Cyber crime and security

CYBER CRIME AND SECURITY
PRESENTATION
BY:
 AKASH DHIMAN
 SHUBHAM GUPTA
 SAURABH PANDEY
 SAGAR VERMA
 KULDEEP VERMA
 PRIYANSHU CHAUDHARY
Cyber crime and security
 CYBER crime encompasses any criminal act dealing
with computers and networks (called hacking).
Additionally, cyber crime also includes traditional
crimes conducted through the Internet. For example;
hate crimes, telemarketing and Internet fraud, identity
theft, and credit card account thefts are considered to
be cyber crimes when the illegal activities are
committed through the use of a computer and the
Internet .
 Who are Cyber Criminals?
 Kids (age group 9-16 etc.)
 Organized hack activists
 Disgruntled employees
 Professional hackers (corporate espionage
O
V
E
R
V
I
E
w
HISTORY OF CYBER CRIME
 The first recorded cyber crime took place in 1820.
 That is not surprising considering the fact that the
abacus, which is thought to be the earliest form of
a computer, has been around since 3500 B.c.
 The first spam email took place in 1976 when it was
sent out over the ARPANT.
 The first virus was installed on an Apple computer
in 1982 when a high school student, Rich skrenta,
developed the EIK Cloner.
WHY INDIA?
 A rapidly growing online user base 121 Million Internet
Users .
 65 Million Active Internet Users, up by 28% from 51
million in 2010 .
 50 Million users shop online on Ecommerce and Online
Shopping Sites.
 46+ Million Social Network Users .
 346 million mobile users had subscribed to Data
Packages.
CATEGORIES OF CYBER CRIME
CATEGORIES OF CYBER CRIME
CATEGORIES OF CYBER CRIME
3. CYBERCRIMES AGAINST GOVERNMENT:
This crime manifests itself into terrorism when an individual "cracks" into a
government or military maintained website.
TYPES OF CYBER
CRIMES
Types of cyber crime
 HACKING :- Hacking in simple terms means an illegal intrusion info a
computer system and/or network . It is also known as CRACKING.
Government websites are the hot target of the hackers due to the press
coverage, it receives. Hackers enjoy the media coverage.
Motive behind the crime called HACKERS
Motive behind the crime called hacking greed power, publicity, revenge,
adventure desire to access forbidden information destructive mindset
wants to sell n/w security services.
Types of cyber crime
 DENIAL OF SERVICE ATTACKS : This is an act by the criminals who floods the
bandwidth of the victims network or fills his E-mail box with spam mail
depriving him of the service he is entitled to access or provide. Many DOS
attacks, such as the ping of death and Tear drop attacks.
 VIRUS DISSMINITION : Malicious software that attaches itself to other
software. VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING
etc.
 COMPUTER VANDALISM : Damaging or destroying data rather than stealing
or misusing them is called cyber vandalism. These are program that attach
themselves to a file and then circulate.
Types of cyber crime
 CYBER TERRORISM : Terrorist attacks on the Internet is by
distributed denial of service attacks, hate websites and hate E-
mails , attacks on service network etc.
 SOFTWARE PIRACY : Theft of software through the illegal copying
of genuine programs or the counterfeiting and distribution of
products intended to pass for the original.
C
Y
B
E
R
S
E
C
U
R
I
T
Y
CYBER SECURITY
Cyber Security : Cyber Security involves protection of sensitive personal and
business information through prevention, detection and response to different
online attacks. Cyber security actually preventing the attacks, cyber security.
Privacy Policy : Before submitting your name , e-mail , address, on a website look for
the sites privacy policy.
Keep Software Up to Date: If the seller reduces patches for the software operating
system your device ,install them as soon as possible .Installing them will prevent
attackers form being able to take advantage. Use good password which will be
difficult for thieves to guess. Do not choose option that allows your computer to
remember your passwords.
CYBER SECURITY
 DISABLE REMOTE CONNECTIVITY : Some PDA’s and phones
are equipped with wireless technologies, such as Bluetooth,
that can be used to connect to other devices or computers.
You should disable these features when they are not in use.
ADVANTAGES OF CYBER SECURITY
 The cyber security will defend us from critical attacks.
 It helps us to browse the site, website.
 Internet Security process all the incoming and outgoing data on
your computer.
 It will defend us from hacks and virus.
 Application of cyber security used in our PC needs update every
week.
SAFETY TIPS TO CYBER CRIME
 Use antivirus Software
 Insert Firewalls
 Uninstall unnecessary software
 Maintain backup
 Check security settings
CONCLUSION
 Cybercrime is indeed getting the recognition it deserves.
However, it is not going to be restricted that easily . In fact , it
is highly likely that cyber crime and its hackers will continue
developing and upgrading to stay ahead of the law.
 So, to make ourselves safer we need cyber security.
1 sur 19

