SlideShare a Scribd company logo
1 of 21
Cyber Security
Contents
• Introduction
• Categories of Cyber Crime
• Principles of Computer Security
• Types of Cyber Crime
• Types of Cyber Attack by Percentage
• Cyber Threat Evolution
• Advantages of Cyber Security
• Safety Tips to Cyber Crime
Introduction
• The Internet in India is growing rapidly. There are two sides to a coin. Internet also
has it’s own disadvantages is cyber crime-illegal activity committed on the Internet.
• Crime committed using a computer and the internet to steal a person’s identity or
illegal imports or malicious programs. Cyber crime is an activity done using
computers and the internet.
• Cyber security refers to the technologies and processes designed to protect computers,
networks and data from unauthorized access and attacks delivered via the internet by
cyber criminals. Though, cyber security is important for the network, data and
application security.
• The objective of cyber security is to establish rules and measure to use against attacks
over the internet.
Categories of Cyber Crime
We can categorize cyber crime in two ways:-
The computer as a target: Using a computer to attacks other computer e.g.
Hacking, Virus/Worms attacks, DoS attack etc.
The computer as a weapon: Using a computer to commit real world crime
e.g. credit card fraud etc.
• How do you stop an attacker from getting access to a layer
below your protection mechanism?
• Every protection mechanism defines a security perimeter
(boundary). Attackers try to bypass protection mechanisms.
Principles of Computer Security
hardware
applications
services (middleware)
operating system
OS kernel
Hackers attack at
level below security
perimeter
Types of Cyber Crime
• Hacking
• Phishing
• Denial of Service
• Spam Email
• Spyware, Adware
• Malware (Trojan, Virus, Worms etc. )
• ATM Skimming and Point of Scale Crimes
• Ransomware
Hacking
• Hacking in simple terms means an
illegal intrusion into a computer system
and/or network.
• It is also known as cracking.
Government websites are the hot targets
of the hackers due to the press
coverage, it receives.
Phishing
• Phishing is a fraudulent attempt, usually made through email, to steal your
personal information.
• Phishing is the attempt to obtain sensitive information such as username, password
and credit card details, often for malicious reasons through an electronic
communication (such as E-mail).
• A common online phishing scam starts with an email message that appears to
come from a trusted source(legitimate site) but actually directs recipients to
provide information to a fraudulent web site.
Denial of Service
• This is an act by the criminals who floods the Bandwidth of the victims network.
• In the DoS attack, a hacker uses a single internet connection to either exploit a
software vulnerability or flood a target with fake request-usually in an attempt to
exhaust server resources.
• On the other hand, DDoS attacks are launched from multiple connected devices
that are distributed across the internet.
• DoS = When a single host attacks.
• DDoS = when multiple hosts attack simultaneously and continuously.
Figure of DDoS attack:
Spam Email
• Email Spam is the electronic version of junk mail. It involves sending unwanted
messages, often unsolicited advertising, to a large number of recipients. Spam is a
serious security concern as it can be used to deliver Trojan horses, viruses, worms,
spyware, and targeted phishing attacks.
Malware
• It’s malicious software ( such as Virus ,Worms & Trojan ) , which specifically
designed to disrupt or damage computer system or mobile device.
• Hackers use malware for any number of reasons such as, extracting personal
information or passwords, stealing money, or preventing owners from accessing
their device.
• Viruses are programs that attach themselves to a computer or a file and then
circulate themselves to other files and to other computers on a network. They
usually affect the data on a computer and mobile device either by altering or
deleting it.
• Worms unlike viruses do not need the host to attach themselves. They merely
make functional copies of themselves and do this repeatedly till they eat up all the
available space on the computer’s memory.
• Trojan is a type of malware that pretends to be something useful, helpful, or fun
while actually causing harm or stealing data. Trojans are often silently
downloading other malware (e.g. spyware, adware, ransomware) on an infected
device as well.
• Trojans can infect you in places where you might not expect it, such as emails,
downloads and more. It's always better to be safe than sorry when it comes to
avoiding this type of malware.
Spyware
• Spyware is a type of malware that hackers use to spy on you in order to gain
access to your personal information, banking details, or online activity. We should
protect ourselves by an anti-spyware tool.
Adware
• Adware is a type of malware that bombards you with endless ads and pop-up
windows that could potentially be dangerous for your device. The best way to
remove adware is to use an adware removal tool.
Ransomware
• Ransomware is as scary as it sounds. Hackers use this technique to lock you out of
your devices and demand a ransom in return for access. Ransomware puts you in a
sticky situation, so it's best to know how to avoid it.
• Ransomware (a.k.a. rogueware or scareware) restricts access to your computer
system and demands that a ransom is paid in order for the restriction to be
removed. The most dangerous ransomware attacks are caused by Wannacry, Petya,
Cerber and Locky ransomware. The money which suppose to be paid to remove
ransomware from your system which is called ransom money.
• Current affairs : eg. WannaCrypt , Petya Variant
ATM Skimming and Point of Scale Crimes
• It is a technique of compromising the ATM machine by installing a skimming
device a top the machine keypad to appear as a genuine keypad or a device made
to be affixed to the card reader to look like a part of the machine.
• Additionally, malware that steals credit card data directly can also be installed on
these devices. Successful implementation of skimmers cause in ATM machine to
collect card numbers and personal identification number codes that are later
replicated to carry out fraudulent transaction.
Types of Cyber Attack by Percentage
(Source-FBI)
• Financial fraud 11%
• Sabotage of data/networks 17%
• Theft of proprietary information 20%
• System penetration from the outside 25%
• Denial of Service 27%
• Unauthorized access by insiders 71%
• Employee abuse of internet privileges 79%
• Viruses 85%
Cyber Threat Evolution
Advantages of Cyber Security
• It will defend us from hacks and virus. It helps us to browse the safe website.
• Internet Security process all the incoming and outgoing data on our computer.
• The cyber security will defend us from critical attacks.
• The application of cyber security used in our PC needs update every week.
• The security developers will update their database every week once. Hence the
new virus also detected.
Safety Tips to Cyber Crime
• Use Antivirus Software.
• Insert Firewalls.
• Uninstall unnecessary software.
• Maintain backup.
• Check security settings.
• Never give your full name or address to strangers.
• Learn more about the internet privacy.

