SlideShare a Scribd company logo
PRASHANT KUMAR SHARMA
Lecturer
CS Department
What is the meaning of Engineering & Engineers
The term Engineering is derived from the Latin word ingenium, meaning
"cleverness" .
Engineering is the application of scientific, economic, social, and practical
knowledge in order to invent, design, build, maintain, research, and improve
structures, machines, devices, systems, materials, and processes.
One who practices engineering is called an engineer.
Different branches of engineering
• civil engineering -
The branch of engineering concerned with the design and
construction of such public works as dams or bridges
• EE, electrical engineering -
The branch of engineering science that studies the uses of electricity
and the equipment for power generation
and distribution and the control of machines and communication
• computer science -
The branch of engineering science that studies (with the aid of computers)
computable processes and structures.
• mechanical engineering -
The branch of engineering that deals with the design and construction
and of machinery
Scope of Computer Engineering
There are many fields of Computer Engineering.
• Software Development.
• Designing and Graphics.
• Software Testing.
• Database Management.
• Network Security or Cyber Security.
Cyber crime
• Cyber crime, or computer crime, is any crime that involves a computer and
a network . The computer may have been used in the commission of a
crime, or it may be the target
• Net crime is criminal exploitation of the Internet, inherently a cybercrime
• Cybercrime is a term for any illegal activity that uses a computer as its
primary means of commission. The U.S. Department of Justice expands
the definition of cybercrime to include any illegal activity that uses a
computer for the storage of evidence.
Types of Cyber Attack
1. Computer viruses and Worms.
Viruses and worms are computer programs that affect the storage devices of
a computer or network, which then replicate information without the
knowledge of the user.
2. Spam E-mails.
Spam emails are unsolicited emails or junk newsgroup postings. Spam emails
are sent without the consent of the receiver — potentially creating a wide
range of problems if they are not filtered appropriately
3. Phishing.
Phishing attacks are designed to steal a person’s login and password. For
instance, the phisher can access the victims’ bank accounts or assume
control of their social network.
4. Malware
Malware is a software that takes control of any individual’s computer to
spread a bug to other people’s devices or social networking profiles. Such
software can also be used to create a ‘botnet’— a network of computers
controlled remotely by hackers, known as ‘herders,’ — to spread spam or
viruses
Cyber Threat Evolution
Virus
Breaking
Web Sites
Malicious
Code
(Melissa)
Advanced Worm /
Trojan (I LOVE
YOU)
Identity Theft
(Phishing)
Organised Crime
Data Theft, DoS /
DDoS
1995 2000 2003-04 2005-06 2007-081977
10
Security Incidents reported during 2008
Cyber crime Components
Laptop
Desktop
PDA
Cell phone
Cyber Security
• Cyber security is the body of technologies, processes and practices designed
to protect networks, computers, programs and data from attack, damage or
unauthorized access.
• Cyber security, also known as Computer security or IT security,
this security applied to computers, computer networks, and the data stored
and transmitted over them
Tools & Techniques Used in Cyber
Security
• Authentication.
• Encryption.
• Digital Signature.
• Anti-virus.
• Firewall.
Authentication
• This fundamental cyber security technique intends to verify the identity of
user based on the credentials stored in the security domain of the system. The
most common mode of governance is password technology.
Encryption
• Encryption renders data undecipherable without application of a proper key to
unlock the same. To combat an encryption, one would be required to
undertake solving complicated mathematical problems like factoring large
primes that would consume astronomical amount of computing resources and
time.
Digital Signature
• Digital signatures can be erected out of the same mathematical algorithms
that are employed in asymmetric encryption. A user is free to test that he
possesses a private key by getting some information encoded with it. Anyone
can get the same decrypted by having the public key that will verify the
person’s credentials.
Anti Virus
• The threats of computer viruses or undesirable short programs that trigger
unwanted commands without the explicit consent of user have assumed
monstrous proportions. Anti-virus software carries out two functions; it
prevents the installation of virus in a system and scans the systems for viruses
that are already installed.
Firewalls
• Firewalls effectively hinders any attempt of unauthorized access to a computer
when it is connected on the internet by hackers directly or via other network
connections. Firewalls come bundled up with most operating systems and are
turned on by default.
E-Mail : santhab.prashant@gmail.com

