This document defines cyber crime and discusses its history, evolution, categories, types and prevention. Cyber crime involves using computers and the internet to steal data or commit other illegal acts. The summary defines it as crimes committed using computers as objects or subjects, then discusses how threats have evolved over time. Categories include computers as targets and weapons, while common types are hacking, viruses, phishing, vandalism, terrorism, piracy and fraud. Prevention methods like antivirus software, firewalls and secure online practices are recommended.
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Cybercrime and its effects on personal life who uses internet
1.
2. Hey friends....
Do you know ,what is “CYBER CRIME
it’s SECURITY, Definition and effects etc… ”
?
3. No….
Don’t Worry
I’ll tell you about it’s
Introduction.
Definition.
History.
Cyber threat evolution.
Categories of cyber crime.
Types of cyber crime.
Prevention.
Security.
Conclusion.
CONTENTS
4. INTRODUCTION
The internet in India is growing rapidly. It has given rise to new
opportunities in every field we can think of be it entertainment,
business, sports or education.
There’re two sides to a coin. Internet also has it’s own
disadvantages i.e. Cyber crime- illegal activity committed on the
internet.
10. CATEGORIZATION OF CYBER
CRIME
• The Computer as a
Target
• The computer as a
weapon
Not only a computer it
may also be any
electronic device
which maybe used to
do crimes
electronically.
12. HACKING
• Hacking in simple terms means an illegal
intrusion into a computer system and/or network.
13. VIRUS DISSEMINATION
• Malicious software that attaches itself to other
software. (virus, worms, Trojan Horse, web
jacking, e-mail bombing etc.)
14.
15. PHISHING
Phishing sounds like fishing-----------------------------------------------------------------------
Phishing emails are written to trick you into divulging your bank or credit
card information. A typical phishing email informs you that
someone's tried to access your bank
account illegally so you won't be able
to withdraw money until you log in
and prove your identity. The link in
the email sends you to a fake website
to enter your data, giving the phishers
everything they need to drain your
bank account.
19. CYBER TERRORISM
• Use of Internet based attacks in terrorist activities.
• Technology savvy terrorists are using 512-bit encryption,
which is impossible to decrypt.
20. SOFTWARE PIRACY
• Theft of software through the illegal copying of
genuine programs.
• Distribution of products intended to pass for the
original.
21. ONLINE FRAUDS
• An Internet fraud (online
scam) is the use
of Internet services or
software with Internet access
to defraud victims or to
otherwise take advantage of
them; for example, by
stealing personal information,
which can even lead to
identity theft.
• E.g…………………………
26. The situation of the person who becomes
the victim of these kinds
of online frauds……………………….
27. CYBER SECURITY
• Internet security is a branch of computer security
specifically related to the Internet.
• It's objective is to establish rules and measure to use
against attacks over the Internet.
28. SAFETY TIPS FOR CYBER
CRIME
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a genderless screen name.
• Never give your full name or address to strangers.
• Learn more about Internet privacy.
29. WAYS TO PROTECT YOURSELF FROM
CYBER CRIME
Use anti-
virus
software
If in doubt,
block
More than one
e-mail accounts
Ignore pop-
ups
Macs are as
vulnerable
as PCs
Two-step
verification
Only shop
online on
secure sites
30. ADVANTAGES OF CYBER
SECURITY
• Defend us from critical attacks.
• Browse the safe website.
• Internet security process all the incoming and outgoing
data on our computer.