The internet in India is growing
rapidly. It has given rise to new
opportunities in every field we can
think of be it entertainment,
business, sports or education.
There’s two side to a coin. Internet
also has it’s own disadvantages is
Cyber crime- illegal activity
committed on the internet
3. DEFINING CYBER CRIME
Crime committed using a computer and the internet to
steal data or informati0n.
4. TYPES OF CYBER CRIME
Denial of service attack
5. SAFETY TIPS FOR CYBER CRIME
Use antivirus software’s
Check security settings
Never give your full name or address to strangers
Learn more about internet policy
6. CYBER SECURITY
CONNECTIVITY: some PDA’s
and phones are equipped with
wireless technologies , such as
Bluetooth that can be used top
connect to other devices or
computers . You should disable
these features when they are not
7. CYBER SECURITY
CYBER SECURITY: Cyber security involves protection
of sensitive personal and business information
through prevention, detection and response to
different online attacks.
mail address, on a website look for the sites privacy
KEEP SOFTWARE UP TO DATE: If the seller reduces
patches for the software operating system your device
,install them as soon as possible.
As the internet and other forms of electronic
communication become more prevalent , electronic
security is becoming increasingly important.
Cryptography is used to protect e-mail messages,
credit card information, and corporate data. One of
the most popular cryptography systems used on the
internet is PRETTY GOOD PRIVACY because it’s
effective and free.
11. PUBLIC KEY CRYPTOGRAPHY
It is also known as asymmetric cryptography ,is a class
of cryptographic protocols based on algorithm that
require two separate keys , one of which is secret and
one of which is public. The public key is used for
encrypt the plain text and private key is used for
decrypt the cipher text.
13. PRIVATE KEY CRYPTOGRAPHY
It is also known as symmetric cryptography that uses
the same cryptography keys for both encryption the
plain text and decryption the cipher text.