Recommandé

Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
8.6K vues10 diapositives
Cyber SecurityCyber Security
Cyber SecurityVivek Agarwal
10.8K vues22 diapositives
CybersecurityCybersecurity
CybersecurityForam Gosai
1.8K vues30 diapositives
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
5.8K vues23 diapositives
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
1.4K vues26 diapositives

Contenu connexe

Tendances

Cyber securityCyber security
Cyber securityBhavin Shah
1.3K vues26 diapositives
PptPpt
PptGeetu Khanna
1.8K vues18 diapositives
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
2.5K vues22 diapositives
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
2.8K vues12 diapositives
Cyber CrimeCyber Crime
Cyber CrimeRamesh Upadhaya
2.2K vues19 diapositives
Cyber securityCyber security
Cyber securityHarsh verma
13.6K vues11 diapositives

Tendances(20)

Cyber securityCyber security
Cyber security
Bhavin Shah1.3K vues
PptPpt
Ppt
Geetu Khanna1.8K vues
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj2.5K vues
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru2.8K vues
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya2.2K vues
Cyber securityCyber security
Cyber security
Harsh verma13.6K vues
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid9K vues
Cyber securityCyber security
Cyber security
vishakha bhagwat4.5K vues
Cyber CrimeCyber Crime
Cyber Crime
Avinash Rajput6.4K vues
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha4K vues
Cyber securityCyber security
Cyber security
Shivaani srinivas iyer743 vues
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
Nikunj Thakkar1.6K vues
Cyber securityCyber security
Cyber security
Samsil Arefin1.7K vues
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla4.9K vues
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace11.1K vues
Cyber crimeCyber crime
Cyber crime
Grant Thornton Bangladesh1.9K vues
Cyber securityCyber security
Cyber security
Rishav Sadhu5.7K vues
Cybercrime and securityCybercrime and security
Cybercrime and security
Sheetal Kandhare1K vues
Cyber security Cyber security
Cyber security
Sachith Lekamge1.5K vues
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
yatendrakumar47363 vues

En vedette

Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
727.7K vues20 diapositives
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
602.5K vues22 diapositives
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
539.7K vues12 diapositives

En vedette(19)

Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan727.7K vues
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera602.5K vues
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
Awais Shibli1.2K vues
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari539.7K vues
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
Faridah Husin13.2K vues
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh34.3K vues
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
Asish Verma14.3K vues
Financial disciplineFinancial discipline
Financial discipline
Manu Melwin Joy9.1K vues
Career planningCareer planning
Career planning
Muhammad Khan88.5K vues
Cyber crime among studentsCyber crime among students
Cyber crime among students
june21harsh34.2K vues
Career development pptCareer development ppt
Career development ppt
Nancy Erskine-Sackey286.3K vues
Career Guidance SeminarCareer Guidance Seminar
Career Guidance Seminar
Devendra Pai49.4K vues
Career counseling presentationCareer counseling presentation
Career counseling presentation
rgaotbgal26141548.9K vues
Career planning presentationCareer planning presentation
Career planning presentation
kesiamargot212.4K vues
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Sahil Vashishtha59.1K vues
Cyber securityCyber security
Cyber security
Siblu28668K vues
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi216.8K vues
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain146.2K vues

Similaire à Cyber crime and security

Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
819 vues14 diapositives
Cyber crimeCyber crime
Cyber crimeAbir Rahman
223 vues12 diapositives
ppt Cybercrimeppt Cybercrime
ppt CybercrimeAvinash Katariya
246 vues20 diapositives

Similaire à Cyber crime and security(20)

Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777819 vues
Cyber crimeCyber crime
Cyber crime
Abir Rahman223 vues
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
noT yeT woRkiNg !! iM stiLl stUdYinG !!363 vues
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
Avinash Katariya246 vues
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
Ambrish Mishra97 vues
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
raja jawahar403 vues
Cybercrime Cybercrime
Cybercrime
Anuj Bhardwaj60 vues
CybercrimeCybercrime
Cybercrime
Anuj Bhardwaj110 vues
Cyber crimeCyber crime
Cyber crime
Rishabh Jain256 vues
Cyber CrimeCyber Crime
Cyber Crime
RishabhJain916130 vues
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
Hussain77713.6K vues
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Greater Noida Institute Of Technology823 vues
Cyber crime pptCyber crime ppt
Cyber crime ppt
Gracy Joseph5.6K vues
Computer crimeComputer crime
Computer crime
Vishesh Dalal883 vues
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian10.4K vues
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Anchit Rajawat1.6K vues
Cyber Crime Cyber Crime
Cyber Crime
Kush Rathod68 vues
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
PrabhatChoudhary1163 vues
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
PrabhatChoudhary11558 vues
pravallika chowdarypravallika chowdary
pravallika chowdary
pravallika chowdary268 vues

Dernier(20)

