SlideShare une entreprise Scribd logo
1  sur  20
CONTENT
INTRODUCTION
HISTORY OF CYBER CRIME
CATEGORIES OF CYBER CRIME
TYEPS OF CYBER CRIME
CYBERCRIMES THREATENS NATIONAL
SECORITY
CYBER SECURITY
ADVANTAGES OF CYBER SECURITY
SAFETY TIPS TO CYBER CRIME
CYBER LAW OF INDIA
CONCLUSION
INTRODUCTION
Cyber crime is an activity
done using computers and
internet. We can say that it
is an unlawful acts wherein
the computer either a tool
or target or both.
HISTORY OF CYBER CRIME
The first recorded cyber crime took place in 1820.
That is not surprising considering the fact that the
abacus, which is thought to be the earliest from of a
computer, has been around since 3500 B.c.
In India, Japan and China, the era of modern
computer, however, began with the analytical engine
of Charles Babbage.
The first spam email took place in 1976 when it was
sent out over the ARPANT.
The first virus was installed on an Apple computer in
1982 when a high school student, Rich skrenta,
developed the EIK Cloner.
CATEGORIES OF CYBER CRIME
We can categorize cyber crime in two ways.
The computer as a target :- using a computer
to attacks other computer, e.g. Hacking,
virus/worms attacks, Dos attack etc.
The computer as a weapon :- using a
computer to commit real world crime e.g.
cyber terrorism, credit card fraud and
pornography etc.
TYPES OF CYBER CRIM
TYPES OF CYBER CRIME
HACKING :- Hacking in simple terms means an
illegal intrusion info a computer system and/or
network . It is also known as CRACKING.
Government websites are the hot target of the
hackers due to the press coverage, it receives.
Hackers enjoy the media coverage.
Motive behind the crime called HACKERS
Motive behind the crime called hacking greed
power, publicity, revenge, adventure desire to
access forbidden information destructive mindset
wants to sell n/w security services.
TYPES OF CYBER CRIME
CHILD PORNOGRAPHY : The Internet is being
highly used by its abusers to reach and abuse
children sexually, worldwide. As more homes
have access to internet, more children would be
using the internet and more are the chances of
falling victim to the aggression of Pedophiles.
How Do They Operate :
How do they operate Pedophiles use false
identity to trap the children , Pedophiles connect
children in various chat rooms which are used
by children to interact with other children.
TYPES OF CYBER CRIME
DENIAL OF SERVICE ATTACKS : This is an act by
the criminals who floods the bandwidth of the victims
network or fills his E-mail box with spam mail
depriving him of the service he is entitled to access or
provide. Many DOS attacks, such as the ping of
death and Tear drop attacks.
VIRUS DISSMINITION : Malicious software that
attaches itself to other software. VIRUS , WORMS,
TROJAN HORSE ,WEB JACKING, E-MAIL
BOMBING etc.
COMPUTER VANDALISM : Damaging or destroying
data rather than stealing or misusing them is called
cyber vandalism. These are program that attach
themselves to a file and then circulate.
TYPES OF CYBER CRIME
CYBER TERRORISM : Terrorist attacks on
the Internet is by distributed denial of service
attacks, hate websites and hate E-mails ,
attacks on service network etc.
SOFTWARE PIRACY : Theft of software
through the illegal copying of genuine
programs or the counterfeiting and
distribution of products intended to pass for
the original.
CYBER CRIMES THREATENS
NATIONAL SECURITY
CYBER CRIMES THREATENS NATIONAL SECURITY
IN INDIA Likewise Union home minister Shivraj Patil
said that the rising level of cyber crime is an
indication of enormous threat to national security. On
Google’s social networking site orkut, facebook, have
been perplexing authorities . Fan clubs of Underworld
Dons like Dawood Ibrahim and Chhota Shakeel and
other wanted underworld dons are also doing the
rounds on orkut. There is huge potential for damage
to national security through cyber attacks. The
internet is a means for money bounding and funding
terrorist attacks in an organized manner.
CYBER SECURITY
Cyber Security : Cyber Security involves protection of
sensitive personal and business information through
prevention, detection and response to different online
attacks. Cyber security actually preventing the attacks,
cyber security.
Privacy Policy : Before submitting your name , e-mail ,
address, on a website look for the sites privacy policy.
Keep Software Up to Date: If the seller reduces patches for
the software operating system your device ,install them as
soon as possible .Installing them will prevent attackers
form being able to take advantage. Use good password
which will be difficult for thieves to guess. Do not choose
option that allows your computer to remember your
passwords.
CYBER SECURITY
DISABLE REMOTE CONNECTIVITY : Some
PDA’s and phones are equipped with
wireless technologies, such as Bluetooth,
that can be used to connect to other devices
or computers. You should disable these
features when they are not in use.
ADVANTAGES OF CYBER SECURITY
The cyber security will defend us from critical
attacks.
It helps us to browse the site, website.
Internet Security process all the incoming
and outgoing data on your computer.
It will defend us from hacks and virus.
Application of cyber security used in our PC
needs update every week
SAFETY TIPS TO CYBER CRIME
Use antivirus Software
Insert Firewalls
Uninstall unnecessary software
Maintain backup
Check security settings
CYBER LAW OF INDIA
Cyber crime can involve criminal activities that
are traditional in nature, such as theft, fraud,
deformation and mischief, all of which are
subjected to the India Penal code. In simple way
we can say that cyber crime is unlawful acts
where in the computer is either a tool or both.
The abuse of computer has also given birth of
new age crime that are addressed by the
Information Technology Act, 2000.
CONCLUSION
Cybercrime is indeed getting the recognition
it deserves. However, it is not going to
restricted that easily . In fact , it is highly
likely that cyber crime and its hackers will
continue developing and upgrading to stay
ahead of the law.
So, to make us a safer we must need cyber
security.
tejakshaya chowdary
tejakshaya chowdary

