SlideShare une entreprise Scribd logo
1  sur  24
Cyber Security
Presnted by :- Prabhat Choudhary
BCA 2nd Year
Year
CONTENT
2
 INTRODUCTION
 HISTORY OF CYBER CRIME
 CATEGORIES OF CYBER CRIME
 TYPES OF CYBER CRIME
 CYBER ATTACKS
 CYBER SECURITY
 CYBER LAW OF INDIA
 ADVANTAGES OF CYBER SECURITY
 STATISTICS OF CYBER CRIME
 CONCLUSION
3
INTRODUCTION
 Cyber crime is an activity done using computers and
internet. We can say that it is an unlawful acts where in
the computer either a tool or target or both.
 The term cyber security is used to refer to the security
offered through on-line services to protect your online
information.
 Cyber security refers to the body of technologies,
processes, and practices designed to protect networks,
devices, programs, and data from attack, damage, or
unauthorized access. Cyber security may also be referred
to as information technology security
4
HISTORY OF CYBERCRIME
The first recorded cyber crime took place in 1820.
That is not surprising considering the fact that the
abacus, which is thought to be the earliest from of
a computer, has been around since 3500 B.c.
In India, Japan and China, the era of modern
computer, however, began with the analytical
engine of Charles Babbage.
The first spam email took place in 1976 when it
was sent out over theARPANT.
The first virus was installed on an Apple computer
in 1982 when a high school student, Rich skrenta,
developed the EIK Cloner.
5
The computer as a target The computer as a weapon
Using a computer to
attacks other computer,
e.g. Hacking,
virus/worms attacks, Dos
attack etc.
Using a computer to
commit real world crime
e.g. cyber terrorism,
credit card fraud and
pornography etc
CATEGORIESOF CYBER CRIME
6
TYPES OF CYBERCRIME
HACKING
Hacking in simple terms means an illegal intrusion info
a computer system and/or network . It is also
known as CRACKING. Government websites are
the hot target of the hackers due to the press
coverage, it receives. Hackers enjoy the media
coverage.
Motive behind the crime called HACKERS
Motive behind the crime called hacking greed
power, publicity, revenge, adventure desire to
access forbidden information destructive mindset
wants to sell n/w security services.
7
TYPES OF CYBERCRIME
CHILD PORNOGRAPHY :
The Internet is beinghighly used by its abusers to
reach and abuse children sexually, worldwide. As
more homes have access to internet, more
children would be using the internet and more are
the chances of falling victim to the aggression of
Pedophiles.
How Do They Operate :
How do they operate Pedophiles use false
identity to trap the children , Pedophiles connect
children in various chat rooms which are used by
children to interact with other children.
8
TYPES OF CYBERCRIME
CHILD PORNOGRAPHY :
The Internet is beinghighly used by its abusers to
reach and abuse children sexually, worldwide. As
more homes have access to internet, more
children would be using the internet and more are
the chances of falling victim to the aggression of
Pedophiles.
How Do They Operate :
How do they operate Pedophiles use false
identity to trap the children , Pedophiles connect
children in various chat rooms which are used by
children to interact with other children.
9
TYPES OF CYBERCRIME
DENIAL OF SERVICE ATTACKS : This is an act by
the criminals who floods the bandwidth of the
victims network or fills his E-mail box with spam
mail depriving him of the service he is entitled to
access or provide. Many DOS attacks, such as
the ping of death and Tear drop attacks.
VIRUS DISSMINITION : Malicious software that
attaches itself to other software. VIRUS ,
WORMS, TROJAN HORSE ,WEB JACKING,
E-MAIL BOMBING etc.
COMPUTER VANDALISM : Damaging or
destroying data rather than stealing or misusing
them is called cyber vandalism. These are
program that attach themselves to a file and then
circulate.
10
TYPES OF CYBERCRIME
CYBER TERRORISM : Terrorist attacks on the
Internet is by distributed denial of service
attacks, hate websites and hate E-mails ,
attacks on service network etc.
SOFTWARE PIRACY : Theft of software
through the illegal copying of genuine
programs or the counterfeiting and
distribution of products intended to pass
for the original.
11
Cyber Attack’s
Cyber attacks are socially or politically
motivated attacks carried out primarily
through the Internet. Attacks target the
general public or national and corporate
organizations and are carried out through
the spread of malicious programs
(viruses), unauthorized web access, fake
websites, and other means of stealing
personal or institutional information from
