SlideShare a Scribd company logo
1 of 19
Download to read offline
POWERPOINT
PRESENTATION
TOPIC: CYBER CRIME AND ETHICAL HACKING
Presented By:
oANKIT KUMAR
o (ankitkumarjha108@gmail.com)
o (www.facebook.com/Ankitkumar108)
Content Overview:
 Definitions (Cyber Crime & Ethical Hacking)
 Cyber Crime (History & Category)
 Facts related to Cyber Crime
 Some Alarming Facts of Cyber Crime
 Cyber Crime in form of Hacking
 Process involved in Hacking
 Type of Hackers
 Some of world’s most famous Hackers
 Ethical Hacking
 Ethical Hacking process
 Advantage and Disadvantage
 What to do if a Computer is Hacked
 Security Tips
 Our Conclusion and Suggestion
Definitions:
CYBER CRIME:
 Crime committed using a
computer and the
internet to steal a
person’s identity or
illegal imports or
malicious programs.
Cybercrime is nothing
but where the computer
used as an object or
subject of crime.
ETHICAL HACKING
 A type of hacking in
which hacker
systematically attempts
to penetrate a computer
system or network on
behalf of its owners for
the purpose of finding
security vulnerabilities
that a
malicious hacker could
potentially exploit.
Cyber Crime:
History:
 The first recorded cyber
crime took place in the year
1820.
 The first spam email took
place in 1978 when it was
sent over the Arpanet.
 The first Virus was installed
on an Apple Computer in
1982.
Category:
 HACKING
 CHILD PORNOGRAPHY
 DENIAL OF SERVICE
ATTACK
 VIRUS DISSEMINITION
 COMPUTER VANDALISM
 CYBER TERRORISM
 SOFTWARE PIRACY
Facts related to Cyber Crime:
Types of Cyber attacks (By %age):
 Financial fraud: 11%
 Sabotage of data/networks: 17%
 Theft of proprietary information: 20%
 System penetration from the outside: 25%
 Denial of service: 27%
 Unauthorized access by insiders: 71%
 Employee abuse of internet privileges: 79%
 Viruses: 85%
A Report of ASSOCHAM:
These Facts Are Alarming !!!
Cyber Crimes in form of HACKING:
Hacking:
 The Process of
attempting to gain or
successfully
gaining, unauthorized
access to computer
resources is called
Hacking.
.
Hacking Growth Rate:
Processes involved in Hacking:
Type of Hackers:
 Black Hat:
Violates computer security
for little reason beyond
maliciousness or for
personal gain.
 White Hat:
Breaks security for non-
malicious reasons.
 Grey Hat:
Hacker lies between a black
hat and a white hat hacker.
Some of world’s most famous Hackers:
 EDWARD SNOWDEN:
( Hacked and leaked classified
information from the U.S.
National Security Agency in
2013. Most Wanted Criminal
declared by FBI.)
 ANKIT FADIA:
(A well known Ethic Hacker.
Wrote his first book on
hacking at age of 14.Till now
he has written more than 21
books.)
 JONATHAN JAMES:
(Also known as C0mrade on the
Internet. At age of 15, he hacked
a number of networks, including
those belonging to Bell South,
Miami-Dade, U.S. Defense, and
NASA. Committed suicide in
2008.)
 JULIAN ASSANGE:
(Founder and CEO of
WikiLeaks, An organisation of
hackers known for their hacking
techniques to steel classified
datas of govt. officials.)
 KEVIN MITNICK:
(U.S. Department of Justice
called him the “most wanted
computer criminal in U.S.
history.” His story is so wild that
it was the basis for two featured
films.)
 ALBERT GONZALEZ:
(He paved his way to Internet
fame when he collected over 170
million credit card and ATM
card numbers over a period of 2
years. Yep. That’s equal to a
little over half the population of
the United States.)
Ethical Hacking:
Working Principle:
“TO CATCH A
THIEF ,
THINK LIKE A
THIEF…….”
Programmer v/s Hacker:
Ethical Hacking Process:
Executing
Plans
Evaluating Results
Formulating
Plans
Advantage & Disadvantage:
 Advantages:
 Prevents website defacements.
 An evolving technique, advancing day by
day.
 Helps in finding and removing loopholes
in cyber security.
 Can be used to recover lost information
where the computer password has been
lost.
 Teaches you that no technology is 100%
secure.
 To test how good security is on your own
network.
 They call it white hat computer hacking.
 Disadvantages:
 All depends upon the
trustworthiness of the ethical
hacker.
 Hiring professionals is expensive.
 He / She may betray you.
 Criminals can use it to their
advantage.
 It can harm someone's privacy
 It's Illegal
What to do if a Computer is Hacked ???
 Shutdown or turn off the Computer .
 Separate the System from the Network.
 Restore the System with Backup, or Re-install all the
programs.
 Restart the System, connect it with Network and again
Restart it.
 Now Computer is Ready to use.
Security Tips:
 Use antivirus software’s.
 Insert firewalls.
 Uninstall unnecessary software.
 Maintain backup.
 Check security settings and TURN ON Updates.
 Stay anonymous - choose a genderless screen name.
 Never give your full name or address to strangers.
 Learn ‘Etiquette' - follow it and expect it from others.
 Don't respond to harassing or negative messages (flames).
 Get out of uncomfortable or hostile situations quickly.
 Save offending messages.
 Learn more about Internet privacy.
Our Conclusion and Suggestion:
 Remember, a Computer is 100% safe only when it is Turned Off.
 The Technology is getting advanced day by day.
 If you are a System administrator, you should have at least basic knowledge about Tricks
and Techniques related to Computer and Cyber security.
 Keep yourself updated from all Cyber related news.
 Technology is like a fish. The longer it stays on the shelf, the less desirable it becomes.
 Technology is destructive only in the hands of people who do not realize that they are
one and the same process as the universe : (ALLAN WATTS).
Any Questions ????
THANK YOU !!!!!

