SlideShare a Scribd company logo
1 of 25
Introduction of Cyber crime
Victims of these crimes
Types of cyber crime
General preventation
Computer Viruses
Types of viruses
HACKING
VIRUS 
SOFTWARE PrivACY
IRC Crime
PHISHING
CYBER STALKING
SALAMI ATTACK
E mail bombing
HACKING
A white hat hacker breaks security for helping .
They are working for a security company which makes
security software.
A "black hat" hacker is a hacker who
"violates computer security for
personal gain"
destroy data
A grey hat hacker is a combination of
a black hat and a white hat hacker.
They first tell the victims' and then they
hack
*Elite hacker
A social status among hackers,
 the most skilled and
Famous hackers.
*Script kiddies'
A script kiddies  is a non-expert who
breaks into computer systems by
using pre-packaged automated tools
written by others, they have little
knowledge.
A "n00b is someone who is new to hacking
and has almost no knowledge or
experience of the workings of technology
and hacking
 For profit, protest, or challenge.
 A large fraction of hacker
attacks have been pranks
 Financial Gain
 Revenge
 Venting anger at a company or
organization
 Terrorism
 *For profit, protest, or
challenge.
 *Financial Gain
 *Revenge
 *Terrorism
 *just for fun 
SOFTWARE PIRACYSOFTWARE PRivACY
IRC CRIME
*Internet Relay Chat (IRC) servers
have chat rooms in which people
from anywhere the world can come
together and chat with each other .
*Criminals use it for meeting
*Hackers use it for discussing
 sharing the
 techniques
*Cyber Stalking – to tease
women and girls by send
Different Messages .
*In such crime criminal
makes very small
changes in such a manner
that no one can notice
that.
Criminal or programer
• makes such program
• that deducts small
•amount like Rs. 2.50
• per month from the
•account of all the
•customer of the Bank.
SALAMI  ATTACK
E-Mail Bombing:
Email bombing refers to sending
a large amount of e-mails to the
victim resulting in interruption in
the victims’ e-mail account or
mail servers
VirusVirus
DIFFERENT TYPES OF COMPUTER
VIRUS
•Resident Viruses
•Direct Action Viruses
•Overwrite Viruses
•Boot Virus
•Macro Virus
•Directory Virus
•Polymorphic Virus
•File Infectors
•FAT Virus
•Trojans or Trojan Horses
•Financial crimes
•Cyber stalking
*Sale of illegal articles
*Online gambling
*Unauthorized access to
computer
Theft of information
contained in electronic form
• Virus/worm attacks
• Trojan attacks
• Internet time theft
• Password cracking
General Preventions
>Spam blocker
*Turn on your spam blocker. Most Internet
providers provide a spam blocking feature to
prevent unwanted messages/ emails.
>Firewall protection
*Use your computer's firewall
protection feature, which is a
digitally created barrier that
prevents hackers from getting
into your computer system.
Always keep it turned on
Anti-virus software
Install anti-virus software for your
computer. You also need to regularly
update your anti-virus software and
that you do a once-a-week scan to
locate and eliminate any spyware,
viruses and other problems.
Caution in providing
personal information
Think before & Don’t provide ur
personal information via a
website you know nothing
about, especially those that ask
for your name, mailing address,
bank account number or social
security number.
Secure shopping
Make sure that you do online
shopping on a secure website,
like those with a url that starts
with "https“.. If you don't see
these anywhere on the site, you
run the risk of submitting credit
card information and other
personal information to a site
that may be a fraud.
Monitoring activities
Monitor the online activities of
your children brothers small
sisters. They should only
have access to a computer
located in a central area of
your home and you should
regularly check all browser
and email activity
Introduction to Cyber Crime Types and Prevention

More Related Content

What's hot

CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)Siddharth Anand
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security Bill Gibbs
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & SecurityAnchit Rajawat
 

What's hot (20)

CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Ppt
PptPpt
Ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Viewers also liked

Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Jay Visavadiya
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Social media Workshop FC Twente stadion
Social media Workshop FC Twente stadionSocial media Workshop FC Twente stadion
Social media Workshop FC Twente stadionGezondheid Acties
 
KENDRICK KIM_SYLLABUSFALL2014_RE 201F
KENDRICK KIM_SYLLABUSFALL2014_RE 201FKENDRICK KIM_SYLLABUSFALL2014_RE 201F
KENDRICK KIM_SYLLABUSFALL2014_RE 201FKendrick Kim
 
Microfinance
MicrofinanceMicrofinance
Microfinancesudpal88
 
9 3 multiplying polynomials by monomials lesson
9 3  multiplying polynomials by monomials lesson9 3  multiplying polynomials by monomials lesson
9 3 multiplying polynomials by monomials lessongwilson8786
 
Occupational Science
Occupational ScienceOccupational Science
Occupational ScienceDYLGRU98
 
