Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber crime and security ppt

415,897 views

Published on

Published in: Technology
  • If you’re looking for a great essay service then you should check out ⇒ www.WritePaper.info ⇐. A friend of mine asked them to write a whole dissertation for him and he said it turned out great! Afterwards I also ordered an essay from them and I was very happy with the work I got too.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Writing good research paper is quite easy and very difficult simultaneously. It depends on the individual skill set also. You can get help from research paper writing. Check out, please ⇒ www.WritePaper.info ⇐
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Here's just how easy it is to make money with our service: 1, Look for an email each morning from the pro Race Consultants. 2, Place your bets as advised. 3, Collect your winnings! learn more.... ➽➽ https://url.cn/gjzSn2x2
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • If we are speaking about saving time and money this site ⇒ www.HelpWriting.net ⇐ is going to be the best option!! I personally used lots of times and remain highly satisfied.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Boyfriend More Responsive. I don't know how to say this, but ever since I've been using your program, I've seen my breasts grow by 1 cup size and my boyfriend seems to be a lot more affectionate towards me now! He cuddles me longer every night and buys me flowers every week. It's as if he's just been turned into a super-lover by my breast growing. I love it. 》》》 https://dwz1.cc/iZqgQnlK
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Cyber crime and security ppt

  1. 1. CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3rd Year. Roll-11DIS110. RAVENSHAW UNIVERSITY.
  2. 2. CONTENTS          Introduction. Definition. History. Cyber threat evolution. Categories of cyber crime. Types of cyber crime. Prevention. Security. Conclusion.
  3. 3. INTRODUCTION The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet.
  4. 4. DEFINING CYBER CRIME  Crime committed using a computer and the internet to steal data or information.  Illegal imports.  Malicious programs.
  5. 5. Cyber crime is nothing but where the computer used as an object or subject of crime..
  6. 6. HISTORY • The first recorded cyber crime took place in the year 1820.
  7. 7. CYBER THREAT EVOLUTION
  8. 8. CATEGORIZATION OF CYBER CRIME • The Computer as a Target • The computer as a weapon
  9. 9. TYPES OF CYBER CRIME • • • • • • Hacking Denial of service attack Virus Dissemination Computer Vandalism Cyber Terrorism Software Piracy
  10. 10. HACKING • Hacking in simple terms means an illegal intrusion into a computer system and/or network.
  11. 11. DENIAL OF SERVICE ATTACK • Act by the criminal, who floods the bandwidth of the victims network. • Is his e-mail box with spam mail depriving him of the services.
  12. 12. VIRUS DISSEMINATION • Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)
  13. 13. COMPUTER VANDALISM • Damaging or destroying data rather than stealing. • Transmitting virus
  14. 14. CYBER TERRORISM • Use of Internet based attacks in terrorist activities. • Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  15. 15. SOFTWARE PIRACY • Theft of software through the illegal copying of genuine programs. • Distribution of products intended to pass for the original.
  16. 16. TYPES OF CYBER ATTACK BY PERCENTAGE • • • • • • • • Financial fraud: Sabotage of data/networks: Theft of proprietary information: System penetration from the outside: Denial of service: Unauthorized access by insiders: Employee abuse of internet privileges Viruses 11% 17% 20% 25% 27% 71% 79% 85%
  17. 17. SAFETY TIPS FOR CYBER CRIME • • • • • • Use antivirus software’s. Insert firewalls. Uninstall unnecessary software Maintain backup. Check security settings. Stay anonymous - choose a genderless screen name. • Never give your full name or address to strangers. • Learn more about Internet privacy.
  18. 18. Security
  19. 19. CYBER SECURITY • Internet security is a branch of computer security specifically related to the Internet. • It's objective is to establish rules and measure to use against attacks over the Internet.
  20. 20. ADVANTAGES OF CYBER SECURITY • Defend us from critical attacks. • Browse the safe website. • Internet security process all the incoming and outgoing data on our computer.
  21. 21. CONCLUSION Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.

×