SlideShare a Scribd company logo
1 of 26
CYBER THREATS AND
SECURITY
If we can defeat them sitting at
home……whoneeds to fight with tanks
and guns!!!!
Presented By
Ms. Sultana Shaikh
CONTENTS
• Cybercrime
• Cybercrimes Against an Individual Person
• Cybercrimes Against Property
• Cybercrimes Against
Organisation/Society
• Cyber Security
INTRODUCTION
The internet in India is growing rapidly. It has
given rise to new opportunities in every field we can
think of, be it entertainment, business, sports or
education.
There’re two sides to a coin. Internet also has its
own disadvantages which Cyber crime- Any illegal
activity committed on the internet.
DEFININGCYBERCRIME
 Crime committed using a computer and the
internet to steal data or information.
 Illegal imports
 Theft of Email id and password
 Credit card thefts
 Extracting mobile data
 Fake messages,etc.
Cyber crime
IS NOTHING BUT WHERE
THE COMPUTER USED AS AN
OBJECT OR SUBJECT OF CRIME..
HISTORY
• The first recorded cyber crime took place
in the year 1820.
TYPES OF CYBER CRIME
 Cybercrimes Against an Individual
Person
 Cybercrimes Against Property
 Cybercrimes Against
Organisation/Society
CYBERCRIMES AGAINST AN INDIVIDUAL PERSON
• Email Spoofing – Receiver is fooled to believe that the message
is from trusted source.
• Cyber Stalking – Attacker harasses or humiliate a person by
false messages, threaten the family.
• Cyber Bullying – Harming and threating the person by posting
embarrassing content on the internet or social sites and torturing
the person mentally leading to the significant loss.
KNOW THE FACT
• STUDENTS VIEW
CYBERCRIMES AGAINST PROPERTY
• Identity Theft – Misusing or stealing person’s personal
information by hacking the network or placing software in
computer.
• Phishing – Sending an email misleading to believe the
message from the trusted source and diverting to the fake
website where the user enters his credentials(Eg. Winning
lottery)
• Pharming – Piece of malicious program is installed in a
computer which misdirects the user to the fraudulent sites
without their knowledge.
CYBERCRIMES AGAINST ORGANISATION/SOCIETY
• Transmitting Viruses
• Cyber Vandalism
• Hacking
• Child Pornography
• Cyber Squatting
• Forgery
• Cyber Extortion
• Cyber Terrorism
TRANSMITTING VIRUSES
Types of Viruses 
• Boot Sector Virus – It damages the boot sector of a hard
disc which manages the reading and loading of OS gets
activated at the time of booting.
• Program File Virus – It destroys executable file and
damages the computer while installing these
files(.com,.exe,.ovl,.drv,.sys,etc.). It gets active replicate
itself and infect the files permanently.
A computer virus is a set of programs that disrupts the
normal functioning of a computer by damaging its data.
• VIRUS – “Vital Information Resources Under Seize”
• Multipartite Virus – Its a hybrid of Boot
sector and Program file virus. It gets entry
into system through some infected media
and then resides inside the computer
memory. It moves to hard disc and infects
the executable files.
• Polymorphic Virus – It changes its forms
every time it runs to hide from antivirus
program.
• Network Virus – It spreads through the LAN
or Internet. It spreads through shared drives
or folders, files, etc. It destroys one
computer and moves to the next and
repeats cycle.
• Macro Virus – It infects application files such
as Word, PowerPoint, Excel. Once this virus
gets activated in your computer, every file
you access will be corrupted.
CYBER VANDALISM
• Creation of malicious program to perform
harmful tasks.
• It also involves editing an online content in a
malicious manner so as to defame a website
or disrupt a business.
• Damaging or destroying data
rather than stealing.
HACKING
• Hacking in simple terms means an illegal
intrusion(entry) into a computer system and/or
network.
• Hackers writes or use the readymade
programs to attack the target computer and
steal the information.
• It refers to the act of using the goodwill
of a trademark belonging to someone
else and to get benefit out of it.
CYBER SQUATTING
FORGERY
• It is an act of making a false copy of a
document or making any false certificate
to perform illegal means.
CYBER EXTORTION
• In this the victim is attacked first and then
demanded a money to stop the further attacks.
CYBER TERRORISM
• Use of Internet based attacks in terrorist activities
to create fear and panic in the name of religion or
politics to attack the defence system.
SAFETY TIPS FOR CYBERCRIME
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a
genderless screen name.
• Never give your full name or
address to strangers.
• Learn more about Internet
privacy.
CYBERSECURITY
• Cyber security is a collection of technologies,
processes and practices designed to protect
networks, computers, programs, data from attack
, damage or unauthorised access:
ANTIVIRUS
• Antivirus is a computer program designed to identify,
prevent and remove viruses from a computer.
• It scans the computer files to look for known viruses from
virus dictionary.
• Identifies suspicious behaviour of any computer program
which indicate infection.
• Scans incoming data which contains data in an
attachment.
• For Eg: McAfee, AVG Antivirus,
Quick Heal, Microsoft Security
Essentials, Symantec Norton.
FEATURES OF ANTIVIRUS
FEATURES OF ANTIVIRUS
FIREWALL
• Firewall is a security system that protects your computer
by preventing unauthorised users from gaining access to it
through network or internet.
• It can either be hardware or software or combination of
both.
• It has certain set of rules based on which it controls the
incoming and outgoing network traffic.
ENCRYPTION SOFTWARE
• Biometrics
• Passwords
• Backups
• Cookies
CONCLUSION
Technology is destructive only in the hands of
people who do not realize that they are one
and the same process as the universe.