targets of attacks, causing far-reaching
damage.
12
Types of Cyber Attack
 Password Attack
 Dos Attack
 Phishing
 Worm,Virus & Trojan Horse Attack
 SQL injection etc.
13
Password Attack
Password Attack refers to various measures
used to discover computer passwords. This
is usually accomplished by recovering
passwords from data stored in, or
transported from, a computer system.
Password cracking is done by guessing the
password or use common password.
14
DoS (Denial of Service) Attack
DOS is an attack used to deny legitimate users access
to a resource such as accessing a website, network,
emails, etc. or making it extremely slow. DoS is the
acronym for Denial of Service.
This type of attack is usually implemented by hitting
the target resource such as a web server with too many
requests at the same time. This results in the server
failing to respond to all the requests. The effect of this
can either be crashing the servers or slowing them
down.
15
Worm, Virus & Trojan Horse Attack
The skilled hackers have programming and computer
networking skills. They often use these skills to gain
access to systems. The objective of targeting an
organization would be to steal sensitive data, disrupt
business operations or physically damage computer
controlled equipment.
Trojans, viruses, and worms can be used to achieve
the above-stated objectives.
16
Cyber Attacks in india
Ransomeware Attack:-
The global Ransomeware attacks that hit
hundred of system to phishing an
dsccaningh rackets ,
At least one cybercrime was reported
every 10 minutes in India in the first six
month of 2017.
17
CYBER SECURITY
Cyber Security : Cyber Security involves protection
of sensitive personal and business information
through prevention, detection and response to
different online attacks. Cyber security actually
preventing the attacks, cyber security.
Privacy Policy : Before submitting your name ,
e-mail , address, on a website look for the sites
privacy policy.
Keep Software Up to Date: If the seller reduces patches
for the software operating system your device
,install them as soon as possible .Installing them
will prevent attackers form being able to take
advantage. Use good password which will be
difficult for thieves to guess. Do not choose option
that allows your computer to remember your
passwords.
18
CYBER SECURITY
DISABLE REMOTE CONNECTIVITY
Some PDA’s and phones are equipped
with wireless technologies, such as
Bluetooth, that can be used to connect
to other devices or computers. You
should disable these features when
they are not in use.
19
ADVANTAGES OF CYBER SECURITY
The cyber security will defend us from data attack
 It helps us to browse the site,website.
 Internet Security process all the incoming
and outgoing data on your computer.
 It will defend us from hacks and virus.
 Application of cyber security used in our PC
needs update every week
20
CYBER CRIMESTHREATENS NATIONALSECURITY
CYBER CRIMES THREATENS NATIONAL SECURIT IN INDIA
Likewise Union home minister Shivraj Patil said that
the rising level of cyber crime is an indication of
enormous threat to national security. On Google’s
social networking site orkut, facebook, have been
perplexing authorities . Fan clubs of Underworld Dons
like Dawood Ibrahim and Chhota Shakeel and other
wanted underworld dons are also doing the rounds on
orkut. There is huge potential for damage to national
security through cyber attacks. The internet is a
means for money bounding and funding terrorist
attacks in an organized manner.
21
CYBER LAW OFINDIA
Cyber crime can involve criminal activities that are
traditional in nature, such as theft, fraud, deformation and
mischief, all of which are subjected to the India Penal
code. In simple way we can say that cyber crime is
unlawful acts where in the computer is either a tool or
both.
The abuse of computer has also given birth of new age
crime that are addressed by the Information Technology
Act,2000.
22
SAFETY TIPS TOCYBERCRIME
 Use antivirusSoftware
 InsertFirewalls
 Uninstall unnecessarysoftware
 Maintainbackup
 Check securitysettings
23
CONCLUSION
Cyber crime can involve criminal activities that are
traditional in nature, such as theft, fraud, deformation and
mischief, all of which are subjected to the India Penal
code. In simple way we can say that cyber crime is
unlawful acts where in the computer is either a tool or
both.
The abuse of computer has also given birth of new age
crime that are addressed by the Information Technology
Act,2000.
THANK
YOU!
Prabhat Choudhary
7869530486
Phone
Email
Prabhat31302@gmail.com

