2. CONTENT______________________________
• WHAT IS CYBER CRIME.
• HISTORY OF CYBER CRIME.
• TYPES OF CYBER CRIME.
• CYBER SECURITY.
• ADVANTAGES OF CYBER SECURITY.
• SAFETY TIPS FOR CYBER CRIME.
• CYBER LAW OF INDIA.
3. Crime Committed Using a Computer and the
to Steal a Persons’s Identity or illegal Imports or malicious
Programs Cybercrime is Nothing but Where the Computer is used
as an Object or Subject of Crime
WHAT IS THE CYBER CRIME?
4. • The exact origin of cybercrime, the very first instance in which
someone committed a crime across a computer network, is
impossible to know
• The first spam email took place in the year 1978.
• The first virus was installed on Apple computers in the year 1982.
HISTORY OF CYBER CRIME….
6. HACKING.
• Hacking is a Technical process Where finds and exploits the weakness
in computer systems and networks to gain Access.
• Hackers are usually skilled computer programmers with knowledge of
computer security.
__________________________________________________________
THERE ARE BASICALLY THREE TYPES OF HACKERS.
WHITE HAT HACKER(ETHICAL HACKER)
GREY HAT HACKER
BLACK HAT HACKER
7. CREDIT CARD FRAUD
• Credit card fraud is a form of identity theft that involves an
unauthorized taking of another's credit card information for the
purpose of charging purchases to the account or removing funds
from it.
8. PHISHING
• Phishing is when attackers send malicious emails designed
to trick people into falling for a scam. Typically, the intent is
to get users to reveal financial information, system credentials
or other sensitive data.
•
9. CYBERTERRORISM
• Terrorist attacks on the internet are distributed denial of service attacks,
hate websites and hate emails, attacks on sensitive computer networks, etc.
• Technology-savvy terrorists are using 512-bit encryption, which is
impossible to decrypt.
10. SOFTWARE PIRACY
• Piracy refers to the unauthorized duplication of copyrighted
content to the counterfeiting and distribution of products
intended to pass for the original…
11. SPOOFING
• Spoofing is a technique through which a cybercriminal disguises
themselves as a known or trusted source. Spoofing can take many
forms, such as spoofed emails, IP spoofing, DNS Spoofing, GPS
spoofing, website spoofing, and spoofed calls
12. CYBER SECURITY.
• Cybersecurity is the protection to defend internet-connected
devices and services from malicious attacks by hackers,
spammers, and cybercriminals. The practice is used by
companies to protect against phishing schemes, ransomware
attacks, identity theft , data breaches, and financial losses.
13. ADVANTAGES OF CYBER SECURITY.
• Protects sensitive personal information...
• It helps us browse the safe website
• The application of Cyber Security used in our PC needs updating every
week
14. SAFETY TIPS FOR CYBER CRIME.
• Use Antivirus Software
• Insert firewalls
• Uninstall unnecessary Software
• Maintain backup
• Check security settings
• Stay anonymous
• Never Give Your full name or address to strangers