2. INTRODUCTION
The internet in India is growing
rapidly. It has given rise to new
opportunities in every field we can
think of be it entertainment,
business, sports or education.
There’s two side to a coin. Internet
also has it’s own disadvantages is
Cyber crime- illegal activity
committed on the internet
3. DEFINING CYBER CRIME
Crime committed using a computer and the internet to
steal data or informati0n.
Illegal imports.
Malicious programs
4. TYPES OF CYBER CRIME
Hacking
Denial of service attack
Virus Dissemination
Computer Vandalism
Cyber terrorism
Software Piracy
5. SAFETY TIPS FOR CYBER CRIME
Use antivirus software’s
Insert firewalls
Maintain backup
Check security settings
Never give your full name or address to strangers
Learn more about internet policy
6. CYBER SECURITY
DISABLE REMOTE
CONNECTIVITY: some PDA’s
and phones are equipped with
wireless technologies , such as
Bluetooth that can be used top
connect to other devices or
computers . You should disable
these features when they are not
in use.
7. CYBER SECURITY
CYBER SECURITY: Cyber security involves protection
of sensitive personal and business information
through prevention, detection and response to
different online attacks.
PRIVACY POLICY: Before submitting your name, e-
mail address, on a website look for the sites privacy
policy.
KEEP SOFTWARE UP TO DATE: If the seller reduces
patches for the software operating system your device
,install them as soon as possible.
9. DEFINITION
As the internet and other forms of electronic
communication become more prevalent , electronic
security is becoming increasingly important.
Cryptography is used to protect e-mail messages,
credit card information, and corporate data. One of
the most popular cryptography systems used on the
internet is PRETTY GOOD PRIVACY because it’s
effective and free.
11. PUBLIC KEY CRYPTOGRAPHY
It is also known as asymmetric cryptography ,is a class
of cryptographic protocols based on algorithm that
require two separate keys , one of which is secret and
one of which is public. The public key is used for
encrypt the plain text and private key is used for
decrypt the cipher text.
13. PRIVATE KEY CRYPTOGRAPHY
It is also known as symmetric cryptography that uses
the same cryptography keys for both encryption the
plain text and decryption the cipher text.
16. APPLICATIONS
Defense services
Secure data manipulation
E-commerce
Business transactions
Internet payment systems
User identification systems
Access control
Data security
17. CONCLUSION
By using of encryption technique a fair unit of
confidentiality, authentication, integrity, access
control and availability of data is maintained