SlideShare a Scribd company logo
1 of 23
CYBER CRIME ,
THREATS AND
THEIR SECURITY
MEASURES
Submitted by –
Shraddha
Class – 7 Mars
Roll No - 27
WHAT IS CYBER CRIME ?
CYBER
CRIME
Cybercrime is defined as a crime in which a
computer is the object of the crime (hacking,
phishing, spamming) or is used as a tool to
commit an offense (hate crimes).
Cybercriminals may use computer technology to
access personal information, business trade secrets
or use the internet for exploitative or malicious
purposes.
Criminals can also use computers for
communication and document or data storage.
Criminals who perform these illegal activities are
often referred to as hackers.
CYBER CRIME AGAINST AN INDIVIDUAL
PERSON- 1. E-MAIL SPOOFING
• Spoofing means hoax or misleading . In it,
a receiver of message is fooled into
believing that the message received by
him is from a trusted source, which is not
so . The message is bogus. When a user
clicks on the link which is falsely provided
by the sender, the malware or virus enters
the system of the user.
2. CYBER BULLYING
• It is an act of harming or harassing through
information technology in a deliberate
manner. This includes insulting remarks and
threatening messages sent by e-mail
spreading rumors about the person either by
e-mails or social networking sites, posting
embarrassing photos and videos to hurt the
person, derogatory remarks against gender,
race, religion, or nationality.
CYBER CRIMES AGAINST
PROPERTY – 1. IDENTITY
THEFT
• Identity theft is the deliberate use of
someone else's identity, usually as a
method to gain a financial advantage
or obtain credit and other benefits in
the other person's name , and
perhaps to the other person's
disadvantage or loss.
• The person whose identity has been
assumed may suffer adverse
consequences, especially if they are
held responsible for the perpetrator's
actions. Identity theft occurs when
someone uses another's personally
identifying information, like their
name, identifying number, or credit
card number without their
to commit fraud or other crimes.
2. PHISHING
• Phishing is the fraudulent act of acquiring private
and sensitive information, such as credit card
numbers, personal identification and account
usernames and passwords.
• Using a complex set of social engineering
techniques and computer programming
expertise, phishing websites lure email recipients
and Web users into believing that a spoofed
website is legitimate and genuine.
• In actuality, the phishing victim later discovers
his personal identity and other vital information
have been stolen and exposed.
VIRUS
• WHAT IS ‘VIRUS’ ?
A computer virus is a program or a set of
programs that disrupts the normal functioning of a
computer. A virus infects or destroys data. Like
biological virus, it enters the host (computer)
without the permission or knowledge of the host.
The full form of VIRUS is Vital Information
Resources Under Seize. The essential resources of
a computer, like memory, processing speed, data,
and programs are hampered when a virus spreads
into a system.
TYPES OF
VIRUS
Boot Sector Virus
Network Virus
Macro Virus
1. BOOT SECTOR VIRUS
• This type of virus damages the boot sector of a hard
disk or a floppy drive. A disk or hard drive comprises
of smaller sections known as Sectors. The first
Sector is called the Boot Sector. It holds the master
boot record, which is responsible for reading and
loading the operating system. Boot Sector Virus
becomes active at the time of booting the machine
and destroys the data in the hard disk.
• Examples are – Disk Killer, Stone Virus etc.
2. NETWORK VIRUS
• Network Virus rapidly spreads through a Local
Network Area (LAN), and sometimes throughout
the internet. Generally, network viruses multiply
through shared resources, i.e., shared drives and
folders.. When the virus infects a computer, it
searches through the network to attack its new
potential prey. When the virus finishes affecting the
