the field
Office 365: Do’s and Don’ts, Lessons learned from the field
 

Similaire à What is Cyberspace and Cybercrime

Cyber crime (do's&dont's)
Cyber crime (do's&dont's)Cyber crime (do's&dont's)
Cyber crime (do's&dont's)Nigel D'souza
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer SecurityKongChunLeong1
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalVaishnaviKhandelwal6
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 

Similaire à What is Cyberspace and Cybercrime (20)

Cyber crime (do's&dont's)
Cyber crime (do's&dont's)Cyber crime (do's&dont's)
Cyber crime (do's&dont's)
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer Security
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Internet security
Internet securityInternet security
Internet security
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Hamza
HamzaHamza
Hamza
 
Computer security
Computer securityComputer security
Computer security
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 

Dernier

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

What is Cyberspace and Cybercrime

  • 1. AJAY SINGH B.TECH EC 3RD YEAR 1006331007
  • 2. What is Cyberspace And Cybercrime Cyberspace An electronic medium of computer system within which people can communicate do research, or simply window shop. Cybercrime Crime committed using a computer and the internet i.e. where the computer used as an object or subject of crime.
  • 3. History -The first recorded cyber crime took place in the year 1820. -The first spam email took place in 1978 when it was sent over the Arpanet -The first VIRUS was installed on an Apple computer in 1982
  • 4. Types of cyber crime -Hacking -Child pornography -Computer vandalism -DoS attack -Virus Dissemination -Software Piracy -Net Extortion -Phishing -Spoofing
  • 5.  Hacking -Illegal intrusion into a computer system and/or network. i.e. Unauthorized access Hacking Tools • Keyloggers • Sniffers
  • 6.  Key loggers are provide logging which you press on the keyboard buttons.  Hackers can steal your passwords or your personal informations. Key loggers
  • 7.   is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network.  Hackers can sniff your packets with some softwares or hardwares and they can steal your creadit card numbers, paswords or e-mails. Sniffers
  • 8. Child pornography -Abuse children/teens sexually -More children would be using the internet and more are the chances of falling victim to the aggression of pedophiles Computer vandalism -Damaging or destroying data rather than stealing or reusing
  • 9. DoS attack -Floods the bandwidth of the victims network or fills his e- mail box with spam mail depriving him of the services he is entitled to access Software piracy -Theft of software through the illegal copying of genuine programs
  • 10.  Virus Dissemination  -Malicious software that attaches itself to other software (virus, worms, Trojan Horse)  Computer viruses can damage your computer software system even cause collapse your system.  İts can delete your files Net extortion -Copying the companies confidential data in order to extort said company for huge amount
  • 11. Phishing -Act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft Spoofing -Getting one computer on a network to pretend to have the identity off another computer,, usually one with special access privileges ,so as to obtain access to the other computers on the network.
  • 12. Cyber crime threatens national security -Ex union home minister Shivraj Patil said that the rising level of cyber crime is an indication of an enormous threat to national security. -Everything is being operated through computer and hence the risk increases. -India is at eleventh position , U.S. being the first -Increase in number of cases reported
  • 13.
  • 14.
  • 15. Cyber security -Involves protection of sensitive personal & business information through prevention, detection and response to different online attacks -Protects from attacks by detecting and preventing
  • 16.  15-441 Networks Fall 2002 16 Why do we need security?  Protect vital information while still allowing access to those who need it  Trade secrets, medical records, etc.  Provide authentication and access control for resources  Ex: AFS  Guarantee availability of resources  Ex: 5 9’s (99.999% reliability)
  • 17.  17 Who is vulnerable?  Financial institutions and banks  Internet service providers  Pharmaceutical companies  Government and defense agencies  Contractors to various government agencies  Multinational corporations  ANYONE ON THE NETWORK
  • 18. Do’s -Install a firewall , pop-up blocker -Ensure your virus definitions are up to date -Use strong passwords , don’t give personal information unless required(not even phone number) -Use secure connections -Disable file sharing , turn off internet when not in use -Use spam filters , delete spam immediately -Use various passwords for various accounts -Don’t believe in everything you read online -Open attachments carefully -Beware of promises to make fast profits -Be smart , don’t act foolish and help in spreading spam
  • 19. Conclusion The only system which is truly secure is one which is switched off and unplugged. So , only way to be safe is Pay attention and Act smart.
  • 20.  References  http://img208.imageshack.us/img208/1195/chart.jpg  http://www.howdoigetridofspyware.com/wp- content/uploads/2009/03/isitsafecompressed.jpg  http://computersafetytips.files.wordpress.com/2008/12/comp uter-virus-picturejpg.jpg  http://wwwdelivery.superstock.com/WI/223/1614/PreviewC omp/SuperStock_1614R-10559.jpg  http://www.microsoft.com/protect/images/viruses/diagram. jpg  http://www.gulfnews.com/images/08/09/16/16_bz_atm_ban k_hacker01_5.gif  http://www.terminally-incoherent.com/blog/wp- content/uploads/2007/12/hackers.png
  • 21.