This is a ppt on cyber crime made by me to present in my class.. all the basic concepts of cycber security are included here.. The credit of photos/videos used in ppt goes to respective owner. {this ppt is not recommanded for formal purpose as it is made by a student to present in class
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Cyber Crime Types and Prevention Methods
1.
2. • Click to edit Master text styles
Second level
Third level
Fourth level
Fifth level
• what is cyber crime?...
cyber crime is a crime that involves a computer network.
In these crimes either computers are used for
committing the crime or computer itselve maybe the
target of the criminal.
It is generally done to harm one’s security or finance
3. Identity theft and invasion of
privacy
Sabotage.
Internet fraud
ATM fraud
Wire fraud
File sharing and piracy
Counterfeiting and forgery
Child pornography
Hacking
Computer viruses
Denial of service attacks
saxtortion
Spam, steganography, and e-mail hacking.
5. A is a common cyberattack where
malware (normally malicious software) executes
unauthorized actions on the victim's system..
Malware can use known software vulnerabilities to infect your PC.
A vulnerability is like a hole in your software that can give malware
access to your PC. When you go to a website, it can try to use
vulnerabilities in your web browser to infect your PC with malware
The malicious software (Also known as virus) encompasses many specific
types of attacks such as ransomware, spyware, command and control,
and more.
It can be avoided using genuine antiviruses of trusted company..
Fact:Some companies design these viruses so that they can sell their
anitiviruses...
.
7. Phishing is an attack that attempts to steal your money,
or your identity, by getting you to reveal personal
information -- such as credit card numbers, bank
information, or passwords.
Phishing works by sending messages that look like they
are from a legitimate company or website. Phishing
messages will usually contain a link that takes the user to
a that looks like the real thing.
The victim clicks on a link in the message and is taken to a
malicious site designed to resemble the bank's webpage,
and then hopefully enters their and .
The attacker can now access the victim's account.
8. How can we prevent cyber
crimes....
Cyber crime can be prevented by many
methods...
on of the most common method to prevent it is
using cyber security...
10. Why is cyber security
important?
• The importance of cyber security in the digital
world cannot be understated. A single security
breach can have far-reaching consequences in
today’s interconnected world.
• Cyber security is important for students because
they often get targeted by cyber attacks.
11.
12. WHICH ARE 6 TYPES OF CYBER SECURITY?
It can be divided into
seven main pillars:
• Cloud security
• Endpoint security
• Mobile security
• loT security
• Application security
• Zero trust.
16. Cyber Security Functioning
The framework establishes the
five core functions of effective
cybersecurity as:
Identify.
Protect.
Detect.
Respond.
Recover.