SlideShare une entreprise Scribd logo
1  sur  18
Cybercrime and cyber security
By
Karthik S
M.Sc Third semester
DOSR in Library and Information Science
Tumkur university
Guide
Prof. Sampath Kumar BT
DOSR in Library and Information Science
Tumkur university
Cyber crime
Cybercrime is any criminal activity that involves a computer,
networked device, or network.
Most cybercrime is an attack on information about
individuals, corporations, or governments.
A cybercriminal is a person who uses his skills in technology
to do malicious acts and illegal activities known as
“cybercrimes.”
History of Cybercrime
• The first cyber crime was recorded in the year 1820
• The first spam E-mail took place in 1978 when it was sent over the Arpanet
• The first Virus was installed on an Apple computer in 1982
Types of cybercrimes
1) Hacking
 In general hacking refers to unauthorized entry into a
computer or a network
 A hacker is a person with technical skills who breaks
codes and passwords to gain unauthorized entry to a
computer system
 Hackers are mainly classified into two types
o Ethical hackers/white hat hackers
o unauthorized hackers/black hat hackers
2)E-mail Bombing
An E-mail Bombing is a form of net abuse that send large volumes of
E-Mail to an address to overflow the mailbox
There are three ways to create an email bombing
 Mass mailing
 List linking
 Zip bombing
3)Cyberstalking
Cyberstalking is the use of the internet (or)other electronic means to stalk
or harass an individual group or organization. It may include false defamation
Ex: making rude, offensive, or online comments
4) Salami attack
A salami attack is a method of cybercrime that attackers or
hackers typically used to commit financial crimes
Types of salami attack
Salami slicing: It occurs when the attackers get
customers’ information like bank/credit card details by
using online databases the hackers deduct useful
elements from customers
Penny shaving: When hackers steal money in a small
amount. By using rounding to the closest within the
transaction so change is so small that nobody can detect
such dough in a single transaction
5)Denial of service attack
 A denial of service attack is a security threat that occurs when
an attacker makes it impossible for legitimate users to access computer
system networks or services
 Attackers in these types of attacks typically flood web servers, systems, or networks with traffic that
overwhelms the victim’s resources and makes it difficult or impossible for anyone else to access them. We
might have experienced this while downloading any application from the website
6) Spreading of virus
virus are programs that attack themselves a computer or a file and usually affect the data
on a computer either by altering or deleting data
some viruses: Mydoom, ILOVEYOU, WannaCry
7) Phishing
 Phishing Is a type of local engineering attack often used to steal user data,
including login credentials and credit card numbers
 The basic element of a phishing attack is a message sent by email, social
media, or other electronic communication means
8) Spyware
Spyware is any software that installs itself on the computer and starts overly monitoring our online
behaviour without our knowledge or permission
9) Spamming
It is sending the same message to many different people using email or messages usually as a way of
advertising something
Cybercrime rate
 29.9 million people fell victim to
cybercrime
 17% of adults have experienced
cybercrime on their mobile phone
through social media
 4 billion dollars in direct financial loss
 To resolve these problems about 3.6
billion have been spent
Punishments for cybercrime in India
IPC sections Crimes punishments
66 Hacking with computer system Imprisonment of up to 3 years
and a fine of up to 5,00,000
66C Using passwords of others
(Phishing)
Imprisonment up to 3 years and
fine up to 1,00,000
66D Cheating using computer
resource
Imprisonment up to 3 years and
fine up to 1,00,000
Cyber security
Cybersecurity is the practice of defending computers,
servers, mobile devices, networks, and data from malicious attacks
Types of cybersecurity: To keep the data safe, it is essential to use
 Antivirus
 Firewalls
 Password
 Keep software updated
 Security suite
 Data backups
 Cryptography
 Antivirus:
An antivirus product is a program designed to detect
and remove viruses and other kinds of malicious software from our
computers or system/laptop
Ex: McAfree, AVG, Quick heel
 Firewall:
A firewall is a network security system that, monitors
and controls the incoming and outgoing network traffic based on
predetermined security rules. A firewall typically establishes a barrier
between a trusted network and an untrusted network . It is used in the
organization and companies for protecting data
 Password: A password is a string of characters used to verify the identity of
a user during an authentication process. password must be a combination
of letters, numbers, and special symbols
 Keep software updated: In order to get rid of cyber attacks we must keep
our software updated
 Data Backups: Backup is the process of
creating a copy of the data on our system
then we use for recovery in case of our
original data is lost or corrupted
Security suite:
• A security suite is one solution designed to protect computers servers and
other digital devices against cyberattacks
• It is a collection of software utilizes that protects a computer from viruses
and other malware
• It contains a suite of firewalls, antivirus, antispyware and more
Cryptography
 Cryptography is a method of protecting information and
communications through the use of codes so that those
for whom the information is intended can read and
process it
 It is a process of encoding a message or information in
such a way that only authorized parties can read it
 It involves encryption and decryption processes to
achieve a secure transfer of information through
cryptography
Precautionary measures to avoid cybercrimes:
 Use Antivirus software and firewalls
 Uninstall unnecessary software
 Don’t open emails from unknown sources
 Use hard-to-guess passwords. Don’t give your name and date of birth as a
password so that it can be easily traced
cont.….
 Review bank and credit card statements regularly
 Keep an eye on updates of your software and system
 Maintain backup
Cybercrime and security.pptx

