Cyber Crime and Security Presentation

P
Preethi KumareshStudent at Meenakshi College For Women
Cyber Crime and Security Presentation
Cyber Crime and Security Presentation
 Introduction
 Definition
 History
 Categories of Cyber crime
 Types of Cyber crime
 Case Studies
 Statistical Report
 Prevention
 Security
 Conclusion
 The Internet in India is growing rapidly. It has
given rise to new opportunities in every field
such as entertainment , business , education or
sports.
 There are two sides to a coin. INTERNET also
has its disadvantages like CYBER CRIME –
Illegal activity committed on the Internet.
DEFINITION :
 Crime committed using a
Computer and the Internet to
steal Data or Information.
 Illegal imports
 Malicious programs
 The first SPAM email took place in 1978 when it was
sent out over ARPANET.
 ARPANET : Advanced Research Projects Agency
Network
 Like spam the first VIRUS was installed on an Apple
Computer in 1982.
 A 16-year old student was arrested in UK in 1994 for
doing this crime.
Cyber Crime and Security Presentation
 The computer as a target
 The computer as a weapon
 Hacking
 Identity theft
 Malicious software
 Computer vandalism
 Cyber terrorism
 Software piracy
• Hacking in simple terms means an illegal intrusion into a
computer system or network.
• In many organizations they have to check their Internet
security protection. If not the hacking criminal uses a variety
of software to enter a person’s computer and the person may
not be aware that his computer is being accessed from a
remote location.
• This has become a major problem with people using the Internet for cash
transactions and banking services.
• In this cyber crime, a criminal accesses data about a person’s bank
account, credit cards, Social Security, debit card and other sensitive
information to siphon money or to buy things online in the victim’s name.
• It can result in major financial losses for the victim and even spoil the
victim’s credit history.
• Malicious software that attaches itself to other software.
(Virus, worms, Trojan Horse , web-jacking, email bombing
etc)
• This type of software's employed for you to gain access to a
system for you to take delicate information or even data or
even triggering the destruction of software program contained
in the machine.
 Damaging or destroying the data rather than stealing or
misusing.
 Transmitting virus.
• Use of internet based attacks in terrorists activities
against computers/networks with the intension of
causing harm.
• Cyber terrorism can also include attacks on Internet
business, but when this is done for economic
motivations rather than ideological.
Software piracy is the unauthorized or illegal
copying, distribution, or use of software. It is such a
profitable “Business" that it has caught the
attention of organized crime groups in a number of
countries.
1. CREATING FAKE PROFILE : Fake Profiles use
is common in Students. Many cases have been
registered against Fake Profiles in Cyber Cell.
2. PASSWORD HACKING : Students are taking
cyber crimes just for fun or carrying out small acts
such as password hacking to revenge on their
teachers , friends in schools an also Morphing
pictures and posting them on social networking
sites to defame others.
3. PHISHING: Phishing is the act of attempting to
acquire information such as username, passwords
and credit card details. Phishing emails may
contain links to the websites that are infected with
malware.
4. Resent News where Government is taking Action
Against Websites Spreading Hatred : Terrorist
Originations like Al-Qaeeda, ISIS and Boko
Haram have been making use of the Social Media
creating hatred and divide.
Cyber Crime and Security Presentation
1791
2879
5693
9622
11292
2011 2012 2013 2014 2015
Pending cases across country
o Use Anti-virus software.
o Insert Firewalls.
o Uninstall unnecessary software
o Maintain Backup
o Check security settings
o Stay Anonymous - choose a genderless screen
name.
o Never give your full name or address to strangers.
o Learn more about Internet Privacy.
Cyber Crime and Security Presentation
 Internet security is a branch of computer security
specifically related to the internet.
 Its objective is to establish rules and measures to use
against attacks over the internet.
 Defend us from Critical Attacks.
 Browses the safe websites.
 Internet security process in all the incoming and
outgoing data on our computer.
Technology is destructive only in the hands of people
who do not realize that they are the one and the same
process as the universe.
Presented by,
Sri Vidhya
Bhagya Lakshmi
Saranya
Soundarya
Poojaa
Kiruthika
Priyamahalakshmi
Preethi
Valli ammai
Srinidhi
Cyber Crime and Security Presentation
1 sur 26

Recommandé

Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
4.9K vues17 diapositives
Cyber securityCyber security
Cyber securityHarsh verma
13.6K vues11 diapositives
Cyber CrimeCyber Crime
Cyber CrimeAvinash Rajput
6.4K vues49 diapositives
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
602.4K vues22 diapositives
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
8.7K vues25 diapositives

