SlideShare une entreprise Scribd logo
1  sur  37
By: - Anand Kumar Mishra
Roll:- 1413213008
https:// www.facebook.com/manand742
indiancyberspace@gmail.com
(+1)626-720-6032
Content
 Introduction
 History of Cyber Crime
 Categories Of Cyber Crime
 Types Of Cyber Crime
 Cybercrime Threatens National Security
 Cyber Security
 Advantage of Cyber Security
 Safety Tips To Crime
 Cyber Law of India
 Conclusion
Introduction
Cyber Crime is an
activity done using
computer and
internet. We can say
that it is an unlawful
acts wherein the
computer either a
tool or target both.
History Of Cyber Crime
 The first recorded cyber crime took place in 1820.
 That is not surprising considering the fact that the abacus , which is
thought to be earliest from of a computer , has been around since 3500
B.C.
 In India, Japan and china the era of modern computer ,however, began
with the analytical engine of Charles Babbage.
 The first spam email took place in 1976 when it was sent out over the
APRANT.
 The first virus was installed on an Apple computer in 1982 when a high
school student , Rich Skrenta , developed the EIK cloner.
Categories Of Cyber Crime
We can categorize cyber crime in two ways.
1) The computer as a Target : - Using a computer to
attack other computer.. E.g. Hacking, Virus/worm
attack, DDOS attack … etc.
2) The computer as a weapon :- Using a computer to
commit real world crime ….. e.g. cyber terrorism,
credit card fraud and pornography etc.
TYPES OF CYBER CRIME
Hacking
Hacking is simple term means
an illegal intrusion info a
computer system and/or
network . It is also know as
CREAKING. Government
website are the hot target of the
hacker due to press coverage, it
receives. Hacker enjoy the
media coverage.
Motive bind the crime is called
Hacking greed power, publicity,
revenge,adventure,desire to
access forbidden information
destructive mindset want to sell
n/w security services.
DOS ATTACK
DENIAL OF SERVICE ATTACK : -
This is an act by the criminals
who floods the bandwidth if the
victims network or fills his Email
box with spam E-mail depriving
him of the services he is entitled
to access or provide . Many
ddos attack , such as the ping
of death and Tear drop attack.
The largest DDoS attack done
by Anonymous group on BBC
and Donald Trump Website
about 602 gbps.
You can use Ddos attack by loic,
hoic , cmd , anonymous externa
tool.. etc.
VIRUS DISSMINITION
Malicious
software that
attaches itself to
other software.
VIRUS, Worms,
Trojan Horse ,
Web Jacking,
Email Bombing …
etc.
PHISHING
Phishing is still the most popular
attack vector used for hacking
Facebook accounts. There are
variety methods to carry out
phishing attack. In a simple phishing
attacks a hacker creates a fake log
in page which exactly looks like the
real Facebook page and then asks
the victim to log in. Once the victim
log in through the fake page the,
the victims "Email Address" and
"Password" is stored in to a text file,
and the hacker then downloads the
text file and gets his hands on the
victims credentials.
KEYLOGGING
Keylogging is the easiest way
to hack a password.
Keylogging sometimes can be
so dangerous that even a
person with good knowledge
of computers can fall for it. A
Keylogger is basically a small
program which, once is
installed on victim's computer,
will record every thing victim
types on his/her computer.
The logs are then send back
to the attacker by either FTP
or directly to hackers email
address.
SESSION HIJACKING
Session Hijacking can be
often very dangerous if you
are accessing
Facebook/Website on a http
(non secure) connection. In
Session Hijacking attack, a
hacker steals the victims
browser cookie which is
used to authenticate the
user on a website, and use it
to access the victims
account. Session hijacking is
widely used on LAN, and
Wi-Fi connections.
DNS SPOOFING
If both the victim and
attacker are on the
same network, an
attacker can use a DNS
spoofing attack and
change the original
Facebook page to his
own fake page and
hence can get access to
victims Facebook
account.
MAN IN MIDDDLE
ATTACK
If the victim and attacker are
on the same LAN and on a
switch based network, a
hacker can place himself
between the client and the
server, or he could act as a
default gateway and hence
capturing all the traffic in
between.
By Zanti.apk you can easily
attack on Victim Webpage
via android.
USB HACKING
If an attacker has
physical access to
your computer, he
could just insert a
USB programmed
with a function to
automatically extract
