SlideShare a Scribd company logo
1 of 29
CYBERCRIME
SUBMITTED TO

COMPILED BY:
1.) AJEETH.M.RAMANAN

MS.ANKITA DEVNATH
ASSISTANT PROFESSOR

2.) BHAVNA BANSAL
3.)GURPINDER KAUR GILL

4.) CHETAN SHANDILYA
CYBER CRIME !!
The expression ‘Crime’ is defined as an act, which subjects the doer to
legal punishment or any offence against morality, social order or any
unjust or shameful act. The “Offence" is defined in the Code of
Criminal Procedure to mean as an act or omission made punishable by
any law for the time being in force.

Cyber Crime is emerging as a serious threat. World wide
governments, police departments and intelligence units have started
to react.
“Cybercrime is criminal activity done using computers and the Internet.”
-Wikipedia
“Any criminal activity that uses a computer either as an instrumentality,
target or a means for perpetuating further crimes comes within the ambit
of cyber crime”(12)
-Indian Penal Code

One way of viewing cybercrimes is that they may be digital versions of
traditional, real world offenses. They could be considered traditional, or
“real world” crimes if not for the incorporated element of virtual or
cyberspace
-US Congressional View
TYPES OF CYBERCRIME
HACKING
I.

Practice of modifying computer
hardware and software to
accomplish a goal outside of the
creator’s original purpose.

II. Modification of code intended by
the original programmer.

III. Identity Theft
Phishing is a fraudulent
attempt, usually made through
email, to steal personal
information.

In order for Internet criminals
to successfully “phish” a
personal information, they
must go from an email to a
website.
EXAMPLE OF PHISHING
It is the use of the Internet or
other electronic means to
stalk someone.
This term is used
interchangeably with online
harassment and online
abuse.
SOFTWARE PIRACY
Theft of software
through the illegal
copying of genuine
programs or the
counterfeiting and
distribution of
products intended to
pass for the original
SOFTWARE PIRACY
Software Piracy is done by:
I. End user copying
II. Hard disk loading
III.Counterfeiting
IV.Illegal downloads from the
internet etc
COMPUTER VIRUS
A. A computer virus is a computer program that
can copy itself and infect a computer without
permission or knowledge of the user.
B. The original may modify the copies or the copies
may modify themselves.
C. It can spread to other computers by infecting
files on a network file system or a file system
that is accessed by another computer.
WAYS TO PREVENT CYBER CRIME
ANTIVIRUS AND ANTISPYWARE PROGRAMS
Antivirus software consists of
computer programs that
attempt to identify and
eliminate computer viruses and
other malicious software. Anti
spy wares are used to restrict
backdoor program, Trojans and
other spy wares to be installed
on the computer.
FIREWALLS
 A firewall protects a
computer network from
unauthorized access.
A firewall establishes a
barrier between a
trusted, secure internal
network and another
network (e.g., the
Internet) that is not
assumed to be secure
and trusted
CYBER LAWS
Cyber laws are being formulated to stop
cyber crimes.
Internet Service Providers should also
provide high level of security at their servers
in order to keep their clients secure from all
types of viruses and malicious programs.
If a computer virus or an invading hacker deletes
our files, or either one corrupts our files, the easiest
way to restore our computer may be to reformat the
hard drive(s) and then copy files from a recent
backup.

Backups also offer protection from more common
(and less exotic) threats such as accidental deletion
of a file by an authorized user or failure of a hard
disk drive.
The most popular form
of security which
people rely on is
ENCRYPTION , the
process of encoding
information in such a
way that only the
person (or computer)
with the key can
decode it.
AWARENESS
Always keep a check that you do secure browsing
For example:

While browsing on some website, if “https” is written
in address bar instead of “http” that website
provides secure browsing.
Awareness should be very important. We should treat very
cautiously when we use the public domain such as internet.
We should keep a check on how much we share on the new
to keep our self safe.
We should not fall for phishing schemes.
Its always good to remember the old saying --

“If its too good to be true, it probably is”
Cyber crime

More Related Content

What's hot

Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliAhtasham Ali
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)AashishTanania
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 
Cyber Security for Babies
Cyber Security for BabiesCyber Security for Babies
Cyber Security for BabiesVISHNUVNAIR13
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismawderdlfy
 