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
cyber security
cyber securitycyber security
cyber security
abithajayavel
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
divyanshigarg4
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
Dave Monahan
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
Nikunj Thakkar
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
PranjalShah18
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
Anushka Jha
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
Cyber crime
Cyber crimeCyber crime
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber security
cyber securitycyber security
cyber security
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 

Viewers also liked

Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
Tushar Rajput
 
Unit 4 Commerce and Cyberspace
Unit 4 Commerce and CyberspaceUnit 4 Commerce and Cyberspace
Unit 4 Commerce and Cyberspace
Tushar Rajput
 
Data Security
Data SecurityData Security
Data Securitybackdoor
 
Mphasis
MphasisMphasis
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
n|u - The Open Security Community
 
Shreya Singhal vs Union Of India (Case Study)
Shreya Singhal vs Union Of India (Case Study)Shreya Singhal vs Union Of India (Case Study)
Shreya Singhal vs Union Of India (Case Study)
Soa National Institute of Law
 
Cyberstalking
CyberstalkingCyberstalking
CyberstalkingTrevschic
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
pattok
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
Arindam Sarkar
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
Bennet Kelley
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
Onkar Sule
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
loverakk187
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 

Viewers also liked (20)

Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Unit 4 Commerce and Cyberspace
Unit 4 Commerce and CyberspaceUnit 4 Commerce and Cyberspace
Unit 4 Commerce and Cyberspace
 
Data Security
Data SecurityData Security
Data Security
 
Mphasis
MphasisMphasis
Mphasis
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
 
Shreya Singhal vs Union Of India (Case Study)
Shreya Singhal vs Union Of India (Case Study)Shreya Singhal vs Union Of India (Case Study)
Shreya Singhal vs Union Of India (Case Study)
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 

Similar to Cyber Crime And Cyber Security

Ecommerce_Ch4.pptx
Ecommerce_Ch4.pptxEcommerce_Ch4.pptx
Ecommerce_Ch4.pptx
AYNETUTEREFE1
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
hm5314581
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
Ankur Kumar
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
GooglePay16
 
Communication security
Communication securityCommunication security
Communication security
Sotheavy Nhoung
 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jain
Ankita Jain
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
Ashish prashar
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
Sifat Hossain
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
Daniel Thomas
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
samina khan
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdf
Alefya1
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
KarthikShivanand
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
Hem Pokhrel
 
Computer security
Computer securityComputer security
Computer security
Mahesh Singh Madai
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
perweeng31
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 

Similar to Cyber Crime And Cyber Security (20)

Ecommerce_Ch4.pptx
Ecommerce_Ch4.pptxEcommerce_Ch4.pptx
Ecommerce_Ch4.pptx
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Communication security
Communication securityCommunication security
Communication security
 
Data security
Data securityData security
Data security
 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jain
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdf
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
 
Computer security
Computer securityComputer security
Computer security
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

More from Prashant Sharma

Google glass
Google  glassGoogle  glass
Google glass
Prashant Sharma
 
Ppt for Application of big data
Ppt for Application of big dataPpt for Application of big data
Ppt for Application of big data
Prashant Sharma
 
control statements of clangauge (ii unit)
control statements of clangauge (ii unit)control statements of clangauge (ii unit)
control statements of clangauge (ii unit)
Prashant Sharma
 
introduction of c langauge(I unit)
introduction of c langauge(I unit)introduction of c langauge(I unit)
introduction of c langauge(I unit)
Prashant Sharma
 
Reservation
Reservation Reservation
Reservation
Prashant Sharma
 
Introduction to search engine optimzation
Introduction to search engine optimzationIntroduction to search engine optimzation
Introduction to search engine optimzation
Prashant Sharma
 

More from Prashant Sharma (6)

Google glass
Google  glassGoogle  glass
Google glass
 
Ppt for Application of big data
Ppt for Application of big dataPpt for Application of big data
Ppt for Application of big data
 
control statements of clangauge (ii unit)
control statements of clangauge (ii unit)control statements of clangauge (ii unit)
control statements of clangauge (ii unit)
 
introduction of c langauge(I unit)
introduction of c langauge(I unit)introduction of c langauge(I unit)
introduction of c langauge(I unit)
 
