SlideShare a Scribd company logo
1 of 15
Presentation Topic: Cyber Security
Submitted by: Sanjana Moon (163-15-8443)
H R Shuvo (163-15-8450)
Submitted To: Mr. Narayan Ranjan Chakraborty
Assistant Professor
Department of CSE
Submission Date-
02-12-18
Cyber Security
Action against
cyber crime
What is cyber security
Cybersecurity refers to a set of techniques used to
protect the integrity of networks, programs and data
from attack, damage or unauthorized access.
Cyber security is important for network, data and
application security.
Security types
• Communication security-protecting organization
communication media , technology , and content.
• Network security-is the protection of networking
components, connection and content.
• Information security-protection of information and
its critical elements , including the systems and
hardware that use , store or transmit that
information
What is cyber crime
• The former descriptions were "computer crime",
"computer-related crime" or "crime by computer". With
the pervasion of digital technology, some new terms like
"high-technology" or "information-age" crime were added
to the definition. Also, Internet brought other new terms,
like "cybercrime" and "net" crime.
• Other forms include "digital", "electronic", "virtual" , "IT",
"high-tech" and technology-enabled" crime .
History
• The first recorded cyber crime was
recorded in the year 1820!!!
• The first spam email took place in 1978
The first Virus was installed on an
Apple Computer in 1982
Cyber crimes includes
i. Illegal access
ii. Illegal Interception
iii. System Interference
iv. Data Interference
v. Misuse of devices
vi. Fraud
Why should we care?
• It is a criminal activity committed on the
internet.
• Cyber crime-Where computer is either a
tool or target or both
Advantage of cyber security
 It will defend from hacks and virus.
 The application of cyber security used in
our PC needs update every week.
 The security developers will update their
database every week once. Hence the new
virus also deleted
Safety tips …
• Use antivirus software
Uninstall unnecessary software
• Maintain backup
• Check security settings
• Use secure connection
• Open attachments carefully
• Use strong passwords , don’t give personal
information unless require
A short Awareness video
Conclusion
• The only system which is truly secure is
one which is switched off and unplugged.
• So , only way to be safe is Pay attention
and Act smart.
THANK YOU!!

More Related Content

What's hot

What's hot (20)

Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 

Similar to Cyber crime and security

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfAnkitShrestha37
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfShantanuDharekar
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )TechnoHacks_Infosystem
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityHome
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Cyber Security Infotech
 
recent trends in technology.pptx
recent trends in technology.pptxrecent trends in technology.pptx
recent trends in technology.pptxkeerthivemireddy
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber securitydivyanigarg2
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptxjondon17
 
CYBER SECURITY 101.pptx
CYBER SECURITY 101.pptxCYBER SECURITY 101.pptx
CYBER SECURITY 101.pptxTejasPathak29
 

Similar to Cyber crime and security (20)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Mian
MianMian
Mian
 
Mian
MianMian
Mian
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
recent trends in technology.pptx
recent trends in technology.pptxrecent trends in technology.pptx
recent trends in technology.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
CYBER SECURITY 101.pptx
CYBER SECURITY 101.pptxCYBER SECURITY 101.pptx
CYBER SECURITY 101.pptx
 
Cyber security (1).pptx
Cyber security (1).pptxCyber security (1).pptx
Cyber security (1).pptx
 

More from sanjana mun

Tech aware website design
Tech aware website designTech aware website design
Tech aware website designsanjana mun
 
Adaptation & Personalization of web application
Adaptation & Personalization of web applicationAdaptation & Personalization of web application
Adaptation & Personalization of web applicationsanjana mun
 
Impact of TV and video games on childrens
Impact of TV and video games on childrensImpact of TV and video games on childrens
Impact of TV and video games on childrenssanjana mun
 
Tools for system analysis
Tools for system analysisTools for system analysis
Tools for system analysissanjana mun
 
Network topologies
Network topologiesNetwork topologies
Network topologiessanjana mun
 
Electrical circuit verification of K irchhoff’s Current Law(KCL) & Current di...
Electrical circuit verification of K irchhoff’s Current Law(KCL) & Current di...Electrical circuit verification of K irchhoff’s Current Law(KCL) & Current di...
Electrical circuit verification of K irchhoff’s Current Law(KCL) & Current di...sanjana mun
 
