SlideShare a Scribd company logo
1 of 27
Cyber Security
Presnted by :- Prabhat Choudhary
 Bachelor of Computer Applications
D.A.V.V INDORE
CONTENT
2
 INTRODUCTION
 HISTORY OF CYBER CRIME
 CATEGORIES OF CYBER CRIME
 TYPES OF CYBER CRIME
 CYBER ATTACKS
 CYBER SECURITY
 CYBER LAW OF INDIA
 ADVANTAGES OF CYBER SECURITY
 STATISTICS OF CYBER CRIME
3
INTRODUCTION
 Cyber crime is an activity done using computers and
internet. We can say that it is an unlawful acts where in
the computer either a tool or target or both.
 The term cyber security is used to refer to the security
offered through on-line services to protect your online
information.
 Cyber security refers to the body of technologies,
processes, and practices designed to protect networks,
devices, programs, and data from attack, damage, or
unauthorized access. Cyber security may also be referred
to as information technology security
4
HISTORY OF CYBERCRIME
The first recorded cyber crime took place in 1820.
That is not surprising considering the fact that the
abacus, which is thought to be the earliest from of
a computer, has been around since 3500 B.c.
In India, Japan and China, the era of modern
computer, however, began with the analytical
engine of Charles Babbage.
The first spam email took place in 1976 when it
was sent out over theARPANT.
The first virus was installed on an Apple computer
in 1982 when a high school student, Rich skrenta,
developed the EIK Cloner.
5
The computer as a target The computer as a weapon
Using a computer to
attacks other computer,
e.g. Hacking,
virus/worms attacks, Dos
attack etc.
Using a computer to
commit real world crime
e.g. cyber terrorism,
credit card fraud and
pornography etc
CATEGORIESOF CYBER CRIME
6
TYPES OF CYBERCRIME
HACKING
Hacking in simple terms means a
n illegal intrusion info
a computer system and/or network . It is also
known as CRACKING. Government websites are
the hot target of the hackers due to the press
coverage, it receives. Hackers enjoy the media
coverage.
Motive behind the crime called HACKERS
Motive behind the crime called hacking greed
power, publicity, revenge, adventure desire to
access forbidden information destructive mindset
wants to sell n/w security services.
7
TYPES OF CYBERCRIME
CHILD PORNOGRAPHY :
The Internet is beinghighly used by its abusers to
reach and abuse children sexually, worldwide. As
more homes have access to internet, more
children would be using the internet and more are
the chances of falling victim to the aggression of
Pedophiles.
How Do They Operate :
How do they operate Pedophiles use false
identity to trap the children , Pedophiles connect
children in various chat rooms which are used by
children to interact with other children.
8
TYPES OF CYBERCRIME
CHILD PORNOGRAPHY :
The Internet is beinghighly used by its abusers to
reach and abuse children sexually, worldwide. As
more homes have access to internet, more
children would be using the internet and more are
the chances of falling victim to the aggression of
Pedophiles.
How Do They Operate :
How do they operate Pedophiles use false
identity to trap the children , Pedophiles connect
children in various chat rooms which are used by
children to interact with other children.
9
TYPES OF CYBERCRIME
DENIAL OF SERVICE ATTACKS : This is an act by
the criminals who floods the bandwidth of the
victims network or fills his E-mail box with spam
mail depriving him of the service he is entitled to
access or provide. Many DOS attacks, such as the
ping of death and Tear drop attacks.
VIRUS DISSMINITION : Malicious software that
attaches itself to other software. VIRUS , WORMS,
TROJAN HORSE ,WEB JACKING, E-MAIL
BOMBING etc.
COMPUTER VANDALISM : Damaging or
destroying data rather than stealing or misusing
them is called cyber vandalism. These are
program that attach themselves to a file and then
circulate.
10
TYPES OF CYBERCRIME
CYBER TERRORISM : Terrorist attacks on the
Internet is by distributed denial of service
attacks, hate websites and hate E-mails ,
attacks on service network etc.
SOFTWARE PIRACY : Theft of software through
the illegal copying of genuine programs or
the counterfeiting and distribution of
products intended to pass for the original.
