SlideShare a Scribd company logo
1 of 15
INFORMATION
TECHNOLOGY ART
INTEGRATION
PROJECT ON CYBER
CRIME
BIODATA:
Students name : Smruti Rekha Barik
Class : X Section : “B“
Roll no. : 07
Subject : Information technology (IT)
Guide teacher : Mrs.Kabita Hazra
Topic : Cyber Crime
School name : Kendriya Vidyalaya No-1,Bhubaneswar
1st Shift
ACKNOWLEDGEMENT:
I am very thankful to my respected teacher Mrs. Kabita
Hazra Mam who showed me the path to accomplish my
project work, also for her valuable guidance and precious
suggestions. Every word in this project reflects her
challenging assistance and tremendous command.I am
also highly grateful to my parents and our Principal
Mr.Bhupandra Singh Sir who helped me by providing all
the essentials required to bring out this project.I feel
obliged to be the students of this incomparable school
Kendriya Vidyalaya No-1,Bhubaneswar which has been a
source of strength, knowledge, inspiration and self
esteem for all of us.
CONTENT:
 INTRODUCTION
 DEFINITION
 TYPES OF CYBER CRIME
 PREVENTION
 CONCLUSION
INTRODUCTION :
 Cybercrime is criminal activity that either targets or uses a
computer, a computer network or a networked device.
 Most, but not all, cybercrime is committed by
cybercriminals or hackers who want to make money.
Cybercrime is carried out by individuals ororganizations.
 Some cybercriminals are organized, use advancedtechniques
and are highly technically skilled. Others are novice
hackers.
 Rarely, cybercrime aims to damage computers forreasons
other than profit. These could be political orpersonal.
 The internet in India is growing rapidly.
It has given rise to new opportunities in
every field we can think of be it
entertainment, business, sports or
education.HACK THEF SPY FRALD
INFORMATION HACKING CRIMINAL
COMPUTER 383 CYBER CRIME BO
INTERNET.
 There're two sides of a coin. Internet
also has it's own. disadvantages is
Cyber crime illegal activity committed
on the internet.
TYPES OF CYBER CRIME:
 HACKING
 DENIAL OF SERVICE
ATTACKSPROCESSING ATTEMPT
FAILED
 VIRUS DISSEMINATION
 CYBER TERRORISMUSCANUSER
SAFE
 SOFTWARE PIRACY
HACKING:
 Hacking in simple terms means an illegal
intrusion into a computer system and
network.
 Hacking refers to activities that seek to
compromise digital devices, such as
computers, smartphones, tablets, and even
entire networks. And while hacking might
not always be for malicious purposes,
nowadays most references to hacking, and
hackers, characterize it/them as unlawful
activity by cybercriminals-motivated by
financial gain, protest, information
gathering (spying), and even just for the
"fun" of the challenge.
DENIAL OF SERVICE ATTACK:
 In computing, a denial-of-service attack
(DoSattack) is a cyber-attack in which
theperpetrator seeks to make a machine
or network resource unavailable to its
intended users bytemporarily or
indefinitely disrupting services of a host
connected to the Internet.
 Act by the criminal, who floods the
bandwidth of the victims network.
 In his e-mail box with spam mail depriving
him of theservices.
VIRUS DISSEMINATION
 Virus dissemination is a process of a
Malicious software that attaches to other
software that destroys the system of the
victim. They disrupt the computer
operation and affect the data store
bymodifying or deleting it.
 Malicious software that attaches itself to
other software. (virus, worms,
TrojanHorse, web jacking, e-mail
bombingetc.)
CYBER TERRORISM :
 Cyberterrorism is the use of the
Internet to conduct violent acts that
result in, or threaten, loss of life or
significant bodily harm, in order to
achieve political or ideological gains
through threat or intimidation.
 Use of internet based attacks in
terroristactivities.
 Technology savvy terrorists are using
512-bit encryption, which isimpossible
to decrypt.
SOFTWARE PIRACY:
 Software piracy is a term used to
describethe act of illegally using,
copying ordistributing software without
ownership orlegal rights. The majority
of software todayis purchased as a
single-user license,meaning that only
one computer may have that software
installed on it at one time.
 Theft of software through the illegal
copying of genuine programs.
 Distribution of products intended to
pass for the original.
PREVENTION :
 Use antivirus software’s.
 Insert firewalls.
 Uninstall unnecessary software
 Maintain backup.
 Check security settings
 Stay anonymous - choose a genderless screen name
 Never give your full name or address to strangers
 Learn more about Internet privacy
CONCLUSION:
 Cyber crime is indeed getting
the recognition it deserves.
However, it is not going to
restricted easily.
 In fact, it is highly likely that
cyber crime and its hackers
will continue developing and
upgrading to stay ahead of the
law.
Information technology art INTEGRATION project on cyber crime , Smruti Rekha Barik,  Class 10 B.pptx

More Related Content

What's hot

Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet vimal kumar arora
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber securityyatendrakumar47
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And SecurityShaheda Afreen
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 

What's hot (20)

Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 

Similar to Information technology art INTEGRATION project on cyber crime , Smruti Rekha Barik, Class 10 B.pptx

