SlideShare une entreprise Scribd logo
1  sur  26
DO YOU FEEL SAFE
ON THE INTERNET ?
AIM
 The objective of this presentation is to educate and create
awareness amongst the student community on use of
Technology, Internet media and its implications on possible
cyber crimes.
 Some of the possible preventive measures, one can take to
avoid getting victimized for a cyber crime
CYBER WORLD
• Cyber world is the world of internet and internet related things.
• Simply it is as part of IOT or in consist of IOT.
HOW YOU CONNECTED
• We use FACEBOOK like social medias on the internet
• We do internet banking
• We do online shopping
• We browse many things through internet
• we all this done with the help of computers and phones
CYBER CRIME
• some criminal minded persons commit crimes here, which is
included under cyber-crime.
• So we should be aware about crimes happening around in the
cyber-space.
• Cyber crime refers to any crime that involves a computer/mobile
and a network. The computer may have been used in the
commission of a crime, or it may be the target.
Simple Theory
• When you purchase a home it comes with a door and a
lock. You always ensure that the door/lock exist and
working properly. You may even purchase security systems.
• Well, why would you not secure your investments?
• Likewise, Your System is your home and security tools are
your door/lock and security tools.
• So if someone breaches into your home’s(System), accesses all
your personal accounts and tampers your data, is the criminal
who is committing the crime.
• And committed crime is known as cyber-crime.
• Cyber crime is an illegal activity committed on the internet.
• Money
• Curiosity
• Revenge
• Fun
• Praise seekers
MOTIVATION
CYBER CRIME CATEGORIES
• Against Persons
• Against Property
• Against Government
1. Against Persons :
• Cybercrimes committed against persons include various crimes
like transmission of child-pornography, harassment of any one
with the use of a computer such as e-mail, and cyber-stalking.
• The distribution, posting, and dissemination of obscene material
including pornography, indecent exposure, and child
pornography, constitutes one of the most important Cybercrimes
known today. The potential harm of such a crime to humanity
can hardly be overstated.
2. Against Property :
• The second category of Cybercrimes is that of Cybercrimes
against all forms of property. These crimes include
unauthorized computer trespassing through cyberspace,
computer vandalism, transmission of harmful programs, and
unauthorized possession of computerized information.
3. Against Government :
• The third category of Cybercrimes relate to Cybercrimes
against Government. Cyber Terrorism is one distinct kind of
crime in this category. The growth of Internet has shown
that the medium of Cyberspace is being used by individuals
and groups to the international governments as also to
threaten the citizens of a country. This crime manifests itself
into terrorism when an individual "cracks“ into a government
or military maintained website.
These are also CYBER CRIME
• HACKING
• CHILD PORNOGRAPHY
• DENIAL OF SERVICE ATTACK
• VIRUS DISSEMINITION
• COMPUTER VANDALISM
• CYBER TERRORISM
• SOFTWARE PIRACY
1. Hacking
Hacking in simple terms means an illegal intrusion into a
computer system and/or network. It is also known as CRACKING.
Government websites are the hot targets of the hackers due to
the press coverage, it receives. Hackers enjoy the media
coverage.
2. Child Pornography
The Internet is being highly used by its abusers to reach and
abuse children sexually, worldwide. As more homes have access
to internet, more children would be using the internet and more
are the chances of falling victim to the aggression of pedophiles.
3. Denial of Service Attack
This is an act by the criminal, who floods the bandwidth of the
victims network or fills his e-mail box with spam mail depriving him
of the services he is entitled to access or provide
4. Virus Dissemination
Malicious software that attaches itself to other software or
computer system and then propagates itself to other computers
via networks or disks. (virus, worms, Trojan Horse, web jacking, e-
mail bombing etc)
5. Computer Vandalism
Damaging or destroying data rather than stealing or misusing
them is called cyber vandalism. Transmitting virus: These are
programs that attach themselves to a file and then circulate .
6. Cyber Terrorism
Terrorist attacks on the Internet is by distributed denial of service
attacks, hate websites and hate emails, attacks on sensitive
computer networks, etc. Technology savvy terrorists are using
512-bit encryption, which is impossible to decrypt.
7. Software Piracy
Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of products
intended to pass for the original.
CYBER SECURITY
• Internet security is a branch of computer security specifically
related to the Internet.
• It's objective is to establish rules and measure to use against
attacks over the Internet. 
HOW SAFE FROM CYBER-CRIME
• Use antivirus software’s
• insert firewalls
• uninstall unnecessary software
• maintain backup
• check security settings
• Stay anonymous - choose a genderless screen name
• Never give your full name or address to strangers
Cont..
• Learn ‘Etiquette' - follow it and expect it from others
• Don't respond to harassing or negative messages (flames)
• Get out of uncomfortable or hostile situations quickly
• Save offending messages
• Learn more about Internet privacy
CYBER-SECURITY ADVANTAGES
• The cyber security will defend us from critical attacks.
• It helps us to browse the safe website.
• Internet security process all the incoming and outgoing data on
our computer.
Cont..
• Security will defend from hacks and virus.
• The application of cyber security used in our PC needs update
every week.
• The security developers will update their database every week
once. Hence the new virus also deleted.
THANK YOU

