0
Cyber crime and security  If we can defeat them sitting athome……who needs to fight with tanks            and guns!!!!
INTRODUCTION
Cyber crime• Crime committed using a computer and  the internet to steal a person’s identity.• illegal imports.• malicious...
Cyber crime Cybercrime is nothing but where thecomputer used as an object or subject              of crime
History• The first recorded cyber crime took place  in the year 1820.
Categorization of cyber crime• The Computer as a Target• The computer as a weapon
Types of Cyber Crime•   Hacking•   Denial of service attack•   Virus Dissemination•   Computer Vandalism•   Cyber Terroris...
Hacking• Hacking in simple terms means an illegal  intrusion into a computer system and/or  network.
Denial of Service Attack• Act by the criminal, who floods the  bandwidth of the victims network.• Ills his e-mail box with...
Virus Dissemination• Malicious software that attaches itself to  other software. (virus, worms, Trojan  Horse, web jacking...
Computer Vandalism• Damaging or destroying data rather than  stealing.• Transmitting virus
Cyber Terrorism• Use of Internet based attacks in terrorist activities.• Technology savvy terrorists are using 512-bit  en...
Software Piracy• Theft of software through the illegal copying of  genuine programs.• Distribution of products intended to...
Types of Cyber Attack by Percentage•   Financial fraud:                        11%•   Sabotage of data/networks:          ...
Safety Tips for cyber crime• Use antivirus software’s.• insert firewalls.• uninstall unnecessary software• maintain backup...
Security
Cyber Security• Internet security is a branch of computer security  specifically related to the Internet.• Its objective i...
Advantages of Cyber Security• defend us from critical attacks.• browse the safe website.• Internet security process all th...
ConclusionTechnology is destructive only in the hands ofpeople who do not realize that they are oneand the same process as...
vvv
Cyber crime and secuity
Cyber crime and secuity
Cyber crime and secuity
Upcoming SlideShare
Loading in...5
×

Cyber crime and secuity

4,992

Published on

Published in: Technology
1 Comment
5 Likes
Statistics
Notes
No Downloads
Views
Total Views
4,992
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
479
Comments
1
Likes
5
Embeds 0
No embeds

No notes for slide

Transcript of "Cyber crime and secuity"

  1. 1. Cyber crime and security If we can defeat them sitting athome……who needs to fight with tanks and guns!!!!
  2. 2. INTRODUCTION
  3. 3. Cyber crime• Crime committed using a computer and the internet to steal a person’s identity.• illegal imports.• malicious programs.
  4. 4. Cyber crime Cybercrime is nothing but where thecomputer used as an object or subject of crime
  5. 5. History• The first recorded cyber crime took place in the year 1820.
  6. 6. Categorization of cyber crime• The Computer as a Target• The computer as a weapon
  7. 7. Types of Cyber Crime• Hacking• Denial of service attack• Virus Dissemination• Computer Vandalism• Cyber Terrorism• Software Piracy
  8. 8. Hacking• Hacking in simple terms means an illegal intrusion into a computer system and/or network.
  9. 9. Denial of Service Attack• Act by the criminal, who floods the bandwidth of the victims network.• Ills his e-mail box with spam mail depriving him of the services.
  10. 10. Virus Dissemination• Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)
  11. 11. Computer Vandalism• Damaging or destroying data rather than stealing.• Transmitting virus
  12. 12. Cyber Terrorism• Use of Internet based attacks in terrorist activities.• Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  13. 13. Software Piracy• Theft of software through the illegal copying of genuine programs.• Distribution of products intended to pass for the original.
  14. 14. Types of Cyber Attack by Percentage• Financial fraud: 11%• Sabotage of data/networks: 17%• Theft of proprietary information: 20%• System penetration from the outside: 25%• Denial of service: 27%• Unauthorized access by insiders: 71%• Employee abuse of internet privileges 79%• Viruses 85%
  15. 15. Safety Tips for cyber crime• Use antivirus software’s.• insert firewalls.• uninstall unnecessary software• maintain backup.• check security settings.• Stay anonymous - choose a genderless screen name.• Never give your full name or address to strangers.• Learn more about Internet privacy.
  16. 16. Security
  17. 17. Cyber Security• Internet security is a branch of computer security specifically related to the Internet.• Its objective is to establish rules and measure to use against attacks over the Internet.
  18. 18. Advantages of Cyber Security• defend us from critical attacks.• browse the safe website.• Internet security process all the incoming and outgoing data on our computer.
  19. 19. ConclusionTechnology is destructive only in the hands ofpeople who do not realize that they are oneand the same process as the universe.
  20. 20. vvv
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×