saved passwords in
the Internet browser.
Brute force Attack
All password contain
Minimum Length – 6 characters
Maximum length – 14 characters
Passwords should use three of four of the
following four types of characters:
Lowercase
Uppercase
Numbers
Special characters such as
!@#$%^&*(){}[]. In BF attack hackers
make all possible dictionary by using this.
And developed tool for attack one by
one speedy. For maching the password.
Eg... Ophcrack,Router Brute force …etc
COMPUTER
VANDALISM
Damaging or
destroying data
rather then stealing
or misusing them is
called Cyber
vandalism . These a
program that attach
themselves to a file
and then circulate.
CYBER
TERRORISM
Terrorist attacks on
the internet is by
distributed denial of
services attack , hate
website and hate
email , attacks on
service network
etc…
SOFTWARE PIRACY
Theft of software through the illegal
copying of genuine programs or
the counterfeiting and distribution
of products intended to pass for the
original.
In India http://www.onhax.net and
http://www.mhktricks.net is most
popular website for software piracy.
Bcz This is illegal it causes
anonymous shut down onhax.net
by ddos attack and not it is offline.
Cyber Crimes Threatens National Security
Cyber Crimes Threatens National Security
in indian Telecom, Law and Justice minister Sri Ravi Shankar Prasad said that the
rising level of cyber crime is an indication of enormous threat to national security.
On Google social networking site Google+ and facebook have boon perplexing
authorities. Fan club of Underworld Dons like Dawood Ibrahim and Chhota
Shakeel and other wanted terror like ISIS are also doing the round on Facebook
and Google+ . After Anonymous hackers takes down 20,000 ISIS Twitter
accounts they developing own secure social networking site. There is huge
potential for damage to national security through cyber attacks. The internet is a
mean for money bounding and funding terrorist attack is an organized manner.
ISIS is luring Indian hackers with top dollar to hack into government websites and
steal sensitive data. Hackers are also being asked to identify and create a database
of potential recruits from Twitter and Facebook. For each 'job', a hacker would be
paid upwards of $10,000.
CYBER SECURITY
CYBER SECURITY
Cyber Security involves
protection of sensitive
personal and business
through prevention ,
detection and response
to different online
attack . Cyber security
actually preventing the
attacks, cyber security.
PRIVACY POLICY
Before submitting
your name , e-
main , address on
a website look for
the site privacy
policy.
UPDATION CHECK
If the seller reduces patches
for the software operating
system your device , Install
them as soon as possible .
Install them will prevent
attackers from being able to
take advantage. Use good
password which will be
difficult for thieves to guess.
Do not choose option that
allows your computer to
remember your password.
Disable Remote Tool
Some PDA’s and phones
are equipped with
wireless technologies,
such as Bluetooth , That
can be used to connect
to other devices or
computers. You should
disable these feature
when they are not in
use.
ADVANTAGE OF CYBER SECURITY
ADVANTAGE OF CYBER SECURITY
The Cyber Security will defend us from critical
attacks.
It help us to browse the site, website.
Internet Security process all the incoming and
outgoing data on your computer.
It will defend us from hacks and virus.
Application of cyber security used in our PC needs
update every week.
Safety Tips to protect Cyber Crime.
Safety Tips to protect Cyber Crime.
Use antivirus Software
Insert Firewalls
Uninstall Unnecessary software
Maintain Backup
Check Security
Never Click on Unknown/Sortest Link .
CYBER LAW IN INDIA
CYBER LAW IN INDIA
 Cyber Crime can involve criminal activities that are traditional
in nature , such as thief , fraud , deformation and mischief ,
all of which are subjected to the India panel code . In simple
way we can say that cyber crime is unlawful acts where I n
the computer is either a tool or both.
The abuse of computer has also give birth of new age crime
that are addressed by the IT act , 2000
CONCLUSION
CONCLUSION
 Hacking is a crime.
 Need Good Security.
 Cyber crime Is indeed getting to recognition in deserves.
However , It is not going to restricted that easily. In fact, it is
highly likely that cyber crime and it’s hackers will continue
developing and upgrading to stay ahead of the law.
 So, to make us a safer we must need cyber security
THANK YOU
THE END