11
Cyber Attack’s
Cyber attacks are socially or politically
motivated attacks carried out primarily
through the Internet. Attacks target the
general public or national and corporate
organizations and are carried out through
the spread of malicious programs
(viruses), unauthorized web access, fake
websites, and other means of stealing
personal or institutional information from
targets of attacks, causing far-reaching
damage.
12
Types of Cyber Attack
 Password Attack
 Dos Attack
 Phishing
 Worm,Virus & Trojan Horse Attack
 SQL injection etc.
13
Password Attack
Password Attack refers to various measures
used to discover computer passwords. This
is usually accomplished by recovering
passwords from data stored in, or
transported from, a computer system.
Password cracking is done by guessing the
password or use common password.
14
DoS (Denial of Service) Attack
DOS is an attack used to deny legitimate users access
to a resource such as accessing a website, network,
emails, etc. or making it extremely slow. DoS is the
acronym for Denial of Service.
This type of attack is usually implemented by hitting
the target resource such as a web server with too many
requests at the same time. This results in the server
failing to respond to all the requests. The effect of this
can either be crashing the servers or slowing them
down.
15
Worm, Virus & Trojan Horse Attack
The skilled hackers have programming and computer
networking skills. They often use these skills to gain
access to systems. The objective of targeting an
organization would be to steal sensitive data, disrupt
business operations or physically damage computer
controlled equipment.
Trojans, viruses, and worms can be used to achieve
the above-stated objectives.
16
Cyber Attacks in india
Ransomeware Attack:-
The global Ransomeware attacks that hit
hundred of system to phishing an
dsccaningh rackets ,
At least one cybercrime was reported
every 10 minutes in India in the first six
month of 2017.
17
DDOS Attack At Google
2020:-
On October 16, 2020, Google’s Threat
Analysis Group (TAG) posted a blog update
concerning how the threats and threat
actors are changing their tactics due to the
2020 U.S. election. At the end of the post,
the company snuck in a note:
in 2020, our Security Reliability
18
AWS DDoS Attack in
2020:-
Amazon Web Services, the 800-pound
gorilla of everything cloud computing, was
hit by a gigantic DDoS attack in February
2020. This was the most extreme recent
DDoS attack ever and it targeted an
unidentified AWS customer using a
technique called Connectionless
Lightweight Directory Access Protocol
19
GitHub DDOS Attack in
2018:-
On Feb. 28, 2018, GitHub, a platform for
software developers, was hit with a DDoS
attack that clocked in at 1.35 terabits per
second and lasted for roughly 20 minutes.
According to GitHub, the traffic was traced
back to “over a thousand different
autonomous systems (ASNs) across tens of
thousands of unique endpoints.”
20
CYBER SECURITY
Cyber Security : Cyber Security involves protection of
sensitive personal and business information through
prevention, detection and response to different
online attacks. Cyber security actually preventing
the attacks, cyber security.
Privacy Policy : Before submitting your name , e-mail
, address, on a website look for the sites privacy
policy.
Keep Software Up to Date: If the seller reduces patches
for the software operating system your device
,install them as soon as possible .Installing them
will prevent attackers form being able to take
advantage. Use good password which will be
difficult for thieves to guess. Do not choose option
that allows your computer to remember your
passwords.
21
CYBER SECURITY
DISABLE REMOTE CONNECTIVITY
Some PDA’s and phones are equipped
with wireless technologies, such as
Bluetooth, that can be used to connect
to other devices or computers. You
should disable these features when
they are not in use.
22
ADVANTAGES OF CYBER SECURITY
The cyber security will defend us from data attack
 It helps us to browse the site,website.
 Internet Security process all the incoming and
outgoing data on your computer.
 It will defend us from hacks and virus.
 Application of cyber security used in our P
C
needs update every week
23
CYBER CRIMESTHREATENS NATIONALSECURITY
CYBER CRIMES THREATENS NATIONAL SECURIT IN INDIA
Likewise Union home minister Shivraj Patil said
that the rising level of cyber crime is an indication
of enormous threat to national security. On
Google’s social networking site orkut, facebook,
have been perplexing authorities . Fan clubs of
Underworld Dons like Dawood Ibrahim and Chhota
Shakeel and other wanted underworld dons are
also doing the rounds on orkut. There is huge
potential for damage to national security through
cyber attacks. The internet is a means for money
bounding and funding terrorist attacks in an
organized manner.
