Ppt

PRESENTATION
ON
CYBER CRIME
AND ITS
SECURITY
TECHNIQUES
PRESENTED BY
SNEHA CHAUHAN
INTRODUCTION
 The internet in India is growing
rapidly. It has given rise to new
opportunities in every field we can
think of be it entertainment,
business, sports or education.
 There’s two side to a coin. Internet
also has it’s own disadvantages is
Cyber crime- illegal activity
committed on the internet
DEFINING CYBER CRIME
 Crime committed using a computer and the internet to
steal data or informati0n.
 Illegal imports.
 Malicious programs
TYPES OF CYBER CRIME
 Hacking
 Denial of service attack
 Virus Dissemination
 Computer Vandalism
 Cyber terrorism
 Software Piracy
SAFETY TIPS FOR CYBER CRIME
 Use antivirus software’s
 Insert firewalls
 Maintain backup
 Check security settings
 Never give your full name or address to strangers
 Learn more about internet policy
CYBER SECURITY
 DISABLE REMOTE
CONNECTIVITY: some PDA’s
and phones are equipped with
wireless technologies , such as
Bluetooth that can be used top
connect to other devices or
computers . You should disable
these features when they are not
in use.
CYBER SECURITY
 CYBER SECURITY: Cyber security involves protection
of sensitive personal and business information
through prevention, detection and response to
different online attacks.
 PRIVACY POLICY: Before submitting your name, e-
mail address, on a website look for the sites privacy
policy.
 KEEP SOFTWARE UP TO DATE: If the seller reduces
patches for the software operating system your device
,install them as soon as possible.
Ppt
DEFINITION
 As the internet and other forms of electronic
communication become more prevalent , electronic
security is becoming increasingly important.
Cryptography is used to protect e-mail messages,
credit card information, and corporate data. One of
the most popular cryptography systems used on the
internet is PRETTY GOOD PRIVACY because it’s
effective and free.
TYPES OF CRYPTOGRAPHY
PUBLIC-KEY
CRYPTOGRAPHY
PRIVATE –KEY
CRYPTOGRAPHY
PUBLIC KEY CRYPTOGRAPHY
 It is also known as asymmetric cryptography ,is a class
of cryptographic protocols based on algorithm that
require two separate keys , one of which is secret and
one of which is public. The public key is used for
encrypt the plain text and private key is used for
decrypt the cipher text.
Ppt
PRIVATE KEY CRYPTOGRAPHY
 It is also known as symmetric cryptography that uses
the same cryptography keys for both encryption the
plain text and decryption the cipher text.
Ppt
ENCRYPTION AND DECRYPTION
APPLICATIONS
 Defense services
 Secure data manipulation
 E-commerce
 Business transactions
 Internet payment systems
 User identification systems
 Access control
 Data security
CONCLUSION
 By using of encryption technique a fair unit of
confidentiality, authentication, integrity, access
control and availability of data is maintained
Ppt
1 sur 18

Recommandé

Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
2.5K vues22 diapositives
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
1.4K vues26 diapositives
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
3.9K vues8 diapositives
Cyber securityCyber security
Cyber securityPihu Goel
3.8K vues25 diapositives
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
57.6K vues25 diapositives
Cyber securityCyber security
Cyber securityBhavin Shah
1.3K vues26 diapositives

Contenu connexe

Tendances

Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
5.8K vues23 diapositives
cyber securitycyber security
cyber securityBasineniUdaykumar
3.2K vues10 diapositives
Cyber Crime Cyber Crime
Cyber Crime bhavya mohindru
2.5K vues14 diapositives
CYBER SECURITYCYBER SECURITY
CYBER SECURITYVaishak Chandran
2.5K vues18 diapositives
CybersecurityCybersecurity
CybersecurityForam Gosai
1.7K vues30 diapositives
Cyber securityCyber security
Cyber securitySamsil Arefin
1.7K vues21 diapositives

Tendances(20)

Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal5.8K vues
cyber securitycyber security
cyber security
BasineniUdaykumar3.2K vues
Cyber Crime Cyber Crime
Cyber Crime
bhavya mohindru2.5K vues
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran2.5K vues
CybersecurityCybersecurity
Cybersecurity
Foram Gosai1.7K vues
Cyber securityCyber security
Cyber security
Samsil Arefin1.7K vues
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru2.8K vues
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal10.7K vues
Cyber securityCyber security
Cyber security
manoj duli1.6K vues
Cyber securityCyber security
Cyber security
Sapna Patil3.1K vues
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra8.6K vues
Cyber security Cyber security
Cyber security
Sachith Lekamge1.5K vues
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla4.9K vues
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
ChandanChandu9281373K vues
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace11.1K vues
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman2.9K vues

En vedette(20)

Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh34.2K vues
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera602.3K vues
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
EricMendel426 vues
Ancaman cyber terhadap keamanan nasional   cybersecurityy risk and control - ...Ancaman cyber terhadap keamanan nasional   cybersecurityy risk and control - ...
Ancaman cyber terhadap keamanan nasional cybersecurityy risk and control - ...
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F1.1K vues
Cyber Security TermsCyber Security Terms
Cyber Security Terms
Suryaprakash Nehra1.5K vues
Cyber securityCyber security
Cyber security
vishakha bhagwat4.5K vues
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy8K vues
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
Priyanka Aash1.4K vues
Sarwono sutikno   wisuda stsn - 10 nov 2015 v2Sarwono sutikno   wisuda stsn - 10 nov 2015 v2
Sarwono sutikno wisuda stsn - 10 nov 2015 v2
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F785 vues
ISACA Indonesia - AGM 2016 - CSX Liaison 2016 dgn suaraISACA Indonesia - AGM 2016 - CSX Liaison 2016 dgn suara
ISACA Indonesia - AGM 2016 - CSX Liaison 2016 dgn suara
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F474 vues
Financial disciplineFinancial discipline
Financial discipline
Manu Melwin Joy9.1K vues
Keamanan informasi   cybersecurity risk opportunity and control - surabaya 17...Keamanan informasi   cybersecurity risk opportunity and control - surabaya 17...
Keamanan informasi cybersecurity risk opportunity and control - surabaya 17...
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F748 vues
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
Shaikh Zeeshan Ahmed1.2K vues
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas47.8K vues

Similaire à Ppt

Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
2K vues22 diapositives
PersentationPersentation
PersentationMehar Tayyab
37 vues20 diapositives

Similaire à Ppt(20)

Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS2K vues
PersentationPersentation
Persentation
Mehar Tayyab37 vues
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104132 vues
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8160 vues
Cyber SecurityCyber Security
Cyber Security
Home329 vues
Network security Network security
Network security
Madhumithah Ilango1.2K vues
Cysecc.pptxCysecc.pptx
Cysecc.pptx
jondon1723 vues
InfocrimepptInfocrimeppt
Infocrimeppt
Taniya Fansupkar87 vues
cyber security cyber security
cyber security
sumitbajpeyee63 vues
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari538.3K vues
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
MijanurSepai152 vues
E-commerce & SecurityE-commerce & Security
E-commerce & Security
NetstarterSL3K vues
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
BalwantBesra69 vues
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
MBRoman147 vues
Encryption-Decryption of EmailEncryption-Decryption of Email
Encryption-Decryption of Email
Shashank Singhal250 vues

Dernier

informing ideas.docxinforming ideas.docx
informing ideas.docxMollyBrown86
12 vues10 diapositives
KHNOG 5: APNIC ServicesKHNOG 5: APNIC Services
KHNOG 5: APNIC ServicesAPNIC
381 vues15 diapositives
KHNOG 5: RPKI Status UpdateKHNOG 5: RPKI Status Update
KHNOG 5: RPKI Status UpdateAPNIC
376 vues25 diapositives
WalkingWalking
WalkingEd Sullivan
37 vues46 diapositives