Contenu connexe

Tendances

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 

Tendances (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ppt
PptPpt
Ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 

Similaire à Cyber crime and Security

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
Kira Dess
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
Alexander Decker
 

Similaire à Cyber crime and Security (20)

Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Plus de Greater Noida Institute Of Technology

Plus de Greater Noida Institute Of Technology (20)

Airline Analysis of Data Using Hadoop
Airline Analysis of Data Using HadoopAirline Analysis of Data Using Hadoop
Airline Analysis of Data Using Hadoop
 
College Administration Management System
College Administration Management System College Administration Management System
College Administration Management System
 
Web security
Web securityWeb security
Web security
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Spoofing
SpoofingSpoofing
Spoofing
 
Sentimental Analysis of twitter data .
Sentimental Analysis of twitter data .Sentimental Analysis of twitter data .
Sentimental Analysis of twitter data .
 
Hacking Question and Answer
Hacking Question and Answer Hacking Question and Answer
Hacking Question and Answer
 
Security tools
Security toolsSecurity tools
Security tools
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
BroadBand Over powerline .
BroadBand Over powerline .BroadBand Over powerline .
BroadBand Over powerline .
 
Modern Networking Hacking
Modern Networking HackingModern Networking Hacking
Modern Networking Hacking
 
Network security
Network securityNetwork security
Network security
 
Lifi Technology
Lifi TechnologyLifi Technology
Lifi Technology
 
Hack wireless internet connections or wifi
Hack wireless internet connections or wifiHack wireless internet connections or wifi
Hack wireless internet connections or wifi
 
Hacking step (Methodology)
Hacking step (Methodology)Hacking step (Methodology)
Hacking step (Methodology)
 
Hacking In Detail
Hacking In DetailHacking In Detail
Hacking In Detail
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
 

Dernier

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Dernier (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 