Contenu connexe

Similaire à Cybercrime and security.pptx

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 

Similaire à Cybercrime and security.pptx (20)

Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cyber security
cyber security cyber security
cyber security
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-security
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Cybercrime and security.pptx

  • 1. Cybercrime and cyber security By Karthik S M.Sc Third semester DOSR in Library and Information Science Tumkur university Guide Prof. Sampath Kumar BT DOSR in Library and Information Science Tumkur university
  • 2. Cyber crime Cybercrime is any criminal activity that involves a computer, networked device, or network. Most cybercrime is an attack on information about individuals, corporations, or governments. A cybercriminal is a person who uses his skills in technology to do malicious acts and illegal activities known as “cybercrimes.”
  • 3. History of Cybercrime • The first cyber crime was recorded in the year 1820 • The first spam E-mail took place in 1978 when it was sent over the Arpanet • The first Virus was installed on an Apple computer in 1982
  • 4. Types of cybercrimes 1) Hacking  In general hacking refers to unauthorized entry into a computer or a network  A hacker is a person with technical skills who breaks codes and passwords to gain unauthorized entry to a computer system  Hackers are mainly classified into two types o Ethical hackers/white hat hackers o unauthorized hackers/black hat hackers
  • 5. 2)E-mail Bombing An E-mail Bombing is a form of net abuse that send large volumes of E-Mail to an address to overflow the mailbox There are three ways to create an email bombing  Mass mailing  List linking  Zip bombing 3)Cyberstalking Cyberstalking is the use of the internet (or)other electronic means to stalk or harass an individual group or organization. It may include false defamation Ex: making rude, offensive, or online comments
  • 6. 4) Salami attack A salami attack is a method of cybercrime that attackers or hackers typically used to commit financial crimes Types of salami attack Salami slicing: It occurs when the attackers get customers’ information like bank/credit card details by using online databases the hackers deduct useful elements from customers Penny shaving: When hackers steal money in a small amount. By using rounding to the closest within the transaction so change is so small that nobody can detect such dough in a single transaction
  • 7. 5)Denial of service attack  A denial of service attack is a security threat that occurs when an attacker makes it impossible for legitimate users to access computer system networks or services  Attackers in these types of attacks typically flood web servers, systems, or networks with traffic that overwhelms the victim’s resources and makes it difficult or impossible for anyone else to access them. We might have experienced this while downloading any application from the website 6) Spreading of virus virus are programs that attack themselves a computer or a file and usually affect the data on a computer either by altering or deleting data some viruses: Mydoom, ILOVEYOU, WannaCry
  • 8. 7) Phishing  Phishing Is a type of local engineering attack often used to steal user data, including login credentials and credit card numbers  The basic element of a phishing attack is a message sent by email, social media, or other electronic communication means 8) Spyware Spyware is any software that installs itself on the computer and starts overly monitoring our online behaviour without our knowledge or permission 9) Spamming It is sending the same message to many different people using email or messages usually as a way of advertising something
  • 9. Cybercrime rate  29.9 million people fell victim to cybercrime  17% of adults have experienced cybercrime on their mobile phone through social media  4 billion dollars in direct financial loss  To resolve these problems about 3.6 billion have been spent
  • 10. Punishments for cybercrime in India IPC sections Crimes punishments 66 Hacking with computer system Imprisonment of up to 3 years and a fine of up to 5,00,000 66C Using passwords of others (Phishing) Imprisonment up to 3 years and fine up to 1,00,000 66D Cheating using computer resource Imprisonment up to 3 years and fine up to 1,00,000
  • 11. Cyber security Cybersecurity is the practice of defending computers, servers, mobile devices, networks, and data from malicious attacks Types of cybersecurity: To keep the data safe, it is essential to use  Antivirus  Firewalls  Password  Keep software updated  Security suite  Data backups  Cryptography
  • 12.  Antivirus: An antivirus product is a program designed to detect and remove viruses and other kinds of malicious software from our computers or system/laptop Ex: McAfree, AVG, Quick heel  Firewall: A firewall is a network security system that, monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network . It is used in the organization and companies for protecting data
  • 13.  Password: A password is a string of characters used to verify the identity of a user during an authentication process. password must be a combination of letters, numbers, and special symbols  Keep software updated: In order to get rid of cyber attacks we must keep our software updated
  • 14.  Data Backups: Backup is the process of creating a copy of the data on our system then we use for recovery in case of our original data is lost or corrupted Security suite: • A security suite is one solution designed to protect computers servers and other digital devices against cyberattacks • It is a collection of software utilizes that protects a computer from viruses and other malware • It contains a suite of firewalls, antivirus, antispyware and more
  • 15. Cryptography  Cryptography is a method of protecting information and communications through the use of codes so that those for whom the information is intended can read and process it  It is a process of encoding a message or information in such a way that only authorized parties can read it  It involves encryption and decryption processes to achieve a secure transfer of information through cryptography
  • 16. Precautionary measures to avoid cybercrimes:  Use Antivirus software and firewalls  Uninstall unnecessary software  Don’t open emails from unknown sources  Use hard-to-guess passwords. Don’t give your name and date of birth as a password so that it can be easily traced
  • 17. cont.….  Review bank and credit card statements regularly  Keep an eye on updates of your software and system  Maintain backup