SlideShare a Scribd company logo
Cyber Crime and security
Contents:
• Definition
• Brief history
• Categories
• types of cyber crime
• Cyber crime security
• Cyber security advantages
• Safety tips to cyber crime
• Cyber law
• Conclusion
Definition:
• Cybercrime is a term for any illegal activity that uses a computer as
its primary means of commission or to include any illegal activity
that uses a computer for the storage of evidence.
History:
• Cybercrime first started with hackers trying to break into computer networks. Some
did it just for the thrill of accessing high-level security networks, but others sought
to gain sensitive, classified material. Eventually, criminals started to infect computer
systems with computer viruses, which led to breakdowns on personal and business
computers.
• 1973 Teller at New York's Dime Savings Bank uses a computer to embezzle over $2
million
• The first virus was installed on an Apple computer in 1982 when a high school
student, Rich skrenta, developed the EIK Cloner.
Categories:
We can categorize cyber crime in two ways.
• The computer as a target :-
using a computer to attacks other computer, e.g.
Hacking, virus/worms attacks, Dos attack etc.
• The computer as a weapon :-
using a computer to commit real world crime e.g. cyber terrorism
and credit card fraud etc.
Types of cyber crime:
• HACKING:
Hacking in simple terms means an illegal intrusion info a computer
system and/or network . It is also known as CRACKING. Government
websites are the hot target of the hackers due to the press coverage, it
receives. Hackers enjoy the media coverage.
Motive behind the crime called HACKERS
Motive behind the crime called hacking greed power, publicity, revenge,
adventure desire to access forbidden information destructive mindset
wants to sell n/w security services.
DENIAL OF SERVICE ATTACKS:
This is an act by the criminals who
floods the bandwidth of the victims network or fills his E-mail
box with spam mail depriving him of the service he is entitled to
access or provide. Many DOS attacks, such as the ping of death
and Tear drop attacks.
VIRUS DISSMINITION :
Malicious software that attaches itself to other
software. VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E-
MAIL BOMBING etc.
CYBER TERRORISM:
Terrorist attacks on the Internet is by
distributed denial of service attacks, hate websites and hate E-mails ,
attacks on service network etc.
SOFTWARE PIRACY :
Theft of software through the illegal copying
of genuine programs or the counterfeiting and distribution of
products intended to pass for the original.
COMPUTER
VANDALISM :
Damaging or
destroying data rather than stealing or
misusing them is called cyber
vandalism. These are program that
attach themselves to a file and then
circulate
Cyber security:
• Internet security is branch of security
specifically related to internet.
• It’s objective is to establish rules and
measures to use against attacks over the
internet
Cyber security advantages:
• The cyber security will defend us from critical attacks.
• It helps us to browse the site, website.
• Internet Security process all the incoming and outgoing data on
your computer.
• It will defend us from hacks and virus.
• Application of cyber security used in our PC needs update every
week
Safety tips to cyber crime:
• Use antivirus Software
• Insert Firewalls
• Uninstall unnecessary software
• Maintain backup
• Check security settings
Cyber law:
• In Pakistan there is law for cyber crime.
• There are different punishments for different cyber crimes.
• There is an agency working for controlling cyber crime named as
NATIONAL RESPONSE CENTRE FOR CYBER CRIME.
Conclusion:
Cybercrime is indeed getting the recognition it deserves. However, it
is not going to restricted that easily . In fact , it is highly likely that
cyber crime and its hackers will continue developing and upgrading
to stay ahead of the law.
So, to make us a safer we must need cyber security.

More Related Content

What's hot

Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
mukeshkaran
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Dawood Faheem Abbasi
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
Onkar1431
 
Cyber crime
Cyber crimeCyber crime
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
Niloy Biswas
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Eng. Shuaib ibrahim
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mahabubur Rahman
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus
 

What's hot (20)

Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
cyber crime
cyber crimecyber crime
cyber crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 

Viewers also liked

Presentacion
PresentacionPresentacion
Presentacion
eLearning 6AVP
 
Resolucion 0288 abril 2015
Resolucion 0288 abril 2015Resolucion 0288 abril 2015
Resolucion 0288 abril 2015
Jorge Alonso Betancourth Arango
 
Diploma & Transcript of Records
Diploma & Transcript of RecordsDiploma & Transcript of Records
Diploma & Transcript of RecordsRosella Racelis
 
Tabla roles y perfiles EaD
Tabla roles y perfiles  EaDTabla roles y perfiles  EaD
Tabla roles y perfiles EaD
eLearning 6AVP
 
Fundamentos teoricos de la educación a distancia
Fundamentos teoricos de la educación a distanciaFundamentos teoricos de la educación a distancia
Fundamentos teoricos de la educación a distancia
eLearning 6AVP
 