Cyber crime and Security

  • 1. By: - Anand Kumar Mishra Roll:- 1413213008 https:// www.facebook.com/manand742 indiancyberspace@gmail.com (+1)626-720-6032
  • 2. Content  Introduction  History of Cyber Crime  Categories Of Cyber Crime  Types Of Cyber Crime  Cybercrime Threatens National Security  Cyber Security  Advantage of Cyber Security  Safety Tips To Crime  Cyber Law of India  Conclusion
  • 3.
  • 4. Introduction Cyber Crime is an activity done using computer and internet. We can say that it is an unlawful acts wherein the computer either a tool or target both.
  • 5. History Of Cyber Crime  The first recorded cyber crime took place in 1820.  That is not surprising considering the fact that the abacus , which is thought to be earliest from of a computer , has been around since 3500 B.C.  In India, Japan and china the era of modern computer ,however, began with the analytical engine of Charles Babbage.  The first spam email took place in 1976 when it was sent out over the APRANT.  The first virus was installed on an Apple computer in 1982 when a high school student , Rich Skrenta , developed the EIK cloner.
  • 6. Categories Of Cyber Crime We can categorize cyber crime in two ways. 1) The computer as a Target : - Using a computer to attack other computer.. E.g. Hacking, Virus/worm attack, DDOS attack … etc. 2) The computer as a weapon :- Using a computer to commit real world crime ….. e.g. cyber terrorism, credit card fraud and pornography etc.
  • 8. Hacking Hacking is simple term means an illegal intrusion info a computer system and/or network . It is also know as CREAKING. Government website are the hot target of the hacker due to press coverage, it receives. Hacker enjoy the media coverage. Motive bind the crime is called Hacking greed power, publicity, revenge,adventure,desire to access forbidden information destructive mindset want to sell n/w security services.
  • 9. DOS ATTACK DENIAL OF SERVICE ATTACK : - This is an act by the criminals who floods the bandwidth if the victims network or fills his Email box with spam E-mail depriving him of the services he is entitled to access or provide . Many ddos attack , such as the ping of death and Tear drop attack. The largest DDoS attack done by Anonymous group on BBC and Donald Trump Website about 602 gbps. You can use Ddos attack by loic, hoic , cmd , anonymous externa tool.. etc.
  • 10. VIRUS DISSMINITION Malicious software that attaches itself to other software. VIRUS, Worms, Trojan Horse , Web Jacking, Email Bombing … etc.
  • 11. PHISHING Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims "Email Address" and "Password" is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.
  • 12. KEYLOGGING Keylogging is the easiest way to hack a password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once is installed on victim's computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.
  • 13. SESSION HIJACKING Session Hijacking can be often very dangerous if you are accessing Facebook/Website on a http (non secure) connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and Wi-Fi connections.
  • 14. DNS SPOOFING If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.
  • 15. MAN IN MIDDDLE ATTACK If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between. By Zanti.apk you can easily attack on Victim Webpage via android.
  • 16. USB HACKING If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.
  • 17. Brute force Attack All password contain Minimum Length – 6 characters Maximum length – 14 characters Passwords should use three of four of the following four types of characters: Lowercase Uppercase Numbers Special characters such as !@#$%^&*(){}[]. In BF attack hackers make all possible dictionary by using this. And developed tool for attack one by one speedy. For maching the password. Eg... Ophcrack,Router Brute force …etc
  • 18. COMPUTER VANDALISM Damaging or destroying data rather then stealing or misusing them is called Cyber vandalism . These a program that attach themselves to a file and then circulate.
  • 19. CYBER TERRORISM Terrorist attacks on the internet is by distributed denial of services attack , hate website and hate email , attacks on service network etc…
  • 20. SOFTWARE PIRACY Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. In India http://www.onhax.net and http://www.mhktricks.net is most popular website for software piracy. Bcz This is illegal it causes anonymous shut down onhax.net by ddos attack and not it is offline.
  • 21. Cyber Crimes Threatens National Security
  • 22. Cyber Crimes Threatens National Security in indian Telecom, Law and Justice minister Sri Ravi Shankar Prasad said that the rising level of cyber crime is an indication of enormous threat to national security. On Google social networking site Google+ and facebook have boon perplexing authorities. Fan club of Underworld Dons like Dawood Ibrahim and Chhota Shakeel and other wanted terror like ISIS are also doing the round on Facebook and Google+ . After Anonymous hackers takes down 20,000 ISIS Twitter accounts they developing own secure social networking site. There is huge potential for damage to national security through cyber attacks. The internet is a mean for money bounding and funding terrorist attack is an organized manner. ISIS is luring Indian hackers with top dollar to hack into government websites and steal sensitive data. Hackers are also being asked to identify and create a database of potential recruits from Twitter and Facebook. For each 'job', a hacker would be paid upwards of $10,000.
  • 24. CYBER SECURITY Cyber Security involves protection of sensitive personal and business through prevention , detection and response to different online attack . Cyber security actually preventing the attacks, cyber security.
  • 25. PRIVACY POLICY Before submitting your name , e- main , address on a website look for the site privacy policy.
  • 26. UPDATION CHECK If the seller reduces patches for the software operating system your device , Install them as soon as possible . Install them will prevent attackers from being able to take advantage. Use good password which will be difficult for thieves to guess. Do not choose option that allows your computer to remember your password.
  • 27. Disable Remote Tool Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth , That can be used to connect to other devices or computers. You should disable these feature when they are not in use.
  • 28. ADVANTAGE OF CYBER SECURITY
  • 29. ADVANTAGE OF CYBER SECURITY The Cyber Security will defend us from critical attacks. It help us to browse the site, website. Internet Security process all the incoming and outgoing data on your computer. It will defend us from hacks and virus. Application of cyber security used in our PC needs update every week.
  • 30. Safety Tips to protect Cyber Crime.
  • 31. Safety Tips to protect Cyber Crime. Use antivirus Software Insert Firewalls Uninstall Unnecessary software Maintain Backup Check Security Never Click on Unknown/Sortest Link .
  • 32. CYBER LAW IN INDIA
  • 33. CYBER LAW IN INDIA  Cyber Crime can involve criminal activities that are traditional in nature , such as thief , fraud , deformation and mischief , all of which are subjected to the India panel code . In simple way we can say that cyber crime is unlawful acts where I n the computer is either a tool or both. The abuse of computer has also give birth of new age crime that are addressed by the IT act , 2000
  • 35. CONCLUSION  Hacking is a crime.  Need Good Security.  Cyber crime Is indeed getting to recognition in deserves. However , It is not going to restricted that easily. In fact, it is highly likely that cyber crime and it’s hackers will continue developing and upgrading to stay ahead of the law.  So, to make us a safer we must need cyber security