computer, it moves on to the next and the cycle
repeats itself. The most dangerous network viruses
are Nimda and SQL Slammer.
3. MACRO VIRUS
• A Macro virus is associated with application
software, like Word, Excel, PowerPoint. When
opening the infected document, macro virus
gets loaded into the main memory and destroys
the data stored in hard disk. These viruses cause
a sequence of actions that get performed
automatically, when the application is started.
Once a macro virus gets active onto our
computer, every document we produce will
become infected.
HACKING
• Hacking refers to an illegal entry into a computer system or a
network. Hackers write or use ready-made computer
programs to attack the target computer. Some hackers do it
just for enjoyment while others hack for personal monetary
gains by stealing credit card information and transferring
money from various bank accounts to their own or stealing
sensitive information and extorting money from some
corporate giants.
CYBER SECURITY
• Cyber Security is a collection
of technologies, processes
and practices designed to
protect networks,
computers, programs and
data from attack, damage or
unauthorized access.
INSTALL THE FOLLOWING TO PREVENT
CYBER CRIME -
1. ANTIVIRUS
It is a computer program, that is designed to identify,
prevent, and remove viruses from a computer. It
performs the following tasks :-
 Scans computer files to look for known viruses from
virus dictionary.
 Identifies suspicious behaviour of any computer
program which might indicate infection.
 Scans incoming e-mails, which might contain virus
in the attachment.
FEATURES OF ANTIVIRUS
SOFTWARE
 Full System Scans – These type of scans are needed when
we install antivirus software for the first time or recently, we
have updated our antivirus software. This ensures that there
are no hidden viruses present in our system.
 Custom Scan – It helps us to scan our system as per our
requirements.
 Virus Definitions – Antivirus software depends on the virus
definitions to identify malware. That is the reason we get
regular updates on the new virus definitions.
 Actions taken by antivirus - Antivirus software takes three
types of actions whenever a virus is found. These are :-
Repair It – The identified
virus gets removed from
the infected file. This is
usually the best option.
Delete It – The infected file
gets deleted along with the
virus. This option is used if
the virus cannot be
from the data file.
Quarantine It – When the
antivirus program is not sure
whether the file is infected or
not, it separates out the file so
that the virus doesn’t spread. It
is called quarantining.
2. FIREWALLS
• Firewall is a security system that protects our
computer by preventing unauthorized users
from gaining access to it through network or
internet. It can either be hardware or software or
a combination or both. It is implemented on the
gateway of a network and follows a specific set
of rules defined by the user or the network
administrator. Based on these rules, it controls
the incoming and outgoing network traffic.
3. BIOMETRICS
• It is the safest method to give authorization rights to
an individual. In Biometrics, a person is verified by
means of his/her unique biological or physical
characteristics. It identifies a person by retinal scan,
fingerprints, voice recognition etc. These
characteristics of a person are saved in a database.
When a person tries to access the system, the new
data put by him is matched with the saved data. If
verified by the unique identifier the person can
access the system.
4. PASSWORDS
• A password is a sequence of
characters, numbers and special
symbols that a user is supposed to
enter to gain access to the
computer. It guarantees that the
system is accessed only by the
authorized users. To protect data
and important information, strong
passwords should be used.
Cyber Security Measures to Prevent Cyber Crimes