Contenu connexe

Tendances

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & SecurityShreeraj Nair
 

Tendances (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Ppt
PptPpt
Ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Similaire à Stay Safe Online: Tips for Internet Safety

Similaire à Stay Safe Online: Tips for Internet Safety (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation (11).pptx
Presentation (11).pptxPresentation (11).pptx
Presentation (11).pptx
 
Presentation (11).pptx
Presentation (11).pptxPresentation (11).pptx
Presentation (11).pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
CYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptxCYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Dernier

Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Dernier (20)

Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 

Stay Safe Online: Tips for Internet Safety

  • 1. DO YOU FEEL SAFE ON THE INTERNET ?
  • 2. AIM  The objective of this presentation is to educate and create awareness amongst the student community on use of Technology, Internet media and its implications on possible cyber crimes.  Some of the possible preventive measures, one can take to avoid getting victimized for a cyber crime
  • 3. CYBER WORLD • Cyber world is the world of internet and internet related things. • Simply it is as part of IOT or in consist of IOT.
  • 4. HOW YOU CONNECTED • We use FACEBOOK like social medias on the internet • We do internet banking • We do online shopping • We browse many things through internet • we all this done with the help of computers and phones
  • 5. CYBER CRIME • some criminal minded persons commit crimes here, which is included under cyber-crime. • So we should be aware about crimes happening around in the cyber-space. • Cyber crime refers to any crime that involves a computer/mobile and a network. The computer may have been used in the commission of a crime, or it may be the target.
  • 6. Simple Theory • When you purchase a home it comes with a door and a lock. You always ensure that the door/lock exist and working properly. You may even purchase security systems. • Well, why would you not secure your investments? • Likewise, Your System is your home and security tools are your door/lock and security tools. • So if someone breaches into your home’s(System), accesses all your personal accounts and tampers your data, is the criminal who is committing the crime.
  • 7. • And committed crime is known as cyber-crime. • Cyber crime is an illegal activity committed on the internet.
  • 8. • Money • Curiosity • Revenge • Fun • Praise seekers MOTIVATION
  • 9. CYBER CRIME CATEGORIES • Against Persons • Against Property • Against Government
  • 10. 1. Against Persons : • Cybercrimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail, and cyber-stalking. • The distribution, posting, and dissemination of obscene material including pornography, indecent exposure, and child pornography, constitutes one of the most important Cybercrimes known today. The potential harm of such a crime to humanity can hardly be overstated.
  • 11. 2. Against Property : • The second category of Cybercrimes is that of Cybercrimes against all forms of property. These crimes include unauthorized computer trespassing through cyberspace, computer vandalism, transmission of harmful programs, and unauthorized possession of computerized information.
  • 12. 3. Against Government : • The third category of Cybercrimes relate to Cybercrimes against Government. Cyber Terrorism is one distinct kind of crime in this category. The growth of Internet has shown that the medium of Cyberspace is being used by individuals and groups to the international governments as also to threaten the citizens of a country. This crime manifests itself into terrorism when an individual "cracks“ into a government or military maintained website.
  • 13. These are also CYBER CRIME • HACKING • CHILD PORNOGRAPHY • DENIAL OF SERVICE ATTACK • VIRUS DISSEMINITION • COMPUTER VANDALISM • CYBER TERRORISM • SOFTWARE PIRACY
  • 14. 1. Hacking Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.
  • 15. 2. Child Pornography The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles.
  • 16. 3. Denial of Service Attack This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide
  • 17. 4. Virus Dissemination Malicious software that attaches itself to other software or computer system and then propagates itself to other computers via networks or disks. (virus, worms, Trojan Horse, web jacking, e- mail bombing etc)
  • 18. 5. Computer Vandalism Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate .
  • 19. 6. Cyber Terrorism Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 20. 7. Software Piracy Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 21. CYBER SECURITY • Internet security is a branch of computer security specifically related to the Internet. • It's objective is to establish rules and measure to use against attacks over the Internet. 
  • 22. HOW SAFE FROM CYBER-CRIME • Use antivirus software’s • insert firewalls • uninstall unnecessary software • maintain backup • check security settings • Stay anonymous - choose a genderless screen name • Never give your full name or address to strangers
  • 23. Cont.. • Learn ‘Etiquette' - follow it and expect it from others • Don't respond to harassing or negative messages (flames) • Get out of uncomfortable or hostile situations quickly • Save offending messages • Learn more about Internet privacy
  • 24. CYBER-SECURITY ADVANTAGES • The cyber security will defend us from critical attacks. • It helps us to browse the safe website. • Internet security process all the incoming and outgoing data on our computer.
  • 25. Cont.. • Security will defend from hacks and virus. • The application of cyber security used in our PC needs update every week. • The security developers will update their database every week once. Hence the new virus also deleted.