CyberCrimes

Fettah Kurtulus
Fettah KurtulusSr. Software Developer à İstanbul Kültür University
Speakers :
Fettah KURTULUŞ
 Computer crime, or cybercrime, refers to any crime
 that involves a computer and a network(Internet).
 The Computer as a Target : using a computer to
 attack other computers.

 The computer as a weapon : using a computer to
 commit real world crimes.
 HACKING
 VIRUS DISSEMINITION
 COMPUTER VANDALISM
 CYBER TERRORISM
 SOFTWARE PIRACY
CyberCrimes
Hacking in simple terms
means an illegal attack
into a computer system
and/or network. It is also
known as CRACKING.
Government websites are
the hot targets of the
hackers due to the press
coverage, it receives.
Hackers enjoy the media
coverage.
Malicious software that attaches itself to other software.
(virus, worms, Trojan Horse, web jacking, e-mail bombing
etc)
Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism. Transmitting
virus: These are programs that attach themselves to a file
and then circulate .
Terrorist attacks on the Internet is by distributed denial of
service attacks, hate websites and hate emails, attacks
on sensitive computer networks, etc. Technology savvy
terrorists are using 512-bit encryption, which is
impossible to decrypt.
Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of
products intended to pass for the original.
Internet security is a branch
of computer security specifically
related to the Internet.
 It's objective is to establish rules
and measure to use against
attacks over the Internet.
CyberCrimes
   Use antivirus software’s
   insert firewalls
   uninstall unnecessary software
   maintain backup
   check security settings
   Stay anonymous - choose a genderless screen name
   Never give your full name or address to strangers
 Learn ‘inetiquette' - follow it and
    expect it from others
   Don't respond to harassing or
    negative messages (flames)
   Get out of uncomfortable or
    hostile situations quickly
   Save offending messages
   Learn more about Internet
    privacy
CyberCrimes
 The cyber security will defend us from critical attacks.
 It helps us to browse the safe website.
 Internet security process all the incoming and outgoing
  data on our computer.
 security will defend from hacks and virus.
 The application of cyber security used in our PC needs
  update every week.
 The security developers will update their database every
  week once. Hence the new virus also deleted
Technology is destructive only in the hands of
people who do not realize that they are one and
the same process as the universe.
Alan Watts

“Technology   is like a fish. The longer it stays
on the shelf, the less desirable it becomes.”
CyberCrimes
1 sur 19

Recommandé

Cyber CrimeCyber Crime
Cyber CrimeAvinash Rajput
6.4K vues49 diapositives
Cyber Crime Cyber Crime
Cyber Crime bhavya mohindru
2.5K vues14 diapositives
Cyber crimeCyber crime
Cyber crimeHarendra Singh
2K vues17 diapositives
Cyber crime Cyber crime
Cyber crime Soreingam Ragui
16.8K vues54 diapositives
Cyber crime Cyber crime
Cyber crime Jayant Raj
2.8K vues40 diapositives

Contenu connexe

Tendances

CybercrimeCybercrime
CybercrimeKomal003
819 vues32 diapositives
Cyber crime pptCyber crime ppt
Cyber crime pptRitesh Thakur
1.3K vues18 diapositives
Cyber CrimeCyber Crime
Cyber Crimeshubham ghimire
22.2K vues38 diapositives
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
57.6K vues25 diapositives
Cyber crimeCyber crime
Cyber crimedixitas
2.2K vues35 diapositives

Tendances(20)

CybercrimeCybercrime
Cybercrime
Komal003819 vues
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur1.3K vues
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire22.2K vues
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah46.4K vues
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela57.6K vues
Cyber crimeCyber crime
Cyber crime
dixitas2.2K vues
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj2.5K vues
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Sahil Vashishtha59.1K vues
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad8.7K vues
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal5.8K vues
Cyber crimeCyber crime
Cyber crime
Md. Atiqur Rahman2.9K vues
Cyber crimeCyber crime
Cyber crime
Grant Thornton Bangladesh1.9K vues
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman2.9K vues
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya2.2K vues
Cyber crime and securityCyber crime and security
Cyber crime and security
Eng. Shuaib ibrahim37.5K vues
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani4.6K vues
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha3.9K vues
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT1.3K vues
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal10.7K vues
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni2.4K vues