Basic C Structure and related terms with example
Basic C Structure and related terms with exampleBasic C Structure and related terms with example
Basic C Structure and related terms with examplesanjana mun
 
Application's of Numerical Math in CSE
Application's of Numerical Math in CSEApplication's of Numerical Math in CSE
Application's of Numerical Math in CSEsanjana mun
 
Road accident and student's protest at Bangladesh
Road accident and student's protest  at Bangladesh Road accident and student's protest  at Bangladesh
Road accident and student's protest at Bangladesh sanjana mun
 

More from sanjana mun (13)

Tech aware website design
Tech aware website designTech aware website design
Tech aware website design
 
Adaptation & Personalization of web application
Adaptation & Personalization of web applicationAdaptation & Personalization of web application
Adaptation & Personalization of web application
 
Impact of TV and video games on childrens
Impact of TV and video games on childrensImpact of TV and video games on childrens
Impact of TV and video games on childrens
 
Fragmentaton
Fragmentaton Fragmentaton
Fragmentaton
 
Tools for system analysis
Tools for system analysisTools for system analysis
Tools for system analysis
 
Virtual Memory
Virtual MemoryVirtual Memory
Virtual Memory
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Electrical circuit verification of K irchhoff’s Current Law(KCL) & Current di...
Electrical circuit verification of K irchhoff’s Current Law(KCL) & Current di...Electrical circuit verification of K irchhoff’s Current Law(KCL) & Current di...
Electrical circuit verification of K irchhoff’s Current Law(KCL) & Current di...
 
Exceptions
ExceptionsExceptions
Exceptions
 
square matrix
square matrixsquare matrix
square matrix
 
Basic C Structure and related terms with example
Basic C Structure and related terms with exampleBasic C Structure and related terms with example
Basic C Structure and related terms with example
 
Application's of Numerical Math in CSE
Application's of Numerical Math in CSEApplication's of Numerical Math in CSE
Application's of Numerical Math in CSE
 
Road accident and student's protest at Bangladesh
Road accident and student's protest  at Bangladesh Road accident and student's protest  at Bangladesh
Road accident and student's protest at Bangladesh
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Cyber crime and security

  • 1. Presentation Topic: Cyber Security Submitted by: Sanjana Moon (163-15-8443) H R Shuvo (163-15-8450) Submitted To: Mr. Narayan Ranjan Chakraborty Assistant Professor Department of CSE Submission Date- 02-12-18
  • 3. What is cyber security Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access. Cyber security is important for network, data and application security.
  • 4. Security types • Communication security-protecting organization communication media , technology , and content. • Network security-is the protection of networking components, connection and content. • Information security-protection of information and its critical elements , including the systems and hardware that use , store or transmit that information
  • 5. What is cyber crime • The former descriptions were "computer crime", "computer-related crime" or "crime by computer". With the pervasion of digital technology, some new terms like "high-technology" or "information-age" crime were added to the definition. Also, Internet brought other new terms, like "cybercrime" and "net" crime. • Other forms include "digital", "electronic", "virtual" , "IT", "high-tech" and technology-enabled" crime .
  • 6. History • The first recorded cyber crime was recorded in the year 1820!!!
  • 7. • The first spam email took place in 1978
  • 8. The first Virus was installed on an Apple Computer in 1982
  • 9. Cyber crimes includes i. Illegal access ii. Illegal Interception iii. System Interference iv. Data Interference v. Misuse of devices vi. Fraud
  • 10. Why should we care? • It is a criminal activity committed on the internet. • Cyber crime-Where computer is either a tool or target or both
  • 11. Advantage of cyber security  It will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted
  • 12. Safety tips … • Use antivirus software Uninstall unnecessary software • Maintain backup • Check security settings • Use secure connection • Open attachments carefully • Use strong passwords , don’t give personal information unless require
  • 14. Conclusion • The only system which is truly secure is one which is switched off and unplugged. • So , only way to be safe is Pay attention and Act smart.