More Related Content

What's hot

Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber SafetyHarsh Tekriwal
 

What's hot (20)

Malware ppt
Malware pptMalware ppt
Malware ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber security
cyber securitycyber security
cyber security
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
MALWARE
MALWAREMALWARE
MALWARE
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 

Similar to Grade 7 Chap 10 Cyber Threats and Security

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measuresshraddhazad
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Cyber security & Cyber Crime
Cyber security & Cyber CrimeCyber security & Cyber Crime
Cyber security & Cyber CrimeVISHNUVNAIR13
 
Cybercrime
CybercrimeCybercrime
CybercrimeFraz Ali
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfAlefya1
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethicssamina khan
 

Similar to Grade 7 Chap 10 Cyber Threats and Security (20)

CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber security
Cyber security Cyber security
Cyber security
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
cyber security
cyber security cyber security
cyber security
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber security & Cyber Crime
Cyber security & Cyber CrimeCyber security & Cyber Crime
Cyber security & Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdf
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 

Recently uploaded

Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 

Recently uploaded (20)

Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 

Grade 7 Chap 10 Cyber Threats and Security

  • 1. CYBER THREATS AND SECURITY If we can defeat them sitting at home……whoneeds to fight with tanks and guns!!!! Presented By Ms. Sultana Shaikh
  • 2. CONTENTS • Cybercrime • Cybercrimes Against an Individual Person • Cybercrimes Against Property • Cybercrimes Against Organisation/Society • Cyber Security
  • 3. INTRODUCTION The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of, be it entertainment, business, sports or education. There’re two sides to a coin. Internet also has its own disadvantages which Cyber crime- Any illegal activity committed on the internet.
  • 4. DEFININGCYBERCRIME  Crime committed using a computer and the internet to steal data or information.  Illegal imports  Theft of Email id and password  Credit card thefts  Extracting mobile data  Fake messages,etc.
  • 5. Cyber crime IS NOTHING BUT WHERE THE COMPUTER USED AS AN OBJECT OR SUBJECT OF CRIME..
  • 6. HISTORY • The first recorded cyber crime took place in the year 1820.
  • 7. TYPES OF CYBER CRIME  Cybercrimes Against an Individual Person  Cybercrimes Against Property  Cybercrimes Against Organisation/Society
  • 8. CYBERCRIMES AGAINST AN INDIVIDUAL PERSON • Email Spoofing – Receiver is fooled to believe that the message is from trusted source. • Cyber Stalking – Attacker harasses or humiliate a person by false messages, threaten the family. • Cyber Bullying – Harming and threating the person by posting embarrassing content on the internet or social sites and torturing the person mentally leading to the significant loss.
  • 9. KNOW THE FACT • STUDENTS VIEW
  • 10. CYBERCRIMES AGAINST PROPERTY • Identity Theft – Misusing or stealing person’s personal information by hacking the network or placing software in computer. • Phishing – Sending an email misleading to believe the message from the trusted source and diverting to the fake website where the user enters his credentials(Eg. Winning lottery) • Pharming – Piece of malicious program is installed in a computer which misdirects the user to the fraudulent sites without their knowledge.
