• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Cybercrime and security

Cybercrime and security






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Cybercrime and security Cybercrime and security Presentation Transcript

    • Seminar Presentation on Cyber Crime And Security By Shishupal Nagar 8CSB-1(95)DEPARTMENT OF COMPUTER SCIENCE &ENGINEERING Jaipur Engineering College & Research Centre Sitapura , Tonk , Road Jaipur
    • What is Cyber Crime?Reasons for Cyber CrimeCyber CriminalsClassificationTypes of Cyber CrimeSafety tips for Cyber crimeCyber SecurityAdvantage of SecurityConclusionsReferences
    • Cybercrime is nothing but where the computer used as an object or subject of crime.Crime committed using a computer and the internet to steal a person’s identity.Illegal imports.Malicious programs.
    • Capacity to store data in comparatively small spaceEasy to accessComplexNegligenceLoss of evidence
    • Those who are doing crimes by using the computer as an target orobject.Children and adolescents between the age group of 6 – 18 yearsOrganised hackersProfessional hackers / crackersDissatisfied employees
    • When Computer Is used:-As a Target: using a computer to attack other computers.As a weapon: using a computer to commit real world crimes.
    • HackingEmail bombingData diddlingSalami attacksEmail spoofingDenial of Service attackVirus / worm attacksLogic bombsSoftware piracy
    • Hacking in simple terms means an illegal instruction into a computer system and/or network. It is also known as CRACKING.Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage..
    • Sending huge volumes of e-mailTo an address or server in an attempt to overflow the mailbox or overwhelm the serverZip BombingMethods of email bombing  Mass Mailing  Link Listing
    • Changing of data before or during entry into the computer systemForging or counterfeiting documents used for data entryExchanging valid disks and tapes with modified replacements.Prevention: Regular Audits Supervising employees
    • A series of minor attacks that together results in a larger attackUsed for financial crimes in which criminals steal money or resources a bit at a time from a systemPrevention:  Find indications of an attack  Random audits  Dont ignore what appear to be errors in computer- based financial systems.
    • The sender address and other parts of the e-mail header are altered .From, Return-Path and Reply-To fieldsAlthough the e-mail appears to come from the address indicated in the From field it actually comes from another source.Prevention  Antivirus  Use cryptographic signatures
    • This is an act by the cyber criminal to make any host network unavailable for the guests.These attacks are mostly done by group of people.This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.
    • Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network.They usually affect the data on a computer, either by altering or deleting it.Programs that multiply like viruses but spread from computer to computer are called as worms.
    • If a piece of code intentionally inserted into a software system.That will set off a malicious function when specified conditions are met.Prevention: Monitoring system Application logs are the keys to identifying unwarranted activity
    • Theft of software through the illegal copying of genuine programs.Distribution of products intended to pass for the original.
    • Use antivirus software’sInsert firewallsUninstall unnecessary softwareMaintain backupCheck security settingsStay anonymous - choose a genderless screen nameNever give your full name or address to strangers
    • Avoiding use of Unauthorized software.Avoid opening of unknown email.Use internet filtering software.Data Level Security (Using encrypting softwares).Dont respond to harassing or negative messages.Get out of uncomfortable or hostile situations quickly.Save offending messages.Learn more about Internet privacy.
    • Internet security is a branch of computer security specifically related to the Internet.Its objective is to establish rules and measure to use against attacks over the Internet.
    • The cyber security will defend us from critical attacks.It helps us to browse the safe website.Internet security process all the incoming and outgoing data on our computer.Security will defend from hacks and viruses.
    • It is not possible to eliminate cyber crime from the cyber space.It is quite possible to check them.Awareness is the first step in protecting yourself.So we must pay attention to all those issues and protect the World from Cyber Crime.The IT Act is a historical step in the cyber world.
    •  http://www.computerhope.com/jargon/d http://www.slideshare.com/ www.google.com/ http://seminarsonly.com/ http://1000projects.com/