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Social engineering
Social engineering Social engineering
Social engineering
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Security threats
Security threatsSecurity threats
Security threats
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Malware
MalwareMalware
Malware
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similar to Ppt on cyber security

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityAvani Patel
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfAlefya1
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethicssamina khan
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptxAmeyBarbade1
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
Hacking and cyber security
Hacking and  cyber securityHacking and  cyber security
Hacking and cyber securityinfosecindia
 

Similar to Ppt on cyber security (20)

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdf
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 
E secuity
E secuityE secuity
E secuity
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Hacking and cyber security
Hacking and  cyber securityHacking and  cyber security
Hacking and cyber security
 

Recently uploaded

Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.soniya singh
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Datingkojalkojal131
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...SUHANI PANDEY
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 

Recently uploaded (20)

Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 

Ppt on cyber security

  • 2. Contents • Introduction • Categories of Cyber Crime • Principles of Computer Security • Types of Cyber Crime • Types of Cyber Attack by Percentage • Cyber Threat Evolution • Advantages of Cyber Security • Safety Tips to Cyber Crime
  • 3. Introduction • The Internet in India is growing rapidly. There are two sides to a coin. Internet also has it’s own disadvantages is cyber crime-illegal activity committed on the Internet. • Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs. Cyber crime is an activity done using computers and the internet. • Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered via the internet by cyber criminals. Though, cyber security is important for the network, data and application security. • The objective of cyber security is to establish rules and measure to use against attacks over the internet.
  • 4. Categories of Cyber Crime We can categorize cyber crime in two ways:- The computer as a target: Using a computer to attacks other computer e.g. Hacking, Virus/Worms attacks, DoS attack etc. The computer as a weapon: Using a computer to commit real world crime e.g. credit card fraud etc.
  • 5. • How do you stop an attacker from getting access to a layer below your protection mechanism? • Every protection mechanism defines a security perimeter (boundary). Attackers try to bypass protection mechanisms. Principles of Computer Security hardware applications services (middleware) operating system OS kernel Hackers attack at level below security perimeter
  • 6. Types of Cyber Crime • Hacking • Phishing • Denial of Service • Spam Email • Spyware, Adware • Malware (Trojan, Virus, Worms etc. ) • ATM Skimming and Point of Scale Crimes • Ransomware
  • 7. Hacking • Hacking in simple terms means an illegal intrusion into a computer system and/or network. • It is also known as cracking. Government websites are the hot targets of the hackers due to the press coverage, it receives.
  • 8. Phishing • Phishing is a fraudulent attempt, usually made through email, to steal your personal information. • Phishing is the attempt to obtain sensitive information such as username, password and credit card details, often for malicious reasons through an electronic communication (such as E-mail). • A common online phishing scam starts with an email message that appears to come from a trusted source(legitimate site) but actually directs recipients to provide information to a fraudulent web site.
  • 9.