En vedette

Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
727.5K vues20 diapositives
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPTAnshuman Tripathi
216.7K vues19 diapositives
Computer NetworksComputer Networks
Computer Networksguestf10d8f
2.4K vues10 diapositives
Cybercrime & SecurityCybercrime & Security
Cybercrime & SecurityShreeraj Nair
4.7K vues18 diapositives

En vedette(20)

Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan727.5K vues
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi216.7K vues
Computer NetworksComputer Networks
Computer Networks
guestf10d8f2.4K vues
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
Shreeraj Nair4.7K vues
Lesson 15 THE UNDERSTANDING HYPERMEDIALesson 15 THE UNDERSTANDING HYPERMEDIA
Lesson 15 THE UNDERSTANDING HYPERMEDIA
Analyn Villagracia6K vues
Virus and wormsVirus and worms
Virus and worms
Vikas Sharma16.9K vues
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos5.1K vues
Virus worm trojanVirus worm trojan
Virus worm trojan
1007019828.1K vues
Understanding hypermediaUnderstanding hypermedia
Understanding hypermedia
Leslie Nicdao17.3K vues
Cooperative Learning with the ComputerCooperative Learning with the Computer
Cooperative Learning with the Computer
Abraham Malacao28.5K vues
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
Jayaseelan Vejayon44.7K vues
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava174.9K vues
Hacking pptHacking ppt
Hacking ppt
giridhar_sadasivuni153.9K vues
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari538.3K vues
Computer networking devicesComputer networking devices
Computer networking devices
Rajesh Sadhukha218.5K vues
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji296.6K vues

Similaire à CyberCrimes

cyber crime cyber crime
cyber crime Midhun Suresh
3.1K vues32 diapositives
Dangers of Cyber CrimeDangers of Cyber Crime
Dangers of Cyber CrimeAmal Sukumaran
575 vues12 diapositives
Cyber CrimeCyber Crime
Cyber Crimezahid_ned
1.5K vues17 diapositives

Similaire à CyberCrimes(20)

Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
Arjunsinh Sindhav442 vues
cyber crime cyber crime
cyber crime
Midhun Suresh3.1K vues
Dangers of Cyber CrimeDangers of Cyber Crime
Dangers of Cyber Crime
Amal Sukumaran575 vues
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned1.5K vues
Dangers Of The Internet EssayDangers Of The Internet Essay
Dangers Of The Internet Essay
Sheena Crouch2 vues
Network Security.pptxNetwork Security.pptx
Network Security.pptx
EdwinGervacio244 vues
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru2.8K vues
Cyber security Cyber security
Cyber security
ankit yadav132 vues
Presentation1Presentation1
Presentation1
Rachel Lasotas290 vues
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
ssusera0b94b15 vues
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk162 vues
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
SeniorGaming44 vues
Internet security issuesInternet security issues
Internet security issues
irfan shaikh67 vues
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
Karan Bhandari437 vues
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov15 vues
MalwareMalware
Malware
Anoushka Srivastava1.5K vues

Dernier(20)

Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet44 vues
[2023] Putting the R! in R&D.pdf[2023] Putting the R! in R&D.pdf
[2023] Putting the R! in R&D.pdf
Eleanor McHugh31 vues

CyberCrimes

  • 2.  Computer crime, or cybercrime, refers to any crime that involves a computer and a network(Internet).
  • 3.  The Computer as a Target : using a computer to attack other computers.  The computer as a weapon : using a computer to commit real world crimes.
  • 4.  HACKING  VIRUS DISSEMINITION  COMPUTER VANDALISM  CYBER TERRORISM  SOFTWARE PIRACY
  • 6. Hacking in simple terms means an illegal attack into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.
  • 7. Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc)
  • 8. Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate .
  • 9. Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 10. Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 11. Internet security is a branch of computer security specifically related to the Internet. It's objective is to establish rules and measure to use against attacks over the Internet.
  • 13. Use antivirus software’s  insert firewalls  uninstall unnecessary software  maintain backup  check security settings  Stay anonymous - choose a genderless screen name  Never give your full name or address to strangers
  • 14.  Learn ‘inetiquette' - follow it and expect it from others  Don't respond to harassing or negative messages (flames)  Get out of uncomfortable or hostile situations quickly  Save offending messages  Learn more about Internet privacy
  • 16.  The cyber security will defend us from critical attacks.  It helps us to browse the safe website.  Internet security process all the incoming and outgoing data on our computer.
  • 17.  security will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted
  • 18. Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe. Alan Watts “Technology is like a fish. The longer it stays on the shelf, the less desirable it becomes.”