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranaviVerma
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Billtrust
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securityVansh Bathla
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber security
Cyber securityCyber security
Cyber security
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 

Similar to Cyber Security Measures to Prevent Cyber Crimes

Cyber crime types
Cyber crime typesCyber crime types
Cyber crime typeskiran yadav
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas InformáticaDani Díaz
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1NihanthReddyBalaiahg
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Malware Detection and Prevention
Malware Detection and PreventionMalware Detection and Prevention
Malware Detection and Preventionkamranrazzaq8
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 

Similar to Cyber Security Measures to Prevent Cyber Crimes (20)

cyber security
cyber security cyber security
cyber security
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Computer security
Computer securityComputer security
Computer security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
COMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptxCOMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptx
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Malware Detection and Prevention
Malware Detection and PreventionMalware Detection and Prevention
Malware Detection and Prevention
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 

Recently uploaded

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Cyber Security Measures to Prevent Cyber Crimes

  • 1. CYBER CRIME , THREATS AND THEIR SECURITY MEASURES Submitted by – Shraddha Class – 7 Mars Roll No - 27
  • 2. WHAT IS CYBER CRIME ?
  • 3. CYBER CRIME Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes. Criminals can also use computers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers.
  • 4. CYBER CRIME AGAINST AN INDIVIDUAL PERSON- 1. E-MAIL SPOOFING • Spoofing means hoax or misleading . In it, a receiver of message is fooled into believing that the message received by him is from a trusted source, which is not so . The message is bogus. When a user clicks on the link which is falsely provided by the sender, the malware or virus enters the system of the user.
  • 5. 2. CYBER BULLYING • It is an act of harming or harassing through information technology in a deliberate manner. This includes insulting remarks and threatening messages sent by e-mail spreading rumors about the person either by e-mails or social networking sites, posting embarrassing photos and videos to hurt the person, derogatory remarks against gender, race, religion, or nationality.
  • 6. CYBER CRIMES AGAINST PROPERTY – 1. IDENTITY THEFT
  • 7. • Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name , and perhaps to the other person's disadvantage or loss. • The person whose identity has been assumed may suffer adverse consequences, especially if they are held responsible for the perpetrator's actions. Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number without their to commit fraud or other crimes.
  • 9. • Phishing is the fraudulent act of acquiring private and sensitive information, such as credit card numbers, personal identification and account usernames and passwords. • Using a complex set of social engineering techniques and computer programming expertise, phishing websites lure email recipients and Web users into believing that a spoofed website is legitimate and genuine. • In actuality, the phishing victim later discovers his personal identity and other vital information have been stolen and exposed.
  • 10. VIRUS • WHAT IS ‘VIRUS’ ? A computer virus is a program or a set of programs that disrupts the normal functioning of a computer. A virus infects or destroys data. Like biological virus, it enters the host (computer) without the permission or knowledge of the host. The full form of VIRUS is Vital Information Resources Under Seize. The essential resources of a computer, like memory, processing speed, data, and programs are hampered when a virus spreads into a system.
  • 11. TYPES OF VIRUS Boot Sector Virus Network Virus Macro Virus
  • 12. 1. BOOT SECTOR VIRUS • This type of virus damages the boot sector of a hard disk or a floppy drive. A disk or hard drive comprises of smaller sections known as Sectors. The first Sector is called the Boot Sector. It holds the master boot record, which is responsible for reading and loading the operating system. Boot Sector Virus becomes active at the time of booting the machine and destroys the data in the hard disk. • Examples are – Disk Killer, Stone Virus etc.
  • 13. 2. NETWORK VIRUS • Network Virus rapidly spreads through a Local Network Area (LAN), and sometimes throughout the internet. Generally, network viruses multiply through shared resources, i.e., shared drives and folders.. When the virus infects a computer, it searches through the network to attack its new potential prey. When the virus finishes affecting the computer, it moves on to the next and the cycle repeats itself. The most dangerous network viruses are Nimda and SQL Slammer.
  • 14. 3. MACRO VIRUS • A Macro virus is associated with application software, like Word, Excel, PowerPoint. When opening the infected document, macro virus gets loaded into the main memory and destroys the data stored in hard disk. These viruses cause a sequence of actions that get performed automatically, when the application is started. Once a macro virus gets active onto our computer, every document we produce will become infected.
  • 15. HACKING • Hacking refers to an illegal entry into a computer system or a network. Hackers write or use ready-made computer programs to attack the target computer. Some hackers do it just for enjoyment while others hack for personal monetary gains by stealing credit card information and transferring money from various bank accounts to their own or stealing sensitive information and extorting money from some corporate giants.
  • 16. CYBER SECURITY • Cyber Security is a collection of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
  • 17. INSTALL THE FOLLOWING TO PREVENT CYBER CRIME - 1. ANTIVIRUS It is a computer program, that is designed to identify, prevent, and remove viruses from a computer. It performs the following tasks :-  Scans computer files to look for known viruses from virus dictionary.  Identifies suspicious behaviour of any computer program which might indicate infection.  Scans incoming e-mails, which might contain virus in the attachment.
  • 18. FEATURES OF ANTIVIRUS SOFTWARE  Full System Scans – These type of scans are needed when we install antivirus software for the first time or recently, we have updated our antivirus software. This ensures that there are no hidden viruses present in our system.  Custom Scan – It helps us to scan our system as per our requirements.  Virus Definitions – Antivirus software depends on the virus definitions to identify malware. That is the reason we get regular updates on the new virus definitions.  Actions taken by antivirus - Antivirus software takes three types of actions whenever a virus is found. These are :-
  • 19. Repair It – The identified virus gets removed from the infected file. This is usually the best option. Delete It – The infected file gets deleted along with the virus. This option is used if the virus cannot be from the data file. Quarantine It – When the antivirus program is not sure whether the file is infected or not, it separates out the file so that the virus doesn’t spread. It is called quarantining.
  • 20. 2. FIREWALLS • Firewall is a security system that protects our computer by preventing unauthorized users from gaining access to it through network or internet. It can either be hardware or software or a combination or both. It is implemented on the gateway of a network and follows a specific set of rules defined by the user or the network administrator. Based on these rules, it controls the incoming and outgoing network traffic.
  • 21. 3. BIOMETRICS • It is the safest method to give authorization rights to an individual. In Biometrics, a person is verified by means of his/her unique biological or physical characteristics. It identifies a person by retinal scan, fingerprints, voice recognition etc. These characteristics of a person are saved in a database. When a person tries to access the system, the new data put by him is matched with the saved data. If verified by the unique identifier the person can access the system.
  • 22. 4. PASSWORDS • A password is a sequence of characters, numbers and special symbols that a user is supposed to enter to gain access to the computer. It guarantees that the system is accessed only by the authorized users. To protect data and important information, strong passwords should be used.