What's hot (19)

Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Presentation
 Presentation Presentation
Presentation
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
1358619756 cyber terrorism
1358619756 cyber terrorism1358619756 cyber terrorism
1358619756 cyber terrorism
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Marwan alsuwaidi
Marwan alsuwaidiMarwan alsuwaidi
Marwan alsuwaidi
 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Cyber Security for Babies
Cyber Security for BabiesCyber Security for Babies
Cyber Security for Babies
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Similar to Cyber crime

2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crimeQondileRamokgadi
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet securityRahul Sah
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptlowlesh1
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptlowlesh1
 

Similar to Cyber crime (20)

2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crime
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet security
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation1
Presentation1Presentation1
Presentation1
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
 
Cyber security
Cyber security Cyber security
Cyber security
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Cyber crime

  • 1. CYBERCRIME SUBMITTED TO COMPILED BY: 1.) AJEETH.M.RAMANAN MS.ANKITA DEVNATH ASSISTANT PROFESSOR 2.) BHAVNA BANSAL 3.)GURPINDER KAUR GILL 4.) CHETAN SHANDILYA
  • 2. CYBER CRIME !! The expression ‘Crime’ is defined as an act, which subjects the doer to legal punishment or any offence against morality, social order or any unjust or shameful act. The “Offence" is defined in the Code of Criminal Procedure to mean as an act or omission made punishable by any law for the time being in force. Cyber Crime is emerging as a serious threat. World wide governments, police departments and intelligence units have started to react.
  • 3. “Cybercrime is criminal activity done using computers and the Internet.” -Wikipedia “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”(12) -Indian Penal Code One way of viewing cybercrimes is that they may be digital versions of traditional, real world offenses. They could be considered traditional, or “real world” crimes if not for the incorporated element of virtual or cyberspace -US Congressional View
  • 5.
  • 6. HACKING I. Practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. II. Modification of code intended by the original programmer. III. Identity Theft
  • 7.
  • 8. Phishing is a fraudulent attempt, usually made through email, to steal personal information. In order for Internet criminals to successfully “phish” a personal information, they must go from an email to a website.
  • 10.
  • 11. It is the use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse.
  • 12.
  • 13. SOFTWARE PIRACY Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original
  • 14.
  • 15. SOFTWARE PIRACY Software Piracy is done by: I. End user copying II. Hard disk loading III.Counterfeiting IV.Illegal downloads from the internet etc
  • 16. COMPUTER VIRUS A. A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. B. The original may modify the copies or the copies may modify themselves. C. It can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer.
  • 17. WAYS TO PREVENT CYBER CRIME
  • 18. ANTIVIRUS AND ANTISPYWARE PROGRAMS Antivirus software consists of computer programs that attempt to identify and eliminate computer viruses and other malicious software. Anti spy wares are used to restrict backdoor program, Trojans and other spy wares to be installed on the computer.
  • 19.
  • 20. FIREWALLS  A firewall protects a computer network from unauthorized access. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted
  • 21.
  • 22. CYBER LAWS Cyber laws are being formulated to stop cyber crimes. Internet Service Providers should also provide high level of security at their servers in order to keep their clients secure from all types of viruses and malicious programs.
  • 23. If a computer virus or an invading hacker deletes our files, or either one corrupts our files, the easiest way to restore our computer may be to reformat the hard drive(s) and then copy files from a recent backup. Backups also offer protection from more common (and less exotic) threats such as accidental deletion of a file by an authorized user or failure of a hard disk drive.
  • 24.
  • 25. The most popular form of security which people rely on is ENCRYPTION , the process of encoding information in such a way that only the person (or computer) with the key can decode it.
  • 26. AWARENESS Always keep a check that you do secure browsing For example: While browsing on some website, if “https” is written in address bar instead of “http” that website provides secure browsing.
  • 27.
  • 28. Awareness should be very important. We should treat very cautiously when we use the public domain such as internet. We should keep a check on how much we share on the new to keep our self safe. We should not fall for phishing schemes. Its always good to remember the old saying -- “If its too good to be true, it probably is”