24
CYBER LAW OFINDIA
Cyber crime can involve criminal activities that are
traditional in nature, such as theft, fraud, deformation and
mischief, all of which are subjected to the India Penal
code. In simple way we can say that cyber crime is
unlawful acts where in the computer is either a tool or
both.
The abuse of computer has also given birth of new age
crime that are addressed by the Information Technology
Act,2000.
25
SAFETY TIPS TOCYBERCRIME
 Use antivirusSoftware
 InsertFirewalls
 Uninstall unnecessarys
o
f
t
w
a
r
e
 Maintainbackup
 Check securitysettings
26
CONCLUSION
Cyber crime can involve criminal activities that are
traditional in nature, such as theft, fraud, deformation and
mischief, all of which are subjected to the India Penal
code. In simple way we can say that cyber crime is
unlawful acts where in the computer is either a tool or
both.
The abuse of computer has also given birth of new age
crime that are addressed by the Information Technology
Act,2000.
THANK
YOU!
Prabhat Choudhary
7869530486
Phone
Email
Prabhat31302@gmail.com

More Related Content

What's hot

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME ppt
CYBER CRIME pptCYBER CRIME ppt
CYBER CRIME ppt
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to Cybersecurity2021

Similar to Cybersecurity2021 (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 

Cybersecurity2021

  • 1. Cyber Security Presnted by :- Prabhat Choudhary  Bachelor of Computer Applications D.A.V.V INDORE
  • 2. CONTENT 2  INTRODUCTION  HISTORY OF CYBER CRIME  CATEGORIES OF CYBER CRIME  TYPES OF CYBER CRIME  CYBER ATTACKS  CYBER SECURITY  CYBER LAW OF INDIA  ADVANTAGES OF CYBER SECURITY  STATISTICS OF CYBER CRIME
  • 3. 3 INTRODUCTION  Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts where in the computer either a tool or target or both.  The term cyber security is used to refer to the security offered through on-line services to protect your online information.  Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security
  • 4. 4 HISTORY OF CYBERCRIME The first recorded cyber crime took place in 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c. In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. The first spam email took place in 1976 when it was sent out over theARPANT. The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 5. 5 The computer as a target The computer as a weapon Using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. Using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc CATEGORIESOF CYBER CRIME
  • 6. 6 TYPES OF CYBERCRIME HACKING Hacking in simple terms means a n illegal intrusion info a computer system and/or network . It is also known as CRACKING. Government websites are the hot target of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motive behind the crime called HACKERS Motive behind the crime called hacking greed power, publicity, revenge, adventure desire to access forbidden information destructive mindset wants to sell n/w security services.
  • 7. 7 TYPES OF CYBERCRIME CHILD PORNOGRAPHY : The Internet is beinghighly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of Pedophiles. How Do They Operate : How do they operate Pedophiles use false identity to trap the children , Pedophiles connect children in various chat rooms which are used by children to interact with other children.
  • 8. 8 TYPES OF CYBERCRIME CHILD PORNOGRAPHY : The Internet is beinghighly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of Pedophiles. How Do They Operate : How do they operate Pedophiles use false identity to trap the children , Pedophiles connect children in various chat rooms which are used by children to interact with other children.
  • 9. 9 TYPES OF CYBERCRIME DENIAL OF SERVICE ATTACKS : This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many DOS attacks, such as the ping of death and Tear drop attacks. VIRUS DISSMINITION : Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING etc. COMPUTER VANDALISM : Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.
  • 10. 10 TYPES OF CYBERCRIME CYBER TERRORISM : Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails , attacks on service network etc. SOFTWARE PIRACY : Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 11. 11 Cyber Attack’s Cyber attacks are socially or politically motivated attacks carried out primarily through the Internet. Attacks target the general public or national and corporate organizations and are carried out through the spread of malicious programs (viruses), unauthorized web access, fake websites, and other means of stealing personal or institutional information from targets of attacks, causing far-reaching damage.