Contenu connexe

Tendances (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 

Similaire à Cyber crime (2018 )updated

Similaire à Cyber crime (2018 )updated (20)

Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 

Dernier

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Dernier (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

Cyber crime (2018 )updated

  • 1. Cyber Security Presnted by :- Prabhat Choudhary BCA 2nd Year Year
  • 2. CONTENT 2  INTRODUCTION  HISTORY OF CYBER CRIME  CATEGORIES OF CYBER CRIME  TYPES OF CYBER CRIME  CYBER ATTACKS  CYBER SECURITY  CYBER LAW OF INDIA  ADVANTAGES OF CYBER SECURITY  STATISTICS OF CYBER CRIME  CONCLUSION
  • 3. 3 INTRODUCTION  Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts where in the computer either a tool or target or both.  The term cyber security is used to refer to the security offered through on-line services to protect your online information.  Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security
  • 4. 4 HISTORY OF CYBERCRIME The first recorded cyber crime took place in 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c. In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. The first spam email took place in 1976 when it was sent out over theARPANT. The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 5. 5 The computer as a target The computer as a weapon Using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. Using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc CATEGORIESOF CYBER CRIME
  • 6. 6 TYPES OF CYBERCRIME HACKING Hacking in simple terms means an illegal intrusion info a computer system and/or network . It is also known as CRACKING. Government websites are the hot target of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motive behind the crime called HACKERS Motive behind the crime called hacking greed power, publicity, revenge, adventure desire to access forbidden information destructive mindset wants to sell n/w security services.
  • 7. 7 TYPES OF CYBERCRIME CHILD PORNOGRAPHY : The Internet is beinghighly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of Pedophiles. How Do They Operate : How do they operate Pedophiles use false identity to trap the children , Pedophiles connect children in various chat rooms which are used by children to interact with other children.
  • 8. 8 TYPES OF CYBERCRIME CHILD PORNOGRAPHY : The Internet is beinghighly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of Pedophiles. How Do They Operate : How do they operate Pedophiles use false identity to trap the children , Pedophiles connect children in various chat rooms which are used by children to interact with other children.
  • 9. 9 TYPES OF CYBERCRIME DENIAL OF SERVICE ATTACKS : This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many DOS attacks, such as the ping of death and Tear drop attacks. VIRUS DISSMINITION : Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING etc. COMPUTER VANDALISM : Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.
  • 10. 10 TYPES OF CYBERCRIME CYBER TERRORISM : Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails , attacks on service network etc. SOFTWARE PIRACY : Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 11. 11 Cyber Attack’s Cyber attacks are socially or politically motivated attacks carried out primarily through the Internet. Attacks target the general public or national and corporate organizations and are carried out through the spread of malicious programs (viruses), unauthorized web access, fake websites, and other means of stealing personal or institutional information from targets of attacks, causing far-reaching damage.
  • 12. 12 Types of Cyber Attack  Password Attack  Dos Attack  Phishing  Worm,Virus & Trojan Horse Attack  SQL injection etc.
  • 13. 13 Password Attack Password Attack refers to various measures used to discover computer passwords. This is usually accomplished by recovering passwords from data stored in, or transported from, a computer system. Password cracking is done by guessing the password or use common password.
  • 14. 14 DoS (Denial of Service) Attack DOS is an attack used to deny legitimate users access to a resource such as accessing a website, network, emails, etc. or making it extremely slow. DoS is the acronym for Denial of Service. This type of attack is usually implemented by hitting the target resource such as a web server with too many requests at the same time. This results in the server failing to respond to all the requests. The effect of this can either be crashing the servers or slowing them down.
  • 15. 15 Worm, Virus & Trojan Horse Attack The skilled hackers have programming and computer networking skills. They often use these skills to gain access to systems. The objective of targeting an organization would be to steal sensitive data, disrupt business operations or physically damage computer controlled equipment. Trojans, viruses, and worms can be used to achieve the above-stated objectives.
  • 16. 16 Cyber Attacks in india Ransomeware Attack:- The global Ransomeware attacks that hit hundred of system to phishing an dsccaningh rackets , At least one cybercrime was reported every 10 minutes in India in the first six month of 2017.
  • 17. 17 CYBER SECURITY Cyber Security : Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks. Cyber security actually preventing the attacks, cyber security. Privacy Policy : Before submitting your name , e-mail , address, on a website look for the sites privacy policy. Keep Software Up to Date: If the seller reduces patches for the software operating system your device ,install them as soon as possible .Installing them will prevent attackers form being able to take advantage. Use good password which will be difficult for thieves to guess. Do not choose option that allows your computer to remember your passwords.
  • 18. 18 CYBER SECURITY DISABLE REMOTE CONNECTIVITY Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.
  • 19. 19 ADVANTAGES OF CYBER SECURITY The cyber security will defend us from data attack  It helps us to browse the site,website.  Internet Security process all the incoming and outgoing data on your computer.  It will defend us from hacks and virus.  Application of cyber security used in our PC needs update every week
  • 20. 20 CYBER CRIMESTHREATENS NATIONALSECURITY CYBER CRIMES THREATENS NATIONAL SECURIT IN INDIA Likewise Union home minister Shivraj Patil said that the rising level of cyber crime is an indication of enormous threat to national security. On Google’s social networking site orkut, facebook, have been perplexing authorities . Fan clubs of Underworld Dons like Dawood Ibrahim and Chhota Shakeel and other wanted underworld dons are also doing the rounds on orkut. There is huge potential for damage to national security through cyber attacks. The internet is a means for money bounding and funding terrorist attacks in an organized manner.
  • 21. 21 CYBER LAW OFINDIA Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code. In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both. The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act,2000.
  • 22. 22 SAFETY TIPS TOCYBERCRIME  Use antivirusSoftware  InsertFirewalls  Uninstall unnecessarysoftware  Maintainbackup  Check securitysettings
  • 23. 23 CONCLUSION Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code. In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both. The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act,2000.