More Related Content

What's hot

Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention TipsTayyab Farooq
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trendsHadeel Sadiq Obaid
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 

What's hot (20)

Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 

Similar to Cyber Crime and Ethical Hacking

Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking OverviewSubhoneel Datta
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Esteban
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Hacking
HackingHacking
HackingVirus
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 

Similar to Cyber Crime and Ethical Hacking (20)

What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Hacking
HackingHacking
Hacking
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Cyber Crime and Ethical Hacking

  • 2. TOPIC: CYBER CRIME AND ETHICAL HACKING Presented By: oANKIT KUMAR o (ankitkumarjha108@gmail.com) o (www.facebook.com/Ankitkumar108)
  • 3. Content Overview:  Definitions (Cyber Crime & Ethical Hacking)  Cyber Crime (History & Category)  Facts related to Cyber Crime  Some Alarming Facts of Cyber Crime  Cyber Crime in form of Hacking  Process involved in Hacking  Type of Hackers  Some of world’s most famous Hackers  Ethical Hacking  Ethical Hacking process  Advantage and Disadvantage  What to do if a Computer is Hacked  Security Tips  Our Conclusion and Suggestion
  • 4. Definitions: CYBER CRIME:  Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs. Cybercrime is nothing but where the computer used as an object or subject of crime. ETHICAL HACKING  A type of hacking in which hacker systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.
  • 5. Cyber Crime: History:  The first recorded cyber crime took place in the year 1820.  The first spam email took place in 1978 when it was sent over the Arpanet.  The first Virus was installed on an Apple Computer in 1982. Category:  HACKING  CHILD PORNOGRAPHY  DENIAL OF SERVICE ATTACK  VIRUS DISSEMINITION  COMPUTER VANDALISM  CYBER TERRORISM  SOFTWARE PIRACY
  • 6. Facts related to Cyber Crime: Types of Cyber attacks (By %age):  Financial fraud: 11%  Sabotage of data/networks: 17%  Theft of proprietary information: 20%  System penetration from the outside: 25%  Denial of service: 27%  Unauthorized access by insiders: 71%  Employee abuse of internet privileges: 79%  Viruses: 85% A Report of ASSOCHAM:
  • 7. These Facts Are Alarming !!!
  • 8. Cyber Crimes in form of HACKING: Hacking:  The Process of attempting to gain or successfully gaining, unauthorized access to computer resources is called Hacking. . Hacking Growth Rate:
  • 10. Type of Hackers:  Black Hat: Violates computer security for little reason beyond maliciousness or for personal gain.  White Hat: Breaks security for non- malicious reasons.  Grey Hat: Hacker lies between a black hat and a white hat hacker.
  • 11. Some of world’s most famous Hackers:  EDWARD SNOWDEN: ( Hacked and leaked classified information from the U.S. National Security Agency in 2013. Most Wanted Criminal declared by FBI.)  ANKIT FADIA: (A well known Ethic Hacker. Wrote his first book on hacking at age of 14.Till now he has written more than 21 books.)  JONATHAN JAMES: (Also known as C0mrade on the Internet. At age of 15, he hacked a number of networks, including those belonging to Bell South, Miami-Dade, U.S. Defense, and NASA. Committed suicide in 2008.)  JULIAN ASSANGE: (Founder and CEO of WikiLeaks, An organisation of hackers known for their hacking techniques to steel classified datas of govt. officials.)  KEVIN MITNICK: (U.S. Department of Justice called him the “most wanted computer criminal in U.S. history.” His story is so wild that it was the basis for two featured films.)  ALBERT GONZALEZ: (He paved his way to Internet fame when he collected over 170 million credit card and ATM card numbers over a period of 2 years. Yep. That’s equal to a little over half the population of the United States.)
  • 12. Ethical Hacking: Working Principle: “TO CATCH A THIEF , THINK LIKE A THIEF…….” Programmer v/s Hacker:
  • 14. Advantage & Disadvantage:  Advantages:  Prevents website defacements.  An evolving technique, advancing day by day.  Helps in finding and removing loopholes in cyber security.  Can be used to recover lost information where the computer password has been lost.  Teaches you that no technology is 100% secure.  To test how good security is on your own network.  They call it white hat computer hacking.  Disadvantages:  All depends upon the trustworthiness of the ethical hacker.  Hiring professionals is expensive.  He / She may betray you.  Criminals can use it to their advantage.  It can harm someone's privacy  It's Illegal
  • 15. What to do if a Computer is Hacked ???  Shutdown or turn off the Computer .  Separate the System from the Network.  Restore the System with Backup, or Re-install all the programs.  Restart the System, connect it with Network and again Restart it.  Now Computer is Ready to use.
  • 16. Security Tips:  Use antivirus software’s.  Insert firewalls.  Uninstall unnecessary software.  Maintain backup.  Check security settings and TURN ON Updates.  Stay anonymous - choose a genderless screen name.  Never give your full name or address to strangers.  Learn ‘Etiquette' - follow it and expect it from others.  Don't respond to harassing or negative messages (flames).  Get out of uncomfortable or hostile situations quickly.  Save offending messages.  Learn more about Internet privacy.
  • 17. Our Conclusion and Suggestion:  Remember, a Computer is 100% safe only when it is Turned Off.  The Technology is getting advanced day by day.  If you are a System administrator, you should have at least basic knowledge about Tricks and Techniques related to Computer and Cyber security.  Keep yourself updated from all Cyber related news.  Technology is like a fish. The longer it stays on the shelf, the less desirable it becomes.  Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe : (ALLAN WATTS).