  • 11. CYBERCRIMES AGAINST ORGANISATION/SOCIETY • Transmitting Viruses • Cyber Vandalism • Hacking • Child Pornography • Cyber Squatting • Forgery • Cyber Extortion • Cyber Terrorism
  • 12. TRANSMITTING VIRUSES Types of Viruses  • Boot Sector Virus – It damages the boot sector of a hard disc which manages the reading and loading of OS gets activated at the time of booting. • Program File Virus – It destroys executable file and damages the computer while installing these files(.com,.exe,.ovl,.drv,.sys,etc.). It gets active replicate itself and infect the files permanently. A computer virus is a set of programs that disrupts the normal functioning of a computer by damaging its data. • VIRUS – “Vital Information Resources Under Seize”
  • 13. • Multipartite Virus – Its a hybrid of Boot sector and Program file virus. It gets entry into system through some infected media and then resides inside the computer memory. It moves to hard disc and infects the executable files. • Polymorphic Virus – It changes its forms every time it runs to hide from antivirus program.
  • 14. • Network Virus – It spreads through the LAN or Internet. It spreads through shared drives or folders, files, etc. It destroys one computer and moves to the next and repeats cycle. • Macro Virus – It infects application files such as Word, PowerPoint, Excel. Once this virus gets activated in your computer, every file you access will be corrupted.
  • 15. CYBER VANDALISM • Creation of malicious program to perform harmful tasks. • It also involves editing an online content in a malicious manner so as to defame a website or disrupt a business. • Damaging or destroying data rather than stealing.
  • 16. HACKING • Hacking in simple terms means an illegal intrusion(entry) into a computer system and/or network. • Hackers writes or use the readymade programs to attack the target computer and steal the information.
  • 17. • It refers to the act of using the goodwill of a trademark belonging to someone else and to get benefit out of it. CYBER SQUATTING FORGERY • It is an act of making a false copy of a document or making any false certificate to perform illegal means.
  • 18. CYBER EXTORTION • In this the victim is attacked first and then demanded a money to stop the further attacks. CYBER TERRORISM • Use of Internet based attacks in terrorist activities to create fear and panic in the name of religion or politics to attack the defence system.
  • 19. SAFETY TIPS FOR CYBERCRIME • Use antivirus software’s. • Insert firewalls. • Uninstall unnecessary software • Maintain backup. • Check security settings. • Stay anonymous - choose a genderless screen name. • Never give your full name or address to strangers. • Learn more about Internet privacy.
  • 20. CYBERSECURITY • Cyber security is a collection of technologies, processes and practices designed to protect networks, computers, programs, data from attack , damage or unauthorised access:
  • 21. ANTIVIRUS • Antivirus is a computer program designed to identify, prevent and remove viruses from a computer. • It scans the computer files to look for known viruses from virus dictionary. • Identifies suspicious behaviour of any computer program which indicate infection. • Scans incoming data which contains data in an attachment. • For Eg: McAfee, AVG Antivirus, Quick Heal, Microsoft Security Essentials, Symantec Norton.
  • 24. FIREWALL • Firewall is a security system that protects your computer by preventing unauthorised users from gaining access to it through network or internet. • It can either be hardware or software or combination of both. • It has certain set of rules based on which it controls the incoming and outgoing network traffic.
  • 25. ENCRYPTION SOFTWARE • Biometrics • Passwords • Backups • Cookies
  • 26. CONCLUSION Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.