  • 10. Denial of Service • This is an act by the criminals who floods the Bandwidth of the victims network. • In the DoS attack, a hacker uses a single internet connection to either exploit a software vulnerability or flood a target with fake request-usually in an attempt to exhaust server resources. • On the other hand, DDoS attacks are launched from multiple connected devices that are distributed across the internet. • DoS = When a single host attacks. • DDoS = when multiple hosts attack simultaneously and continuously.
  • 11. Figure of DDoS attack:
  • 12. Spam Email • Email Spam is the electronic version of junk mail. It involves sending unwanted messages, often unsolicited advertising, to a large number of recipients. Spam is a serious security concern as it can be used to deliver Trojan horses, viruses, worms, spyware, and targeted phishing attacks.
  • 13. Malware • It’s malicious software ( such as Virus ,Worms & Trojan ) , which specifically designed to disrupt or damage computer system or mobile device. • Hackers use malware for any number of reasons such as, extracting personal information or passwords, stealing money, or preventing owners from accessing their device. • Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer and mobile device either by altering or deleting it.
  • 14. • Worms unlike viruses do not need the host to attach themselves. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on the computer’s memory. • Trojan is a type of malware that pretends to be something useful, helpful, or fun while actually causing harm or stealing data. Trojans are often silently downloading other malware (e.g. spyware, adware, ransomware) on an infected device as well. • Trojans can infect you in places where you might not expect it, such as emails, downloads and more. It's always better to be safe than sorry when it comes to avoiding this type of malware.
  • 15. Spyware • Spyware is a type of malware that hackers use to spy on you in order to gain access to your personal information, banking details, or online activity. We should protect ourselves by an anti-spyware tool. Adware • Adware is a type of malware that bombards you with endless ads and pop-up windows that could potentially be dangerous for your device. The best way to remove adware is to use an adware removal tool.
  • 16. Ransomware • Ransomware is as scary as it sounds. Hackers use this technique to lock you out of your devices and demand a ransom in return for access. Ransomware puts you in a sticky situation, so it's best to know how to avoid it. • Ransomware (a.k.a. rogueware or scareware) restricts access to your computer system and demands that a ransom is paid in order for the restriction to be removed. The most dangerous ransomware attacks are caused by Wannacry, Petya, Cerber and Locky ransomware. The money which suppose to be paid to remove ransomware from your system which is called ransom money. • Current affairs : eg. WannaCrypt , Petya Variant
  • 17. ATM Skimming and Point of Scale Crimes • It is a technique of compromising the ATM machine by installing a skimming device a top the machine keypad to appear as a genuine keypad or a device made to be affixed to the card reader to look like a part of the machine. • Additionally, malware that steals credit card data directly can also be installed on these devices. Successful implementation of skimmers cause in ATM machine to collect card numbers and personal identification number codes that are later replicated to carry out fraudulent transaction.
  • 18. Types of Cyber Attack by Percentage (Source-FBI) • Financial fraud 11% • Sabotage of data/networks 17% • Theft of proprietary information 20% • System penetration from the outside 25% • Denial of Service 27% • Unauthorized access by insiders 71% • Employee abuse of internet privileges 79% • Viruses 85%
  • 20. Advantages of Cyber Security • It will defend us from hacks and virus. It helps us to browse the safe website. • Internet Security process all the incoming and outgoing data on our computer. • The cyber security will defend us from critical attacks. • The application of cyber security used in our PC needs update every week. • The security developers will update their database every week once. Hence the new virus also detected.
  • 21. Safety Tips to Cyber Crime • Use Antivirus Software. • Insert Firewalls. • Uninstall unnecessary software. • Maintain backup. • Check security settings. • Never give your full name or address to strangers. • Learn more about the internet privacy.