  • 12. 12 Types of Cyber Attack  Password Attack  Dos Attack  Phishing  Worm,Virus & Trojan Horse Attack  SQL injection etc.
  • 13. 13 Password Attack Password Attack refers to various measures used to discover computer passwords. This is usually accomplished by recovering passwords from data stored in, or transported from, a computer system. Password cracking is done by guessing the password or use common password.
  • 14. 14 DoS (Denial of Service) Attack DOS is an attack used to deny legitimate users access to a resource such as accessing a website, network, emails, etc. or making it extremely slow. DoS is the acronym for Denial of Service. This type of attack is usually implemented by hitting the target resource such as a web server with too many requests at the same time. This results in the server failing to respond to all the requests. The effect of this can either be crashing the servers or slowing them down.
  • 15. 15 Worm, Virus & Trojan Horse Attack The skilled hackers have programming and computer networking skills. They often use these skills to gain access to systems. The objective of targeting an organization would be to steal sensitive data, disrupt business operations or physically damage computer controlled equipment. Trojans, viruses, and worms can be used to achieve the above-stated objectives.
  • 16. 16 Cyber Attacks in india Ransomeware Attack:- The global Ransomeware attacks that hit hundred of system to phishing an dsccaningh rackets , At least one cybercrime was reported every 10 minutes in India in the first six month of 2017.
  • 17. 17 DDOS Attack At Google 2020:- On October 16, 2020, Google’s Threat Analysis Group (TAG) posted a blog update concerning how the threats and threat actors are changing their tactics due to the 2020 U.S. election. At the end of the post, the company snuck in a note: in 2020, our Security Reliability
  • 18. 18 AWS DDoS Attack in 2020:- Amazon Web Services, the 800-pound gorilla of everything cloud computing, was hit by a gigantic DDoS attack in February 2020. This was the most extreme recent DDoS attack ever and it targeted an unidentified AWS customer using a technique called Connectionless Lightweight Directory Access Protocol
  • 19. 19 GitHub DDOS Attack in 2018:- On Feb. 28, 2018, GitHub, a platform for software developers, was hit with a DDoS attack that clocked in at 1.35 terabits per second and lasted for roughly 20 minutes. According to GitHub, the traffic was traced back to “over a thousand different autonomous systems (ASNs) across tens of thousands of unique endpoints.”
  • 20. 20 CYBER SECURITY Cyber Security : Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks. Cyber security actually preventing the attacks, cyber security. Privacy Policy : Before submitting your name , e-mail , address, on a website look for the sites privacy policy. Keep Software Up to Date: If the seller reduces patches for the software operating system your device ,install them as soon as possible .Installing them will prevent attackers form being able to take advantage. Use good password which will be difficult for thieves to guess. Do not choose option that allows your computer to remember your passwords.
  • 21. 21 CYBER SECURITY DISABLE REMOTE CONNECTIVITY Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.
  • 22. 22 ADVANTAGES OF CYBER SECURITY The cyber security will defend us from data attack  It helps us to browse the site,website.  Internet Security process all the incoming and outgoing data on your computer.  It will defend us from hacks and virus.  Application of cyber security used in our P C needs update every week
  • 23. 23 CYBER CRIMESTHREATENS NATIONALSECURITY CYBER CRIMES THREATENS NATIONAL SECURIT IN INDIA Likewise Union home minister Shivraj Patil said that the rising level of cyber crime is an indication of enormous threat to national security. On Google’s social networking site orkut, facebook, have been perplexing authorities . Fan clubs of Underworld Dons like Dawood Ibrahim and Chhota Shakeel and other wanted underworld dons are also doing the rounds on orkut. There is huge potential for damage to national security through cyber attacks. The internet is a means for money bounding and funding terrorist attacks in an organized manner.
  • 24. 24 CYBER LAW OFINDIA Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code. In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both. The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act,2000.
  • 25. 25 SAFETY TIPS TOCYBERCRIME  Use antivirusSoftware  InsertFirewalls  Uninstall unnecessarys o f t w a r e  Maintainbackup  Check securitysettings
  • 26. 26 CONCLUSION Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code. In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both. The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act,2000.