Building homes for generation rent
Building homes for generation rentBuilding homes for generation rent
Building homes for generation rentResolutionFoundation
 
Fa102 a project
Fa102 a projectFa102 a project
Fa102 a projectMWinke1
 

Viewers also liked (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Credit Card Frauds
Credit Card FraudsCredit Card Frauds
Credit Card Frauds
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Social media Workshop FC Twente stadion
Social media Workshop FC Twente stadionSocial media Workshop FC Twente stadion
Social media Workshop FC Twente stadion
 
KENDRICK KIM_SYLLABUSFALL2014_RE 201F
KENDRICK KIM_SYLLABUSFALL2014_RE 201FKENDRICK KIM_SYLLABUSFALL2014_RE 201F
KENDRICK KIM_SYLLABUSFALL2014_RE 201F
 
Microfinance
MicrofinanceMicrofinance
Microfinance
 
9 3 multiplying polynomials by monomials lesson
9 3  multiplying polynomials by monomials lesson9 3  multiplying polynomials by monomials lesson
9 3 multiplying polynomials by monomials lesson
 
Paypalpayment
PaypalpaymentPaypalpayment
Paypalpayment
 
Occupational Science
Occupational ScienceOccupational Science
Occupational Science
 
Building homes for generation rent
Building homes for generation rentBuilding homes for generation rent
Building homes for generation rent
 
Fa102 a project
Fa102 a projectFa102 a project
Fa102 a project
 

Similar to Introduction to Cyber Crime Types and Prevention

Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRameesha1
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 

Similar to Introduction to Cyber Crime Types and Prevention (20)

Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Cyber security
Cyber security Cyber security
Cyber security
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Introduction to Cyber Crime Types and Prevention

  • 1.
  • 2. Introduction of Cyber crime Victims of these crimes Types of cyber crime General preventation Computer Viruses Types of viruses
  • 3.
  • 4.
  • 7.
  • 8. A white hat hacker breaks security for helping . They are working for a security company which makes security software. A "black hat" hacker is a hacker who "violates computer security for personal gain" destroy data A grey hat hacker is a combination of a black hat and a white hat hacker. They first tell the victims' and then they hack
  • 9. *Elite hacker A social status among hackers,  the most skilled and Famous hackers. *Script kiddies' A script kiddies  is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, they have little knowledge. A "n00b is someone who is new to hacking and has almost no knowledge or experience of the workings of technology and hacking
  • 10.  For profit, protest, or challenge.  A large fraction of hacker attacks have been pranks  Financial Gain  Revenge  Venting anger at a company or organization  Terrorism  *For profit, protest, or challenge.  *Financial Gain  *Revenge  *Terrorism  *just for fun 
  • 11.
  • 13.
  • 14. IRC CRIME *Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other . *Criminals use it for meeting *Hackers use it for discussing  sharing the  techniques *Cyber Stalking – to tease women and girls by send Different Messages .
  • 15. *In such crime criminal makes very small changes in such a manner that no one can notice that. Criminal or programer • makes such program • that deducts small •amount like Rs. 2.50 • per month from the •account of all the •customer of the Bank. SALAMI  ATTACK
  • 16. E-Mail Bombing: Email bombing refers to sending a large amount of e-mails to the victim resulting in interruption in the victims’ e-mail account or mail servers VirusVirus
  • 17.
  • 18. DIFFERENT TYPES OF COMPUTER VIRUS •Resident Viruses •Direct Action Viruses •Overwrite Viruses •Boot Virus •Macro Virus •Directory Virus •Polymorphic Virus •File Infectors •FAT Virus •Trojans or Trojan Horses
  • 19.
  • 20. •Financial crimes •Cyber stalking *Sale of illegal articles *Online gambling *Unauthorized access to computer Theft of information contained in electronic form • Virus/worm attacks • Trojan attacks • Internet time theft • Password cracking
  • 21. General Preventions >Spam blocker *Turn on your spam blocker. Most Internet providers provide a spam blocking feature to prevent unwanted messages/ emails. >Firewall protection *Use your computer's firewall protection feature, which is a digitally created barrier that prevents hackers from getting into your computer system. Always keep it turned on
  • 22. Anti-virus software Install anti-virus software for your computer. You also need to regularly update your anti-virus software and that you do a once-a-week scan to locate and eliminate any spyware, viruses and other problems. Caution in providing personal information Think before & Don’t provide ur personal information via a website you know nothing about, especially those that ask for your name, mailing address, bank account number or social security number.
  • 23. Secure shopping Make sure that you do online shopping on a secure website, like those with a url that starts with "https“.. If you don't see these anywhere on the site, you run the risk of submitting credit card information and other personal information to a site that may be a fraud.
  • 24. Monitoring activities Monitor the online activities of your children brothers small sisters. They should only have access to a computer located in a central area of your home and you should regularly check all browser and email activity