Contenu connexe

Tendances

Cyber-crime PPTCyber-crime PPT
Cyber-crime PPTAnshuman Tripathi
216.8K vues19 diapositives
presentation on hackingpresentation on hacking
presentation on hackingAyush Upadhyay
53.9K vues19 diapositives
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
727.6K vues20 diapositives
CyberCrimesCyberCrimes
CyberCrimesFettah Kurtulus
7.2K vues19 diapositives
Cyber SecurityCyber Security
Cyber SecurityVivek Agarwal
10.8K vues22 diapositives

Tendances(20)

Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi216.8K vues
presentation on hackingpresentation on hacking
presentation on hacking
Ayush Upadhyay53.9K vues
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan727.6K vues
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus7.2K vues
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal10.8K vues
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj2.5K vues
Cyber security pptCyber security ppt
Cyber security ppt
DebrajKarmakar25.1K vues
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra79.2K vues
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire22.4K vues
Cyber crimeCyber crime
Cyber crime
Grant Thornton Bangladesh1.9K vues
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela57.6K vues
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah46.5K vues
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed39.8K vues
CYBER CRIMECYBER CRIME
CYBER CRIME
Kunal Sinha1.8K vues
cyber crimecyber crime
cyber crime
Mosuud jilani lipon13K vues
Cyber crimesCyber crimes
Cyber crimes
Parveen Bala426 vues
Cyber crime and securityCyber crime and security
Cyber crime and security
Eng. Shuaib ibrahim37.5K vues
Cyber crime Cyber crime
Cyber crime
Jayant Raj2.8K vues
Cyber securityCyber security
Cyber security
Siblu28667.6K vues

En vedette

Cyber Security TermsCyber Security Terms
Cyber Security TermsSuryaprakash Nehra
1.5K vues27 diapositives
PptPpt
PptGeetu Khanna
1.8K vues18 diapositives
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
436 vues51 diapositives

En vedette(20)

Cyber Security TermsCyber Security Terms
Cyber Security Terms
Suryaprakash Nehra1.5K vues
PptPpt
Ppt
Geetu Khanna1.8K vues
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy8K vues
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
Jeremy Quadri436 vues
CybercrimeCybercrime
Cybercrime
Komal003740 vues
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
Anand Kater634 vues
Cyber CrimeCyber Crime
Cyber Crime
Pragnesh Ghoda1.2K vues
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
Nikhil Chaudhary26.8K vues
cyber crimecyber crime
cyber crime
Saba MuShtaq2.3K vues
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman2.9K vues
Cyber Crime Cyber Crime
Cyber Crime
Maruti Nandan2.9K vues
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
Awais Shibli1.2K vues
Cyber CrimeCyber Crime
Cyber Crime
Darshan Vithani5.1K vues
Cyber securityCyber security
Cyber security
vishakha bhagwat4.5K vues
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
Jay Visavadiya8.7K vues
Cyber CrimeCyber Crime
Cyber Crime
Harshitha Rao1.2K vues

Similaire à Cyber Crime and Security Presentation

Cyber CrimeCyber Crime
Cyber Crimezahid_ned
1.5K vues17 diapositives
Computer crimeComputer crime
Computer crimeVishesh Dalal
883 vues18 diapositives
CybercrimesCybercrimes
CybercrimesFit Tri
461 vues20 diapositives
Cyber CrimeCyber Crime
Cyber CrimeAlisha Jain
1.8K vues21 diapositives

Similaire à Cyber Crime and Security Presentation(20)

Cyber CrimeCyber Crime
Cyber Crime
zahid_ned1.5K vues
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
BigBoss64782222 vues
Computer crimeComputer crime
Computer crime
Vishesh Dalal883 vues
CybercrimesCybercrimes
Cybercrimes
Fit Tri461 vues
Cyber CrimeCyber Crime
Cyber Crime
Alisha Jain1.8K vues
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
ThanmayiK2226671610156 vues
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
KoukiGaz6 vues
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
sunanditaAnand3.1K vues
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
Priya Saluja3.9K vues
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta247 vues
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
Hussain77713.6K vues
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir660 vues
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
TanviModi1478 vues
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777818 vues
Cyber crime and security Cyber crime and security
Cyber crime and security
BasitShah18195 vues
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
NehaRohtagi110.8K vues
cybercreme.pptxcybercreme.pptx
cybercreme.pptx
hichamelhirch4 vues
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj846 vues
CYBER.pptxCYBER.pptx
CYBER.pptx
hichamelhirch5 vues