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfKira Dess
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Ambrish Mishra
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02raja jawahar
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxBigBoss647822
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 

Similar to Information technology art INTEGRATION project on cyber crime , Smruti Rekha Barik, Class 10 B.pptx (20)

Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 

Recently uploaded

The Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdfThe Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdftheknowledgereview1
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Madekojalkojal131
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样umasea
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxGry Tina Tinde
 
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...Niya Khan
 
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfDivyeshPatel234692
 
Notes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testsNotes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testspriyanshukumar97908
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Suhani Kapoor
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...Suhani Kapoor
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...shivangimorya083
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...Suhani Kapoor
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...gurkirankumar98700
 
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...Suhani Kapoor
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjLewisJB
 
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士obuhobo
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...Suhani Kapoor
 

Recently uploaded (20)

The Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdfThe Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdf
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptx
 
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
 
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
 
Notes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testsNotes of bca Question paper for exams and tests
Notes of bca Question paper for exams and tests
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
 
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
 
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
VIP Russian Call Girls in Bhilai Deepika 8250192130 Independent Escort Servic...
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbj
 
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
 
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
 

Information technology art INTEGRATION project on cyber crime , Smruti Rekha Barik, Class 10 B.pptx

  • 2. BIODATA: Students name : Smruti Rekha Barik Class : X Section : “B“ Roll no. : 07 Subject : Information technology (IT) Guide teacher : Mrs.Kabita Hazra Topic : Cyber Crime School name : Kendriya Vidyalaya No-1,Bhubaneswar 1st Shift
  • 3. ACKNOWLEDGEMENT: I am very thankful to my respected teacher Mrs. Kabita Hazra Mam who showed me the path to accomplish my project work, also for her valuable guidance and precious suggestions. Every word in this project reflects her challenging assistance and tremendous command.I am also highly grateful to my parents and our Principal Mr.Bhupandra Singh Sir who helped me by providing all the essentials required to bring out this project.I feel obliged to be the students of this incomparable school Kendriya Vidyalaya No-1,Bhubaneswar which has been a source of strength, knowledge, inspiration and self esteem for all of us.
  • 4. CONTENT:  INTRODUCTION  DEFINITION  TYPES OF CYBER CRIME  PREVENTION  CONCLUSION
  • 5. INTRODUCTION :  Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device.  Most, but not all, cybercrime is committed by cybercriminals or hackers who want to make money. Cybercrime is carried out by individuals ororganizations.  Some cybercriminals are organized, use advancedtechniques and are highly technically skilled. Others are novice hackers.  Rarely, cybercrime aims to damage computers forreasons other than profit. These could be political orpersonal.
  • 6.  The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.HACK THEF SPY FRALD INFORMATION HACKING CRIMINAL COMPUTER 383 CYBER CRIME BO INTERNET.  There're two sides of a coin. Internet also has it's own. disadvantages is Cyber crime illegal activity committed on the internet.
  • 7. TYPES OF CYBER CRIME:  HACKING  DENIAL OF SERVICE ATTACKSPROCESSING ATTEMPT FAILED  VIRUS DISSEMINATION  CYBER TERRORISMUSCANUSER SAFE  SOFTWARE PIRACY
  • 8. HACKING:  Hacking in simple terms means an illegal intrusion into a computer system and network.  Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. And while hacking might not always be for malicious purposes, nowadays most references to hacking, and hackers, characterize it/them as unlawful activity by cybercriminals-motivated by financial gain, protest, information gathering (spying), and even just for the "fun" of the challenge.
  • 9. DENIAL OF SERVICE ATTACK:  In computing, a denial-of-service attack (DoSattack) is a cyber-attack in which theperpetrator seeks to make a machine or network resource unavailable to its intended users bytemporarily or indefinitely disrupting services of a host connected to the Internet.  Act by the criminal, who floods the bandwidth of the victims network.  In his e-mail box with spam mail depriving him of theservices.
  • 10. VIRUS DISSEMINATION  Virus dissemination is a process of a Malicious software that attaches to other software that destroys the system of the victim. They disrupt the computer operation and affect the data store bymodifying or deleting it.  Malicious software that attaches itself to other software. (virus, worms, TrojanHorse, web jacking, e-mail bombingetc.)
  • 11. CYBER TERRORISM :  Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.  Use of internet based attacks in terroristactivities.  Technology savvy terrorists are using 512-bit encryption, which isimpossible to decrypt.
  • 12. SOFTWARE PIRACY:  Software piracy is a term used to describethe act of illegally using, copying ordistributing software without ownership orlegal rights. The majority of software todayis purchased as a single-user license,meaning that only one computer may have that software installed on it at one time.  Theft of software through the illegal copying of genuine programs.  Distribution of products intended to pass for the original.
  • 13. PREVENTION :  Use antivirus software’s.  Insert firewalls.  Uninstall unnecessary software  Maintain backup.  Check security settings  Stay anonymous - choose a genderless screen name  Never give your full name or address to strangers  Learn more about Internet privacy
  • 14. CONCLUSION:  Cyber crime is indeed getting the recognition it deserves. However, it is not going to restricted easily.  In fact, it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law.