Unidad ii marco de adopcion niif.pptx a2013
Unidad ii marco de adopcion niif.pptx a2013Unidad ii marco de adopcion niif.pptx a2013
Unidad ii marco de adopcion niif.pptx a2013
Ricardo Tori
 
Clear Vision
Clear VisionClear Vision
Clear Vision
Doug Webster
 

Viewers also liked (9)

Presentacion
PresentacionPresentacion
Presentacion
 
Resolucion 0288 abril 2015
Resolucion 0288 abril 2015Resolucion 0288 abril 2015
Resolucion 0288 abril 2015
 
ABR CV 2009
ABR CV 2009ABR CV 2009
ABR CV 2009
 
Diploma & Transcript of Records
Diploma & Transcript of RecordsDiploma & Transcript of Records
Diploma & Transcript of Records
 
Tabla roles y perfiles EaD
Tabla roles y perfiles  EaDTabla roles y perfiles  EaD
Tabla roles y perfiles EaD
 
Fundamentos teoricos de la educación a distancia
Fundamentos teoricos de la educación a distanciaFundamentos teoricos de la educación a distancia
Fundamentos teoricos de la educación a distancia
 
Unidad ii marco de adopcion niif.pptx a2013
Unidad ii marco de adopcion niif.pptx a2013Unidad ii marco de adopcion niif.pptx a2013
Unidad ii marco de adopcion niif.pptx a2013
 
Resume
ResumeResume
Resume
 
Clear Vision
Clear VisionClear Vision
Clear Vision
 

Similar to Cyber crime

Cyber crime
Cyber crimeCyber crime
Cybercrime
CybercrimeCybercrime
Cybercrime
Ratnesh Sharma
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
AfnanHusain
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
E secuity
E secuityE secuity
E secuity
arpit sadana
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
Yagnesh Garud
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
AkshayKumar Kavar
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Kush Rathod
 
cyber security
cyber security cyber security
cyber security
NiharikaVoleti
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
Dr. Amitabha Yadav
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
AmolKumarPandey2
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
RishabhDwivedi70
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
Varun Mathur
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Arslan Meher
 

Similar to Cyber crime (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
E secuity
E secuityE secuity
E secuity
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
pravallika chowdary
pravallika chowdarypravallika chowdary
pravallika chowdary
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
cyber security
cyber security cyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Recently uploaded

Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 

Recently uploaded (13)

Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 

Cyber crime

  • 1. Cyber Crime and security
  • 2. Contents: • Definition • Brief history • Categories • types of cyber crime • Cyber crime security • Cyber security advantages • Safety tips to cyber crime • Cyber law • Conclusion
  • 3. Definition: • Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission or to include any illegal activity that uses a computer for the storage of evidence.
  • 4. History: • Cybercrime first started with hackers trying to break into computer networks. Some did it just for the thrill of accessing high-level security networks, but others sought to gain sensitive, classified material. Eventually, criminals started to infect computer systems with computer viruses, which led to breakdowns on personal and business computers. • 1973 Teller at New York's Dime Savings Bank uses a computer to embezzle over $2 million • The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 5. Categories: We can categorize cyber crime in two ways. • The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. • The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism and credit card fraud etc.
  • 6. Types of cyber crime: • HACKING: Hacking in simple terms means an illegal intrusion info a computer system and/or network . It is also known as CRACKING. Government websites are the hot target of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motive behind the crime called HACKERS Motive behind the crime called hacking greed power, publicity, revenge, adventure desire to access forbidden information destructive mindset wants to sell n/w security services.
  • 7. DENIAL OF SERVICE ATTACKS: This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many DOS attacks, such as the ping of death and Tear drop attacks. VIRUS DISSMINITION : Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E- MAIL BOMBING etc.
  • 8. CYBER TERRORISM: Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails , attacks on service network etc. SOFTWARE PIRACY : Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 9. COMPUTER VANDALISM : Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate
  • 10. Cyber security: • Internet security is branch of security specifically related to internet. • It’s objective is to establish rules and measures to use against attacks over the internet
  • 11. Cyber security advantages: • The cyber security will defend us from critical attacks. • It helps us to browse the site, website. • Internet Security process all the incoming and outgoing data on your computer. • It will defend us from hacks and virus. • Application of cyber security used in our PC needs update every week
  • 12. Safety tips to cyber crime: • Use antivirus Software • Insert Firewalls • Uninstall unnecessary software • Maintain backup • Check security settings
  • 13. Cyber law: • In Pakistan there is law for cyber crime. • There are different punishments for different cyber crimes. • There is an agency working for controlling cyber crime named as NATIONAL RESPONSE CENTRE FOR CYBER CRIME.
  • 14. Conclusion: Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily . In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security.