Dernier(20)

[2023] Putting the R! in R&D.pdf[2023] Putting the R! in R&D.pdf
[2023] Putting the R! in R&D.pdf
Eleanor McHugh34 vues
ThroughputThroughput
Throughput
Moisés Armani Ramírez28 vues
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)
CSUC - Consorci de Serveis Universitaris de Catalunya51 vues
Green Leaf Consulting: Capabilities DeckGreen Leaf Consulting: Capabilities Deck
Green Leaf Consulting: Capabilities Deck
GreenLeafConsulting170 vues

Cyber Crime and Security Presentation

  • 3.  Introduction  Definition  History  Categories of Cyber crime  Types of Cyber crime  Case Studies  Statistical Report  Prevention  Security  Conclusion
  • 4.  The Internet in India is growing rapidly. It has given rise to new opportunities in every field such as entertainment , business , education or sports.  There are two sides to a coin. INTERNET also has its disadvantages like CYBER CRIME – Illegal activity committed on the Internet.
  • 5. DEFINITION :  Crime committed using a Computer and the Internet to steal Data or Information.  Illegal imports  Malicious programs
  • 6.  The first SPAM email took place in 1978 when it was sent out over ARPANET.  ARPANET : Advanced Research Projects Agency Network  Like spam the first VIRUS was installed on an Apple Computer in 1982.  A 16-year old student was arrested in UK in 1994 for doing this crime.
  • 8.  The computer as a target  The computer as a weapon
  • 9.  Hacking  Identity theft  Malicious software  Computer vandalism  Cyber terrorism  Software piracy
  • 10. • Hacking in simple terms means an illegal intrusion into a computer system or network. • In many organizations they have to check their Internet security protection. If not the hacking criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location.
  • 11. • This has become a major problem with people using the Internet for cash transactions and banking services. • In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name. • It can result in major financial losses for the victim and even spoil the victim’s credit history.
  • 12. • Malicious software that attaches itself to other software. (Virus, worms, Trojan Horse , web-jacking, email bombing etc) • This type of software's employed for you to gain access to a system for you to take delicate information or even data or even triggering the destruction of software program contained in the machine.
  • 13.  Damaging or destroying the data rather than stealing or misusing.  Transmitting virus.
  • 14. • Use of internet based attacks in terrorists activities against computers/networks with the intension of causing harm. • Cyber terrorism can also include attacks on Internet business, but when this is done for economic motivations rather than ideological.
  • 15. Software piracy is the unauthorized or illegal copying, distribution, or use of software. It is such a profitable “Business" that it has caught the attention of organized crime groups in a number of countries.
  • 16. 1. CREATING FAKE PROFILE : Fake Profiles use is common in Students. Many cases have been registered against Fake Profiles in Cyber Cell. 2. PASSWORD HACKING : Students are taking cyber crimes just for fun or carrying out small acts such as password hacking to revenge on their teachers , friends in schools an also Morphing pictures and posting them on social networking sites to defame others.
  • 17. 3. PHISHING: Phishing is the act of attempting to acquire information such as username, passwords and credit card details. Phishing emails may contain links to the websites that are infected with malware. 4. Resent News where Government is taking Action Against Websites Spreading Hatred : Terrorist Originations like Al-Qaeeda, ISIS and Boko Haram have been making use of the Social Media creating hatred and divide.
  • 19. 1791 2879 5693 9622 11292 2011 2012 2013 2014 2015 Pending cases across country
  • 20. o Use Anti-virus software. o Insert Firewalls. o Uninstall unnecessary software o Maintain Backup o Check security settings o Stay Anonymous - choose a genderless screen name. o Never give your full name or address to strangers. o Learn more about Internet Privacy.
  • 22.  Internet security is a branch of computer security specifically related to the internet.  Its objective is to establish rules and measures to use against attacks over the internet.
  • 23.  Defend us from Critical Attacks.  Browses the safe websites.  Internet security process in all the incoming and outgoing data on our computer.
  • 24. Technology is destructive only in the hands of people who do not realize that they are the one and the same process as the universe.
  • 25. Presented by, Sri Vidhya Bhagya Lakshmi Saranya Soundarya Poojaa Kiruthika Priyamahalakshmi Preethi Valli ammai Srinidhi

Notes de l'éditeur

  1. Hatred : Intense dislike