Dernier(20)

informing ideas.docxinforming ideas.docx
informing ideas.docx
MollyBrown8612 vues
Is Entireweb better than GoogleIs Entireweb better than Google
Is Entireweb better than Google
sebastianthomasbejan9 vues
UiPath Document Understanding_Day 2.pptxUiPath Document Understanding_Day 2.pptx
UiPath Document Understanding_Day 2.pptx
RohitRadhakrishnan8226 vues
KHNOG 5: APNIC ServicesKHNOG 5: APNIC Services
KHNOG 5: APNIC Services
APNIC381 vues
WalkingWalking
Walking
Ed Sullivan37 vues
google forms survey (1).pptxgoogle forms survey (1).pptx
google forms survey (1).pptx
MollyBrown8613 vues
DU Series - Day 4.pptxDU Series - Day 4.pptx
DU Series - Day 4.pptx
UiPathCommunity55 vues
zotabet.pdfzotabet.pdf
zotabet.pdf
zotabetcasino5 vues
Pen Testing - Allendevaux.pdfPen Testing - Allendevaux.pdf
Pen Testing - Allendevaux.pdf
SourabhKumar328076 vues
DU_SERIES_Session1.pdfDU_SERIES_Session1.pdf
DU_SERIES_Session1.pdf
RohitRadhakrishnan8711 vues
Existing documentaries (1).docxExisting documentaries (1).docx
Existing documentaries (1).docx
MollyBrown8613 vues
 FS Design 2024 V2.pptx FS Design 2024 V2.pptx
FS Design 2024 V2.pptx
paswanlearning7 vues
childcare.pdfchildcare.pdf
childcare.pdf
fatma alnaqbi13 vues

Ppt

  • 2. INTRODUCTION  The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.  There’s two side to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet
  • 3. DEFINING CYBER CRIME  Crime committed using a computer and the internet to steal data or informati0n.  Illegal imports.  Malicious programs
  • 4. TYPES OF CYBER CRIME  Hacking  Denial of service attack  Virus Dissemination  Computer Vandalism  Cyber terrorism  Software Piracy
  • 5. SAFETY TIPS FOR CYBER CRIME  Use antivirus software’s  Insert firewalls  Maintain backup  Check security settings  Never give your full name or address to strangers  Learn more about internet policy
  • 6. CYBER SECURITY  DISABLE REMOTE CONNECTIVITY: some PDA’s and phones are equipped with wireless technologies , such as Bluetooth that can be used top connect to other devices or computers . You should disable these features when they are not in use.
  • 7. CYBER SECURITY  CYBER SECURITY: Cyber security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks.  PRIVACY POLICY: Before submitting your name, e- mail address, on a website look for the sites privacy policy.  KEEP SOFTWARE UP TO DATE: If the seller reduces patches for the software operating system your device ,install them as soon as possible.
  • 9. DEFINITION  As the internet and other forms of electronic communication become more prevalent , electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data. One of the most popular cryptography systems used on the internet is PRETTY GOOD PRIVACY because it’s effective and free.
  • 11. PUBLIC KEY CRYPTOGRAPHY  It is also known as asymmetric cryptography ,is a class of cryptographic protocols based on algorithm that require two separate keys , one of which is secret and one of which is public. The public key is used for encrypt the plain text and private key is used for decrypt the cipher text.
  • 13. PRIVATE KEY CRYPTOGRAPHY  It is also known as symmetric cryptography that uses the same cryptography keys for both encryption the plain text and decryption the cipher text.
  • 16. APPLICATIONS  Defense services  Secure data manipulation  E-commerce  Business transactions  Internet payment systems  User identification systems  Access control  Data security
  • 17. CONCLUSION  By using of encryption technique a fair unit of confidentiality, authentication, integrity, access control and availability of data is maintained