This PowerPoint helps students to consider the concept of infinity.
Cybercrime and security.pptx
1. Cybercrime and cyber security
By
Karthik S
M.Sc Third semester
DOSR in Library and Information Science
Tumkur university
Guide
Prof. Sampath Kumar BT
DOSR in Library and Information Science
Tumkur university
2. Cyber crime
Cybercrime is any criminal activity that involves a computer,
networked device, or network.
Most cybercrime is an attack on information about
individuals, corporations, or governments.
A cybercriminal is a person who uses his skills in technology
to do malicious acts and illegal activities known as
“cybercrimes.”
3. History of Cybercrime
• The first cyber crime was recorded in the year 1820
• The first spam E-mail took place in 1978 when it was sent over the Arpanet
• The first Virus was installed on an Apple computer in 1982
4. Types of cybercrimes
1) Hacking
In general hacking refers to unauthorized entry into a
computer or a network
A hacker is a person with technical skills who breaks
codes and passwords to gain unauthorized entry to a
computer system
Hackers are mainly classified into two types
o Ethical hackers/white hat hackers
o unauthorized hackers/black hat hackers
5. 2)E-mail Bombing
An E-mail Bombing is a form of net abuse that send large volumes of
E-Mail to an address to overflow the mailbox
There are three ways to create an email bombing
Mass mailing
List linking
Zip bombing
3)Cyberstalking
Cyberstalking is the use of the internet (or)other electronic means to stalk
or harass an individual group or organization. It may include false defamation
Ex: making rude, offensive, or online comments
6. 4) Salami attack
A salami attack is a method of cybercrime that attackers or
hackers typically used to commit financial crimes
Types of salami attack
Salami slicing: It occurs when the attackers get
customers’ information like bank/credit card details by
using online databases the hackers deduct useful
elements from customers
Penny shaving: When hackers steal money in a small
amount. By using rounding to the closest within the
transaction so change is so small that nobody can detect
such dough in a single transaction
7. 5)Denial of service attack
A denial of service attack is a security threat that occurs when
an attacker makes it impossible for legitimate users to access computer
system networks or services
Attackers in these types of attacks typically flood web servers, systems, or networks with traffic that
overwhelms the victim’s resources and makes it difficult or impossible for anyone else to access them. We
might have experienced this while downloading any application from the website
6) Spreading of virus
virus are programs that attack themselves a computer or a file and usually affect the data
on a computer either by altering or deleting data
some viruses: Mydoom, ILOVEYOU, WannaCry
8. 7) Phishing
Phishing Is a type of local engineering attack often used to steal user data,
including login credentials and credit card numbers
The basic element of a phishing attack is a message sent by email, social
media, or other electronic communication means
8) Spyware
Spyware is any software that installs itself on the computer and starts overly monitoring our online
behaviour without our knowledge or permission
9) Spamming
It is sending the same message to many different people using email or messages usually as a way of
advertising something
9. Cybercrime rate
29.9 million people fell victim to
cybercrime
17% of adults have experienced
cybercrime on their mobile phone
through social media
4 billion dollars in direct financial loss
To resolve these problems about 3.6
billion have been spent
10. Punishments for cybercrime in India
IPC sections Crimes punishments
66 Hacking with computer system Imprisonment of up to 3 years
and a fine of up to 5,00,000
66C Using passwords of others
(Phishing)
Imprisonment up to 3 years and
fine up to 1,00,000
66D Cheating using computer
resource
Imprisonment up to 3 years and
fine up to 1,00,000
11. Cyber security
Cybersecurity is the practice of defending computers,
servers, mobile devices, networks, and data from malicious attacks
Types of cybersecurity: To keep the data safe, it is essential to use
Antivirus
Firewalls
Password
Keep software updated
Security suite
Data backups
Cryptography
12. Antivirus:
An antivirus product is a program designed to detect
and remove viruses and other kinds of malicious software from our
computers or system/laptop
Ex: McAfree, AVG, Quick heel
Firewall:
A firewall is a network security system that, monitors
and controls the incoming and outgoing network traffic based on
predetermined security rules. A firewall typically establishes a barrier
between a trusted network and an untrusted network . It is used in the
organization and companies for protecting data
13. Password: A password is a string of characters used to verify the identity of
a user during an authentication process. password must be a combination
of letters, numbers, and special symbols
Keep software updated: In order to get rid of cyber attacks we must keep
our software updated
14. Data Backups: Backup is the process of
creating a copy of the data on our system
then we use for recovery in case of our
original data is lost or corrupted
Security suite:
• A security suite is one solution designed to protect computers servers and
other digital devices against cyberattacks
• It is a collection of software utilizes that protects a computer from viruses
and other malware
• It contains a suite of firewalls, antivirus, antispyware and more
15. Cryptography
Cryptography is a method of protecting information and
communications through the use of codes so that those
for whom the information is intended can read and
process it
It is a process of encoding a message or information in
such a way that only authorized parties can read it
It involves encryption and decryption processes to
achieve a secure transfer of information through
cryptography
16. Precautionary measures to avoid cybercrimes:
Use Antivirus software and firewalls
Uninstall unnecessary software
Don’t open emails from unknown sources
Use hard-to-guess passwords. Don’t give your name and date of birth as a
password so that it can be easily traced
17. cont.….
Review bank and credit card statements regularly
Keep an eye on updates of your software and system
Maintain backup