Contenu connexe

Tendances (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Email crime ppt
Email crime pptEmail crime ppt
Email crime ppt
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
cyber crime
cyber crimecyber crime
cyber crime
 

Similaire à tejakshaya chowdary

cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfKira Dess
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02raja jawahar
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxBigBoss647822
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 

Similaire à tejakshaya chowdary (20)

ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Computer crime
Computer crimeComputer crime
Computer crime
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Dernier

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 

Dernier (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

tejakshaya chowdary

  • 1.
  • 2. CONTENT INTRODUCTION HISTORY OF CYBER CRIME CATEGORIES OF CYBER CRIME TYEPS OF CYBER CRIME CYBERCRIMES THREATENS NATIONAL SECORITY CYBER SECURITY ADVANTAGES OF CYBER SECURITY SAFETY TIPS TO CYBER CRIME CYBER LAW OF INDIA CONCLUSION
  • 3. INTRODUCTION Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 4. HISTORY OF CYBER CRIME The first recorded cyber crime took place in 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c. In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. The first spam email took place in 1976 when it was sent out over the ARPANT. The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 5. CATEGORIES OF CYBER CRIME We can categorize cyber crime in two ways. The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
  • 7. TYPES OF CYBER CRIME HACKING :- Hacking in simple terms means an illegal intrusion info a computer system and/or network . It is also known as CRACKING. Government websites are the hot target of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motive behind the crime called HACKERS Motive behind the crime called hacking greed power, publicity, revenge, adventure desire to access forbidden information destructive mindset wants to sell n/w security services.
  • 8. TYPES OF CYBER CRIME CHILD PORNOGRAPHY : The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of Pedophiles. How Do They Operate : How do they operate Pedophiles use false identity to trap the children , Pedophiles connect children in various chat rooms which are used by children to interact with other children.
  • 9. TYPES OF CYBER CRIME DENIAL OF SERVICE ATTACKS : This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many DOS attacks, such as the ping of death and Tear drop attacks. VIRUS DISSMINITION : Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING etc. COMPUTER VANDALISM : Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.
  • 10. TYPES OF CYBER CRIME CYBER TERRORISM : Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails , attacks on service network etc. SOFTWARE PIRACY : Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 11. CYBER CRIMES THREATENS NATIONAL SECURITY CYBER CRIMES THREATENS NATIONAL SECURITY IN INDIA Likewise Union home minister Shivraj Patil said that the rising level of cyber crime is an indication of enormous threat to national security. On Google’s social networking site orkut, facebook, have been perplexing authorities . Fan clubs of Underworld Dons like Dawood Ibrahim and Chhota Shakeel and other wanted underworld dons are also doing the rounds on orkut. There is huge potential for damage to national security through cyber attacks. The internet is a means for money bounding and funding terrorist attacks in an organized manner.
  • 12.
  • 13. CYBER SECURITY Cyber Security : Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks. Cyber security actually preventing the attacks, cyber security. Privacy Policy : Before submitting your name , e-mail , address, on a website look for the sites privacy policy. Keep Software Up to Date: If the seller reduces patches for the software operating system your device ,install them as soon as possible .Installing them will prevent attackers form being able to take advantage. Use good password which will be difficult for thieves to guess. Do not choose option that allows your computer to remember your passwords.
  • 14. CYBER SECURITY DISABLE REMOTE CONNECTIVITY : Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.
  • 15. ADVANTAGES OF CYBER SECURITY The cyber security will defend us from critical attacks. It helps us to browse the site, website. Internet Security process all the incoming and outgoing data on your computer. It will defend us from hacks and virus. Application of cyber security used in our PC needs update every week
  • 16. SAFETY TIPS TO CYBER CRIME Use antivirus Software Insert Firewalls Uninstall unnecessary software Maintain backup Check security settings
  • 17. CYBER LAW OF INDIA Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code. In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both. The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act, 2000.
  • 18. CONCLUSION Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily . In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security.