Reservation
Reservation Reservation
Reservation
 
Introduction to search engine optimzation
Introduction to search engine optimzationIntroduction to search engine optimzation
Introduction to search engine optimzation
 

Recently uploaded

Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 

Recently uploaded (20)

Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 

Cyber Crime And Cyber Security

  • 2. What is the meaning of Engineering & Engineers The term Engineering is derived from the Latin word ingenium, meaning "cleverness" . Engineering is the application of scientific, economic, social, and practical knowledge in order to invent, design, build, maintain, research, and improve structures, machines, devices, systems, materials, and processes. One who practices engineering is called an engineer.
  • 3. Different branches of engineering • civil engineering - The branch of engineering concerned with the design and construction of such public works as dams or bridges • EE, electrical engineering - The branch of engineering science that studies the uses of electricity and the equipment for power generation and distribution and the control of machines and communication • computer science - The branch of engineering science that studies (with the aid of computers) computable processes and structures. • mechanical engineering - The branch of engineering that deals with the design and construction and of machinery
  • 4. Scope of Computer Engineering There are many fields of Computer Engineering. • Software Development. • Designing and Graphics. • Software Testing. • Database Management. • Network Security or Cyber Security.
  • 5.
  • 6. Cyber crime • Cyber crime, or computer crime, is any crime that involves a computer and a network . The computer may have been used in the commission of a crime, or it may be the target • Net crime is criminal exploitation of the Internet, inherently a cybercrime • Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. The U.S. Department of Justice expands the definition of cybercrime to include any illegal activity that uses a computer for the storage of evidence.
  • 7. Types of Cyber Attack
  • 8. 1. Computer viruses and Worms. Viruses and worms are computer programs that affect the storage devices of a computer or network, which then replicate information without the knowledge of the user. 2. Spam E-mails. Spam emails are unsolicited emails or junk newsgroup postings. Spam emails are sent without the consent of the receiver — potentially creating a wide range of problems if they are not filtered appropriately 3. Phishing. Phishing attacks are designed to steal a person’s login and password. For instance, the phisher can access the victims’ bank accounts or assume control of their social network. 4. Malware Malware is a software that takes control of any individual’s computer to spread a bug to other people’s devices or social networking profiles. Such software can also be used to create a ‘botnet’— a network of computers controlled remotely by hackers, known as ‘herders,’ — to spread spam or viruses
  • 9. Cyber Threat Evolution Virus Breaking Web Sites Malicious Code (Melissa) Advanced Worm / Trojan (I LOVE YOU) Identity Theft (Phishing) Organised Crime Data Theft, DoS / DDoS 1995 2000 2003-04 2005-06 2007-081977
  • 12. Cyber Security • Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. • Cyber security, also known as Computer security or IT security, this security applied to computers, computer networks, and the data stored and transmitted over them
  • 13. Tools & Techniques Used in Cyber Security • Authentication. • Encryption. • Digital Signature. • Anti-virus. • Firewall.
  • 14. Authentication • This fundamental cyber security technique intends to verify the identity of user based on the credentials stored in the security domain of the system. The most common mode of governance is password technology.
  • 15. Encryption • Encryption renders data undecipherable without application of a proper key to unlock the same. To combat an encryption, one would be required to undertake solving complicated mathematical problems like factoring large primes that would consume astronomical amount of computing resources and time.
  • 16. Digital Signature • Digital signatures can be erected out of the same mathematical algorithms that are employed in asymmetric encryption. A user is free to test that he possesses a private key by getting some information encoded with it. Anyone can get the same decrypted by having the public key that will verify the person’s credentials.
  • 17. Anti Virus • The threats of computer viruses or undesirable short programs that trigger unwanted commands without the explicit consent of user have assumed monstrous proportions. Anti-virus software carries out two functions; it prevents the installation of virus in a system and scans the systems for viruses that are already installed.
  • 18. Firewalls • Firewalls effectively hinders any attempt of unauthorized access to a computer when it is connected on the internet by hackers directly or via other network connections. Firewalls come bundled up with most operating systems and are turned on by default.