SlideShare une entreprise Scribd logo
1  sur  18
 What is Cyber Crime

 Categorize of Cyber Crime

 Types of Cyber Attacks

 Security

 Personal Measures
 Criminal acts using Computers
  and networks as tools or targets.


 Cybercrime can be directed
  towards persons, companies,
  or government authorities.
 HACKING

 DENIAL OF SERVICE ATTACK

 COMPUTER VANDALISM

 CYBER TERRORISM

 SOFTWARE PIRACY
 Hacking in simple terms means an
  illegal intrusion into a computer system
  and/or network. It is also known as
  CRACKING.


 Motive behind the crime : Adventure,
  Revenge, Greed, Desire to access
  forbidden information, Publicity.

 Government websites are the hot targets
  of the hackers due to the press coverage
  it receives.
 This is an act that ceases the
  functioning of a service or program
  by sending malicious datagrams
  that can even cause the network
  connections to fail.

 For example: The criminal fills
  victim’s e-mail box with spam mail
  depriving him of the services he is
  entitled to access or provide.
 Damaging or destroying data rather than stealing or misusing them
  by making malicious software termed as Malwares.

 People who make malicious software are called Malware writers.

 Types of Malwares are Viruses,Worms,Trojan Horse.
 Targeted attacks on military installations, power plants, air traffic
  control, banks, telecommunication networks.

 Cyber terrorism is an attractive option for modern terrorists for
  several reasons:
    1) Cheaper and more anonymous than traditional terrorist methods.
    2) Variety and number of targets are enormous.
    3) Crime can be conducted remotely.
    4) Has the potential to affect directly a larger number of people.
Theft of software through the illegal
copying of genuine programs
               Or
the counterfeiting and distribution
of products intended to pass for the
original.
 Use virus detection software that is regularly
  updated.

 Password protected screen savers.

 Secure physical set-up that is not open to the
  public or unmonitored.

 Require network logins if you are on a network.

 Standardize the desktop so as to limit what an
  end-user can and cannot do.
 The server should be kept in a locked and
  restricted area.

 Administrative passwords and equivalencies
  should be given to a minimal number of
  people.

 Administrative passwords should be changed
  regularly.

 Users should only be given access to file
  systems that they will actually need to use.

 Use of virus detection software that is
  regularly updated.
 Use of Firewalls :

Firewalls are a system or combination of
systems that supports an access control
policy between two networks.
     A firewall can limit the types of
transactions that enter a system, as well as the
types of transactions that leave a system.


 Use of powerful Encryption Techniques:

Provides secured transactions over the
internet. Ex: Public Key Cryptography
Uninstall unnecessary software .

Check security settings.

Use a powerful antivirus software
 and update it regularly.

Back-up your computer data on disks or CDs often.

Keep your operating system up to date with critical security
updates .
While using Internet:

Log-out and login on your accounts each day.

Disable unused accounts.

Change passwords of your accounts at least every 30 days.

Never give your full name or address to strangers on Internet.

Avoid sending any photograph online particularly to strangers.

Don't open emails or attachments from unknown sources.

Never send your credit card number to any site that is not secure.
Cyber Crime and Security

Contenu connexe

Tendances

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

Tendances (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similaire à Cyber Crime and Security

Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 

Similaire à Cyber Crime and Security (20)

Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
cyber security
cyber security cyber security
cyber security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Computer security
Computer securityComputer security
Computer security
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 

Plus de Sanguine_Eva (7)

BERMUDA TRIANGLE
BERMUDA TRIANGLEBERMUDA TRIANGLE
BERMUDA TRIANGLE
 
JDEdwards E1 Security
JDEdwards E1 SecurityJDEdwards E1 Security
JDEdwards E1 Security
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
26/11 MUMBAI
26/11 MUMBAI26/11 MUMBAI
26/11 MUMBAI
 
Area 51
Area 51Area 51
Area 51
 
DNS server configuration
DNS server configurationDNS server configuration
DNS server configuration
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Cyber Crime and Security

  • 1.
  • 2.  What is Cyber Crime  Categorize of Cyber Crime  Types of Cyber Attacks  Security  Personal Measures
  • 3.  Criminal acts using Computers and networks as tools or targets.  Cybercrime can be directed towards persons, companies, or government authorities.
  • 4.
  • 5.  HACKING  DENIAL OF SERVICE ATTACK  COMPUTER VANDALISM  CYBER TERRORISM  SOFTWARE PIRACY
  • 6.  Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING.  Motive behind the crime : Adventure, Revenge, Greed, Desire to access forbidden information, Publicity.  Government websites are the hot targets of the hackers due to the press coverage it receives.
  • 7.  This is an act that ceases the functioning of a service or program by sending malicious datagrams that can even cause the network connections to fail.  For example: The criminal fills victim’s e-mail box with spam mail depriving him of the services he is entitled to access or provide.
  • 8.  Damaging or destroying data rather than stealing or misusing them by making malicious software termed as Malwares.  People who make malicious software are called Malware writers.  Types of Malwares are Viruses,Worms,Trojan Horse.
  • 9.  Targeted attacks on military installations, power plants, air traffic control, banks, telecommunication networks.  Cyber terrorism is an attractive option for modern terrorists for several reasons: 1) Cheaper and more anonymous than traditional terrorist methods. 2) Variety and number of targets are enormous. 3) Crime can be conducted remotely. 4) Has the potential to affect directly a larger number of people.
  • 10. Theft of software through the illegal copying of genuine programs Or the counterfeiting and distribution of products intended to pass for the original.
  • 11.
  • 12.  Use virus detection software that is regularly updated.  Password protected screen savers.  Secure physical set-up that is not open to the public or unmonitored.  Require network logins if you are on a network.  Standardize the desktop so as to limit what an end-user can and cannot do.
  • 13.  The server should be kept in a locked and restricted area.  Administrative passwords and equivalencies should be given to a minimal number of people.  Administrative passwords should be changed regularly.  Users should only be given access to file systems that they will actually need to use.  Use of virus detection software that is regularly updated.
  • 14.  Use of Firewalls : Firewalls are a system or combination of systems that supports an access control policy between two networks. A firewall can limit the types of transactions that enter a system, as well as the types of transactions that leave a system.  Use of powerful Encryption Techniques: Provides secured transactions over the internet. Ex: Public Key Cryptography
  • 15.
  • 16. Uninstall unnecessary software . Check security settings. Use a powerful antivirus software and update it regularly. Back-up your computer data on disks or CDs often. Keep your operating system up to date with critical security updates .
  • 17. While using Internet: Log-out and login on your accounts each day. Disable unused accounts. Change passwords of your accounts at least every 30 days. Never give your full name or address to strangers on Internet. Avoid sending any photograph online particularly to strangers. Don't open emails or attachments from unknown sources. Never send your credit card number to any site that is not secure.