Cyber Crime and Security

-PRESENTED BY
Meghana mudunuru
 Crime committed using a computer and the
internet to steal a person’s identity or illegal
imports or malicious programs.
 Cybercrime is nothing but where the
computer used as an object or subject of
crime .
 The first recorded cyber crime took place in the
year 1820. That is not surprising considering
the fact that the abacus, which is thought to be
the earliest form of a computer, has been
around since 3500 B.C
 The first spam email took place in 1976 when it
was sent out over the ARPANET.
 The first virus was installed on an Apple
computer in 1982 when a high school student ,
Richard Skrenta(15yrs), developed the ELK
Cloner.
 The computer as a target :- using a computer to
attacks other computer, e.g. Hacking,
virus/worms attacks etc.
 The computer as a weapon :- using a computer
to commit real world crime e.g. cyber
terrorism, credit card fraud etc.
 HACKING: Hacking in simple terms
means an illegal intrusion into a computer
system and/or network.
 DENIAL OF SERVICE ATTACK :
This is an act by the criminal, who floods the
bandwidth of the victims network or fills his
e-mail box with spam mail depriving him of
the services he is entitled to access or provide.
 VIRUS DISSEMINITION: Malicious
software that attaches itself to other software.
(virus, worms, Trojan Horse, web jacking, e-mail
bombing etc)
 COMPUTER VANDALISM : Damaging or
destroying data rather than stealing or misusing
them is called cyber vandalism. Transmitting
virus: These are programs that attach
themselves to a file and then circulate .
 CYBER TERRORISM : Terrorist attacks
on the Internet is by distributed denial of
service attacks, hate websites and hate
emails, attacks on sensitive computer
networks, etc. Technology savvy terrorists
are using 512-bit encryption, which is
impossible to decrypt.
 SOFTWARE PIRACY : Theft of software
through the illegal copying of genuine
programs or the counterfeiting and
distribution of products intended to
pass for the original.
Cyber Crime and Security
 Cyber Security involves protection of sensitive personal and
business information through prevention, detection and
response to different online attacks.
 Privacy Policy : Before submitting your name , e-mail ,
address, on a website look for the sites privacy policy.
 Keep Software Up to Date: If the seller reduces patches for the
software operating system of your device ,install them as soon
as possible .Installing them will prevent attackers form being
able to take advantage.
 Use good password which will be difficult for thieves to guess.
Do not choose option that allows your computer to remember
your passwords.
 The cyber security will defend us from critical attacks.
 It helps us to browse the site, website.
 Internet Security process all the incoming and outgoing data
on your computer.
 It will defend us from hacks and virus.
 Application of cyber security used in our PC needs update
every week
 Use antivirus Software
 Insert Firewalls
 Maintain backup
 Check security settings
 Use strong passwords
 Uninstall unnecessary software
 Never give your personal information to
strangers
Cybercrime is indeed getting the
recognition it deserves. However, it is not
going to restricted that easily . In fact , it is
likely that cyber crime and its hackers will
continue developing and upgrading to stay
ahead of the law. So, to make us safer we
must need cyber security. The only system
which is truly secure is one which is
switched off and unplugged .So , only way
to be safe is Pay attention and Act smart.
Thank you
Any queries ?
1 sur 12

Recommandé

Cyber security par
Cyber securityCyber security
Cyber securityManjushree Mashal
3.2K vues41 diapositives
CYBER SECURITY par
CYBER SECURITYCYBER SECURITY
CYBER SECURITYMohammad Shakirul islam
1.8K vues32 diapositives
Cyber crime and security par
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
2.5K vues22 diapositives
Cyber security presentation par
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
8.7K vues10 diapositives
Cyber Security Presentation par
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
4.2K vues8 diapositives
Cyber Security 03 par
Cyber Security 03Cyber Security 03
Cyber Security 03Home
945 vues23 diapositives

Contenu connexe

Tendances

Cyber Security A Challenges For Mankind par
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
1.6K vues23 diapositives
Cyber Security par
Cyber SecurityCyber Security
Cyber SecurityVivek Agarwal
11.1K vues22 diapositives
Cybersecurity par
CybersecurityCybersecurity
CybersecurityForam Gosai
1.8K vues30 diapositives
cyber security par
cyber securitycyber security
cyber securityBasineniUdaykumar
3.3K vues10 diapositives
Cyber Crime par
Cyber CrimeCyber Crime
Cyber CrimeRamesh Upadhaya
2.3K vues19 diapositives
CYBER SECURITY par
CYBER SECURITYCYBER SECURITY
CYBER SECURITYPranjalShah18
1.1K vues22 diapositives

Tendances(20)

