This is an educational and self-awareness ppt explaining what is and actually qualifies as a cybercrime along with what are the ways we can protect ourselves from this!
2. INTRODUCTION
Cyber Crime is an unlawful activity
where a combination of Computer
devices and the Internet is involved
where in the computer can be both the
tool and the victim along with the user
operating it!
The first case of cyber crime ever
reported dates back to 1976.
And cyber crime related to technology
dates back to 1820 !!!
3. CATEGORIZATION
TARGET
Using a computing device to attack
other computing or electronic
devices.
Examples include HACKING ,Virus
Attacks ,DOS Attacks ,etc.
WEAPON
Here the computing devices and
electronic devices are used to
commit Real World Crimes with the
help of INTERNET
Cyber Terrorism, Credit Card
Fraud,etc.
4. TYPES OF
CYBER
CRIMES
HACKING
DENIAL OF SERVICE ATTACKS
VIRUS DISSMINITION
COMPUTER VANDALISM
SPAMMING
CYBER THREATENING
SOFTWARE PIRACY
ILLEGAL ACCESS TO
INFORMATION
CYBER TERRORISM
5. CYBER CRIME
THREATENS
NATIONAL SECURITY
Different entities like Government, organisations
and individuals across INDIA depend on these
connections to the internet.
Consequently, if Indian govt. computer systems
were compromised, such impairment could
endanger India’s national security in a variety of
ways, like…
Cyber-attacks on telecommunications systems
that affect lines of communication across sea and
air routes could inhibit India’s international trade
and access to externally sourced resources such
as petroleum
Technologically advanced computer tools used to
target the Indian Defence Force’s information
networks (such as ballistic missile defence
systems and communications satellites) would
also increase the risk of harm to the Indian
population
6. CYBER SECURITY
THE SOLUTION?
The Parliament has enacted a draft of legislation
dealing with the issue of Cyber Security. Hence the
Cyber Laws helping keeping the cyber security tight.
Cyber Security refers to the body of technologies,
processes, and practices designed to protect
networks, devices, programs, and data from attack,
damage, or unauthorized access.
This is the go to solution for us to prevent us being a
victim of cyber crime ,but we cant always depend on
it! We ourselves have to be cautious, take
precautions while giving information on the net,etc.