SlideShare a Scribd company logo
1 of 18
Cybercrime &
Security
INDEX
• Introduction
• What is Cybercrime ?
• Cybercrimes in India
• Categorize of Cybercrimes
• Types of Cybercrimes
• Algorithms used for cybercrimes
• Security
Introduction :
• The IT revolution resulted in a phenomenal increase in the
number of cyberspace users all over the world. The birth of the
internet resulted in networking which helped millions of users to
connect online, thus facilitating the sharing of information.
• In India also, there was an overwhelming increase in the number
of internet users.
History:
• The first recorded cyber crime took place in the year 1820!
• In 1820, Joseph-Marie Jacquard, a textile manufacturer in France,
produced the loom. This device allowed the repetition of a series of
steps in the weaving of special fabrics. This resulted in a fear
amongst Jacquard's employees that their traditional employment
and livelihood were being threatened. They committed acts of
sabotage to discourage Jacquard from further use of the new
technology. This is the first recorded cyber crime !
What is Cybercrime ?
• Cybercrime is a term for any illegal activity that uses a computer as its
primary means of commission.
• Cybercrime encompasses any criminal act dealing with computers
and networks (called hacking).
• Additionally, cyber crime also includes traditional crimes conducted through
the Internet.
Categories:
• The Computer as a Target : Using a computer
to attack other computer.
• The Computer as a Weapon : Using a computer
to commit a real world crime.
Types of Cybercrimes
• Hacking
• Child Pornography
• Denial of Service attack
• Virus Dissemination
• Computer Vandalism
• Cyber Terrorism
• Software Piracy
Some algorithms used in Cybercrimes:
• Heart bleed
• Shellshock
• Poodle
• Rosetta Flash
• Facebook hosted DDoS with notes app
• Google Two Factors Authentication bypass
Cyber Security
• Internet security is a branch of computer security specifically
related to the internet.
• Its objective is to establish rules and measure to use against
attacks over the Internet.
Top 10 Cyber Crime Prevention Tips
• Use Strong Passwords
• Secure your computer
• Be Social-Media Savvy
• Secure your Mobile Devices
• Install the latest operating system updates
Contd.....
• Protect your Data
• Secure your wireless network
• Protect your e-identity
• Avoid being scammed
• Call the right person for help
Advantages of cyber security
• Protects system against viruses, worms, spyware and other unwanted
programs.
• Protection against data from theft.
• Protects the computer from being hacked.
• Minimizes computer freezing and crashes.
• Gives privacy to users
The Disadvantages
• Firewalls can be difficult to configure correctly.
• Incorrectly configured firewalls may block users from performing certain
actions on the Internet, until the firewall configured correctly.
• Makes the system slower than before.
• Need to keep updating the new software in order to keep security up to
date.
• Could be costly for average user.
“
”
Technology gives us power, but it does not and cannot tell us
how to use that power. Thanks to technology, we can instantly
communicate across the world, but it still doesn't help us know
what to say.
Jonathan Sacks
Cybercrime & Security
Cybercrime & Security

More Related Content

What's hot

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 

What's hot (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
cyber crime
cyber crimecyber crime
cyber crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 

Similar to Cybercrime & Security

Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
Alisha Korpal
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 

Similar to Cybercrime & Security (20)

Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
E secuity
E secuityE secuity
E secuity
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Cyber security
Cyber security        Cyber security
Cyber security
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 

Cybercrime & Security

  • 2. INDEX • Introduction • What is Cybercrime ? • Cybercrimes in India • Categorize of Cybercrimes • Types of Cybercrimes • Algorithms used for cybercrimes • Security
  • 3. Introduction : • The IT revolution resulted in a phenomenal increase in the number of cyberspace users all over the world. The birth of the internet resulted in networking which helped millions of users to connect online, thus facilitating the sharing of information. • In India also, there was an overwhelming increase in the number of internet users.
  • 4. History: • The first recorded cyber crime took place in the year 1820! • In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime !
  • 5.
  • 6. What is Cybercrime ? • Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. • Cybercrime encompasses any criminal act dealing with computers and networks (called hacking). • Additionally, cyber crime also includes traditional crimes conducted through the Internet.
  • 7.
  • 8. Categories: • The Computer as a Target : Using a computer to attack other computer. • The Computer as a Weapon : Using a computer to commit a real world crime.
  • 9. Types of Cybercrimes • Hacking • Child Pornography • Denial of Service attack • Virus Dissemination • Computer Vandalism • Cyber Terrorism • Software Piracy
  • 10. Some algorithms used in Cybercrimes: • Heart bleed • Shellshock • Poodle • Rosetta Flash • Facebook hosted DDoS with notes app • Google Two Factors Authentication bypass
  • 11. Cyber Security • Internet security is a branch of computer security specifically related to the internet. • Its objective is to establish rules and measure to use against attacks over the Internet.
  • 12. Top 10 Cyber Crime Prevention Tips • Use Strong Passwords • Secure your computer • Be Social-Media Savvy • Secure your Mobile Devices • Install the latest operating system updates
  • 13. Contd..... • Protect your Data • Secure your wireless network • Protect your e-identity • Avoid being scammed • Call the right person for help
  • 14. Advantages of cyber security • Protects system against viruses, worms, spyware and other unwanted programs. • Protection against data from theft. • Protects the computer from being hacked. • Minimizes computer freezing and crashes. • Gives privacy to users
  • 15. The Disadvantages • Firewalls can be difficult to configure correctly. • Incorrectly configured firewalls may block users from performing certain actions on the Internet, until the firewall configured correctly. • Makes the system slower than before. • Need to keep updating the new software in order to keep security up to date. • Could be costly for average user.
  • 16. “ ” Technology gives us power, but it does not and cannot tell us how to use that power. Thanks to technology, we can instantly communicate across the world, but it still doesn't help us know what to say. Jonathan Sacks