Cyber Security A Challenges For Mankind par Saurabh Kheni
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni1.6K vues
Cyber security system presentation par A.S. Sabuj
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj2.2K vues
Cyber crime and Security par Hussain777
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777823 vues
Introduction to cyber security amos par Amos Oyoo
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo3.1K vues
Cyber crime ppt par MOE515253
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253344.1K vues
Cyber security par Pihu Goel
Cyber securityCyber security
Cyber security
Pihu Goel3.9K vues
Cyber threats par kelsports
Cyber threatsCyber threats
Cyber threats
kelsports10.4K vues

Similaire à Cyber Crime and Security

Cybercrime the emerging threat par
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
1.3K vues25 diapositives
Computer crime par
Computer crimeComputer crime
Computer crimeVishesh Dalal
883 vues18 diapositives
Research paper on cyber security. par
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
13.6K vues5 diapositives
presentation on cyber crime and security par
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
35.4K vues26 diapositives
Cyber crime and security par
Cyber crime and security Cyber crime and security
Cyber crime and security BasitShah18
195 vues26 diapositives
Cyber Crime par
Cyber Crime Cyber Crime
Cyber Crime Kush Rathod
68 vues10 diapositives

Similaire à Cyber Crime and Security(20)

Cybercrime the emerging threat par ANKUR BAROT
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT1.3K vues
Research paper on cyber security. par Hussain777
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
Hussain77713.6K vues
presentation on cyber crime and security par Alisha Korpal
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal35.4K vues
Cyber crime and security par BasitShah18
Cyber crime and security Cyber crime and security
Cyber crime and security
BasitShah18195 vues
Cyber crime and security 1 par indhuchezhian
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian10.4K vues
Cybercrime.ppt par Aeman Khan
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan728.7K vues
Cyber security par RIPPER95
Cyber securityCyber security
Cyber security
RIPPER9580 vues
CYBER CRIME AWARENESS (Thematic Presentation) par AFROZULLA KHAN Z
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
AFROZULLA KHAN Z349 vues
Cyber Crime par zahid_ned
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned1.5K vues

Dernier

The Dark Web : Hidden Services par
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
16 vues24 diapositives
ATPMOUSE_융합2조.pptx par
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptxkts120898
35 vues70 diapositives
Affiliate Marketing par
Affiliate MarketingAffiliate Marketing
Affiliate MarketingNavin Dhanuka
18 vues30 diapositives
hamro digital logics.pptx par
hamro digital logics.pptxhamro digital logics.pptx
hamro digital logics.pptxtupeshghimire
10 vues36 diapositives
Marketing and Community Building in Web3 par
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
15 vues64 diapositives
How to think like a threat actor for Kubernetes.pptx par
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxLibbySchulze1
7 vues33 diapositives

Dernier(6)

The Dark Web : Hidden Services par Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh16 vues
ATPMOUSE_융합2조.pptx par kts120898
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptx
kts12089835 vues
Marketing and Community Building in Web3 par Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast15 vues
How to think like a threat actor for Kubernetes.pptx par LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze17 vues

Cyber Crime and Security

  • 2.  Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs.  Cybercrime is nothing but where the computer used as an object or subject of crime .
  • 3.  The first recorded cyber crime took place in the year 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C  The first spam email took place in 1976 when it was sent out over the ARPANET.  The first virus was installed on an Apple computer in 1982 when a high school student , Richard Skrenta(15yrs), developed the ELK Cloner.
  • 4.  The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks etc.  The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud etc.
  • 5.  HACKING: Hacking in simple terms means an illegal intrusion into a computer system and/or network.  DENIAL OF SERVICE ATTACK : This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.  VIRUS DISSEMINITION: Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc)
  • 6.  COMPUTER VANDALISM : Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate .  CYBER TERRORISM : Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.  SOFTWARE PIRACY : Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 8.  Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks.  Privacy Policy : Before submitting your name , e-mail , address, on a website look for the sites privacy policy.  Keep Software Up to Date: If the seller reduces patches for the software operating system of your device ,install them as soon as possible .Installing them will prevent attackers form being able to take advantage.  Use good password which will be difficult for thieves to guess. Do not choose option that allows your computer to remember your passwords.
  • 9.  The cyber security will defend us from critical attacks.  It helps us to browse the site, website.  Internet Security process all the incoming and outgoing data on your computer.  It will defend us from hacks and virus.  Application of cyber security used in our PC needs update every week
  • 10.  Use antivirus Software  Insert Firewalls  Maintain backup  Check security settings  Use strong passwords  Uninstall unnecessary software  Never give your personal information to strangers
  • 11. Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily . In fact , it is likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us safer we must need cyber security. The only system which is truly secure is one which is switched off and unplugged .So , only way to be safe is Pay attention and Act smart.