Nigel D’souza(C.C.I)Cyber crime Invest.
What is Cyberspace And CybercrimeCyberspaceAn electronic medium of computer system within which peoplecan communicate do r...
History-The first recorded cyber crime took place in the year1820.-The first spam email took place in 1978 when it wassent...
Types of cyber crime-Hacking-Child pornography-Computer vandalism-DoS attack-Virus Dissemination-Software Piracy-Net Extor...
Hacking-Illegal intrusion into a computer system and/or network. i.e.Unauthorized accessChild pornography-Abuse children/t...
DoS attack-Floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the service...
Net extortion-Copying the companies confidential data in order to extortsaid company for huge amountPhishing-Act of sendin...
Cyber crime threatens national security-Ex union home minister Shivraj Patil said that the rising level ofcyber crime is a...
Cyber security-Involves protection of sensitive personal & business informationthrough prevention, detection and response ...
Do’s-Install a firewall , pop-up blocker-Ensure your virus definitions are up to date-Use strong passwords , don’t give pe...
ConclusionThe only system which is truly secure is one which is switchedoff and unplugged.So , only way to be safe is Pay ...
Cyber crime (do's&dont's)
Upcoming SlideShare
Loading in …5
×

Cyber crime (do's&dont's)

987 views

Published on

Cyber security (DO's & DONT's)

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
987
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Cyber crime (do's&dont's)

  1. 1. Nigel D’souza(C.C.I)Cyber crime Invest.
  2. 2. What is Cyberspace And CybercrimeCyberspaceAn electronic medium of computer system within which peoplecan communicate do research, or simply window shop.CybercrimeCrime committed using a computer and the internet i.e.where the computer used as an object or subject of crime.
  3. 3. History-The first recorded cyber crime took place in the year1820.-The first spam email took place in 1978 when it wassent over the Arpanet-The first VIRUS was installed on an Apple computer in1982
  4. 4. Types of cyber crime-Hacking-Child pornography-Computer vandalism-DoS attack-Virus Dissemination-Software Piracy-Net Extortion-Phishing-Spoofing
  5. 5. Hacking-Illegal intrusion into a computer system and/or network. i.e.Unauthorized accessChild pornography-Abuse children/teens sexually-More children would be using the internet and more are thechances of falling victim to the aggression of pedophilesComputer vandalism-Damaging or destroying data rather than stealing or reusing
  6. 6. DoS attack-Floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he isentitled to accessVirus Dissemination-Malicious software that attaches itself to other software(virus, worms, Trojan Horse)Software piracy-Theft of software through the illegal copying of genuineprograms
  7. 7. Net extortion-Copying the companies confidential data in order to extortsaid company for huge amountPhishing-Act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam theuser into surrendering private information that will be usedfor identity theftSpoofing-Getting one computer on a network to pretend to have theidentity off another computer,, usually one with specialaccess privileges ,so as to obtain access to the othercomputers on the network.
  8. 8. Cyber crime threatens national security-Ex union home minister Shivraj Patil said that the rising level ofcyber crime is an indication of an enormous threat to nationalsecurity.-Everything is being operated through computer and hence the riskincreases.-India is at eleventh position , U.S. being the first-Increase in number of cases reported
  9. 9. Cyber security-Involves protection of sensitive personal & business informationthrough prevention, detection and response to different onlineattacks-Protects from attacks by detecting and preventing
  10. 10. Do’s-Install a firewall , pop-up blocker-Ensure your virus definitions are up to date-Use strong passwords , don’t give personal information unlessrequired(not even phone number)-Use secure connections-Disable file sharing , turn off internet when not in use-Use spam filters , delete spam immediately-Use various passwords for various accounts-Don’t believe in everything you read online-Open attachments carefully-Beware of promises to make fast profits-Be smart , don’t act foolish and help in spreading spam
  11. 11. ConclusionThe only system which is truly secure is one which is switchedoff and unplugged.So , only way to be safe is Pay attention andAct smart.

×