2. CONTENTS
● Introduction
● Cyber Security
● Categories of cyber crime
● Merits and Demerits of cyber security
● Types of cyber crime
● Conclusion
3. INTRODUCTION
In this world of 8 Billion peoples, security has been our first
priority and our daily need for surfing a safe internet. In this
busy world, threats and cyber attacks are increasing day by
day at a light speed. So to protect the system, some Cyber
Security steps have been taken. This helps protect our
system from malware practices and online threats. One
should surf the internet and need an environment to be
safe.
4. ● Cyber-Security refers to the act of protecting and ensuring the
safety of computer systems and electronic devices from targeted
cyber-attacks, opportunist malware (- viruses, trojans and bugs)
or accidental introduction of malware by users.
CYBER SECURITY
● These cyber attacks are usually aimed at
accessing, changing, or destroying
sensitive information; extorting money
from users; or interrupting normal
business processes.
5. We can categorize the cyber crime in two different ways -
● THE COMPUTER AS A TARGET - using a computer to attack
other computers eg. Hacking, Virus/Worms attacks, DoS attack;
etc.
● THE COMPUTER AS A WEAPON - Using a computer to
commit real world crime eg. Credit Card fraud; etc.
CATEGORIES OF CYBER CRIME
6. MERITS AND DEMERITS OF
CYBER SECURITY
MERITS DEMERITS
● Cyber security will defend us from
critical cyber- attacks.
● It helps us to browse safe websites.
● It will defend us from hacks & viruses.
● The application of cyber security used
in our PC needs to update every week.
● Internet security processes all the
incoming & outgoing data on our
computers.
● Gives us privacy.
● It is expensive; most of the users can’t
afford this.
● A normal user can’t use this properly,
requiring special expertise.
● Lack of knowledge is the main
problem.
● It was not easy to use.
● It makes the system slower.
● It could take hours to days to fix a
breach in security.
7. TYPES OF CYBER CRIME
PHISHING SPAM EMAIL SPYWARE / ADWARE
Phishing is a fraudulent
attempt, usually made
through email, to steal your
personal information.
A common online phishing
scam starts with an email
message that appears to
come from a trusted source
(legitimate site) but
actually directs recipients
to provide information to a
fraudulent website.
Email Scam is the
electronic version of junk
mail.
It involves sending
unwanted messages, often
unsolicited advertising, to a
large number of recipients.
Spam is a serious security
concern as it can be used to
deliver Trojan horses,
Viruses, worms; etc.
Spyware is a type of
malware that hackers use
to spy on you in order to
gain access to your
personal information,
banking details; etc.
Adware is a type of
malware that bombards
you with endless ads and
pop-up windows that could
potentially be dangerous
for your device.
8. CONCLUSION
Today due to high internet penetration, Cyber security is
one of the biggest need of the world as cyber security
threats are very dangerous to the country’s security. Not
only the government but also the citizens should spread
awareness among the people to always update your
system and network security settings and to the use
proper anti-virus so that the use proper antivirus so that
your system and network security settings stay virus
and malware-free.