2022 CAPE Merit List 2023 2022 CAPE Merit List 2023
2022 CAPE Merit List 2023
Caribbean Examinations Council3.5K vues
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxGopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Debapriya Chakraborty479 vues
Sociology KS5Sociology KS5
Sociology KS5
WestHatch52 vues
SIMPLE PRESENT TENSE_new.pptxSIMPLE PRESENT TENSE_new.pptx
SIMPLE PRESENT TENSE_new.pptx
nisrinamadani2159 vues
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 Breakdown
WestHatch53 vues
STYP infopack.pdfSTYP infopack.pdf
STYP infopack.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego159 vues
Psychology KS4Psychology KS4
Psychology KS4
WestHatch54 vues
Nico Baumbach IMR Media ComponentNico Baumbach IMR Media Component
Nico Baumbach IMR Media Component
InMediaRes1368 vues
Class 10 English  lesson plansClass 10 English  lesson plans
Class 10 English lesson plans
TARIQ KHAN189 vues
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
DR .PALLAVI PATHANIA190 vues
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptx
TARIQ KHAN76 vues
Industry4wrd.pptxIndustry4wrd.pptx
Industry4wrd.pptx
BC Chew157 vues
ACTIVITY BOOK key water sports.pptxACTIVITY BOOK key water sports.pptx
ACTIVITY BOOK key water sports.pptx
Mar Caston Palacio275 vues
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch54 vues
Azure DevOps Pipeline setup for Mule APIs #36Azure DevOps Pipeline setup for Mule APIs #36
Azure DevOps Pipeline setup for Mule APIs #36
MysoreMuleSoftMeetup84 vues
Universe revised.pdfUniverse revised.pdf
Universe revised.pdf
DrHafizKosar88 vues

Cyber crime and security

  • 1. CYBER CRIME AND SECURITY
  • 2. PRESENTATION BY:  AKASH DHIMAN  SHUBHAM GUPTA  SAURABH PANDEY  SAGAR VERMA  KULDEEP VERMA  PRIYANSHU CHAUDHARY
  • 4.  CYBER crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet .  Who are Cyber Criminals?  Kids (age group 9-16 etc.)  Organized hack activists  Disgruntled employees  Professional hackers (corporate espionage O V E R V I E w
  • 5. HISTORY OF CYBER CRIME  The first recorded cyber crime took place in 1820.  That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.c.  The first spam email took place in 1976 when it was sent out over the ARPANT.  The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 6. WHY INDIA?  A rapidly growing online user base 121 Million Internet Users .  65 Million Active Internet Users, up by 28% from 51 million in 2010 .  50 Million users shop online on Ecommerce and Online Shopping Sites.  46+ Million Social Network Users .  346 million mobile users had subscribed to Data Packages.
  • 9. CATEGORIES OF CYBER CRIME 3. CYBERCRIMES AGAINST GOVERNMENT: This crime manifests itself into terrorism when an individual "cracks" into a government or military maintained website.
  • 11. Types of cyber crime  HACKING :- Hacking in simple terms means an illegal intrusion info a computer system and/or network . It is also known as CRACKING. Government websites are the hot target of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motive behind the crime called HACKERS Motive behind the crime called hacking greed power, publicity, revenge, adventure desire to access forbidden information destructive mindset wants to sell n/w security services.
  • 12. Types of cyber crime  DENIAL OF SERVICE ATTACKS : This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many DOS attacks, such as the ping of death and Tear drop attacks.  VIRUS DISSMINITION : Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING etc.  COMPUTER VANDALISM : Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.
  • 13. Types of cyber crime  CYBER TERRORISM : Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E- mails , attacks on service network etc.  SOFTWARE PIRACY : Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 15. CYBER SECURITY Cyber Security : Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks. Cyber security actually preventing the attacks, cyber security. Privacy Policy : Before submitting your name , e-mail , address, on a website look for the sites privacy policy. Keep Software Up to Date: If the seller reduces patches for the software operating system your device ,install them as soon as possible .Installing them will prevent attackers form being able to take advantage. Use good password which will be difficult for thieves to guess. Do not choose option that allows your computer to remember your passwords.
  • 16. CYBER SECURITY  DISABLE REMOTE CONNECTIVITY : Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.
  • 17. ADVANTAGES OF CYBER SECURITY  The cyber security will defend us from critical attacks.  It helps us to browse the site, website.  Internet Security process all the incoming and outgoing data on your computer.  It will defend us from hacks and virus.  Application of cyber security used in our PC needs update every week.
  • 18. SAFETY TIPS TO CYBER CRIME  Use antivirus Software  Insert Firewalls  Uninstall unnecessary software  Maintain backup  Check security settings
  • 19. CONCLUSION  Cybercrime is indeed getting the recognition it deserves. However, it is not going to be restricted that easily . In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law.  So, to make ourselves safer we need cyber security.