SlideShare a Scribd company logo
1 of 18
CYBER
SECURITY
Group members:
Prisha, Vaidehi, Nishika, Maitri,
Suvashmita, Stuti Patel, Aadrika
Cybercrime is the use of a computer as an instrument to further illegal ends, such as committing fraud,
trafficking in intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the
internet, has grown in importance as the computer has become central to commerce, entertainment, and
government.
INTRODUCTION:
Cyber crime can be classified into 3
major categories -
1) Crimes against individuals
2) Crimes against property
3) Crimes against government
CATEGORIESOFCYBERCRIME
AGAINST INDIVIDUAL
This include cyber crimes committed
against individual person. This can be
in form of stalking ,trafficking ,email
spoofing ,hacking, ransomware etc
SECURITY
AGAINST GOVERNMENT
Thiscrimemanifestsitself intoterrorism
whenanindividualcracks intogovernment
ormiliartymaintainedwebsite.
Whilecrimesagainst propertywillultimatelyaffect
individuals,theyareattacking thecomputerorthe
serveranddestroyingit (computervandalism).Orby
transmitting harmfulprograms.
AGAINST PROPERTY
TYPES OF CYBER CRIMES
● Hacking
● Virus dissemination
● Phishing
● Cyber stalking
● Cyberterrorism
CYBER CRIME - THREAT TO NATIONAL SECURITY
Cyberterrorism : One of the type of cyber threat to
the national security
● Simple-unstructured attack
● Advanced-unstructured attack
● Complex-coordinated attack
CYBER CRIME - THREAT TO NATIONAL SECURITY
Criminals Using It As a Weapon : Criminals using
hacking and other nefarious digital schemes to
cause disruption and chaos.
● Increased DIGITALIZATION
● Publicize Illicitly acquired information
● Chaos - major metropolitan areas
No matter who the person committing the crime is
their main target is on the beneficial information of
the Citizens and the Government .directly or
indirectly the effect can be seen on both.
Protection from attackers.
AIM:
❏ Protect the
confidentiality
❏ Protect against the
unauthorised
❏ Promote the
availability of data if
authorized users
AIC(Availability, integrity
and confidentiality)
CYBER SECURITY
TOP 5 CYBER CRIME PREVENTION TIPS
1. USE STRONG PASSWORDS
2. SECURE YOUR COMPUTER
3. BE SOCIAL-MEDIA SAVVY
4. SECURE YOUR MOBILE DEVICES
5. CALL THE RIGHT PERSON FOR HELP
You could enter a subtitle
here if you need it
SIGNIFICANT CYBER ATTACKS FROM 2006-2020
CONCLUSION
❏ Cyber crimes are also known as computer crimes,digital
crimes, e-crimes and electronic crimes
❏ The crime will affect the loss of revenue, waste of valuable
time, damaged reputations and reduced productivity
❏ As an IT user ,we should have to be aware of some of the cyber
laws in the country
❏ Hopefully,we can be more careful and never involve in any
cyber crime
THANK YOU

More Related Content

Similar to Cyber Security Document Summary

Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarDr.S.Jagadeesh Kumar
 
Presentation (11).pptx
Presentation (11).pptxPresentation (11).pptx
Presentation (11).pptxTEENATHOMAS75
 
Presentation (11).pptx
Presentation (11).pptxPresentation (11).pptx
Presentation (11).pptxTEENATHOMAS75
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 

Similar to Cyber Security Document Summary (20)

Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
 
Presentation (11).pptx
Presentation (11).pptxPresentation (11).pptx
Presentation (11).pptx
 
Presentation (11).pptx
Presentation (11).pptxPresentation (11).pptx
Presentation (11).pptx
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Cyber security
 Cyber security Cyber security
Cyber security
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 

Recently uploaded

100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Researchmichael115558
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Delhi Call girls
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfadriantubila
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 

Recently uploaded (20)

100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 

Cyber Security Document Summary

  • 1. CYBER SECURITY Group members: Prisha, Vaidehi, Nishika, Maitri, Suvashmita, Stuti Patel, Aadrika
  • 2. Cybercrime is the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the internet, has grown in importance as the computer has become central to commerce, entertainment, and government. INTRODUCTION:
  • 3.
  • 4. Cyber crime can be classified into 3 major categories - 1) Crimes against individuals 2) Crimes against property 3) Crimes against government CATEGORIESOFCYBERCRIME
  • 5. AGAINST INDIVIDUAL This include cyber crimes committed against individual person. This can be in form of stalking ,trafficking ,email spoofing ,hacking, ransomware etc SECURITY
  • 6.
  • 7.
  • 8. AGAINST GOVERNMENT Thiscrimemanifestsitself intoterrorism whenanindividualcracks intogovernment ormiliartymaintainedwebsite. Whilecrimesagainst propertywillultimatelyaffect individuals,theyareattacking thecomputerorthe serveranddestroyingit (computervandalism).Orby transmitting harmfulprograms. AGAINST PROPERTY
  • 9.
  • 10. TYPES OF CYBER CRIMES ● Hacking ● Virus dissemination ● Phishing ● Cyber stalking ● Cyberterrorism
  • 11. CYBER CRIME - THREAT TO NATIONAL SECURITY Cyberterrorism : One of the type of cyber threat to the national security ● Simple-unstructured attack ● Advanced-unstructured attack ● Complex-coordinated attack
  • 12. CYBER CRIME - THREAT TO NATIONAL SECURITY Criminals Using It As a Weapon : Criminals using hacking and other nefarious digital schemes to cause disruption and chaos. ● Increased DIGITALIZATION ● Publicize Illicitly acquired information ● Chaos - major metropolitan areas No matter who the person committing the crime is their main target is on the beneficial information of the Citizens and the Government .directly or indirectly the effect can be seen on both.
  • 13. Protection from attackers. AIM: ❏ Protect the confidentiality ❏ Protect against the unauthorised ❏ Promote the availability of data if authorized users AIC(Availability, integrity and confidentiality) CYBER SECURITY
  • 14. TOP 5 CYBER CRIME PREVENTION TIPS 1. USE STRONG PASSWORDS 2. SECURE YOUR COMPUTER 3. BE SOCIAL-MEDIA SAVVY 4. SECURE YOUR MOBILE DEVICES 5. CALL THE RIGHT PERSON FOR HELP
  • 15. You could enter a subtitle here if you need it
  • 16. SIGNIFICANT CYBER ATTACKS FROM 2006-2020
  • 17. CONCLUSION ❏ Cyber crimes are also known as computer crimes,digital crimes, e-crimes and electronic crimes ❏ The crime will affect the loss of revenue, waste of valuable time, damaged reputations and reduced productivity ❏ As an IT user ,we should have to be aware of some of the cyber laws in the country ❏ Hopefully,we can be more careful and never involve in any cyber crime