SlideShare a Scribd company logo
Shuaib Ibrahim Adam
ME. Telecommunication Engineering
Nanjing University of Posts & Telecommunications
Out Line
• Introduction
• Definition
• History
• Categories of Cyber crime
• Types of Cyber Crime
• Reason for Cyber crime
• Security of Cyber
• Advantages of Cyber Security
• Prevention tips for cyber security
• Conclusion
TO Understand
What is the
CYBER
CRIMES
Why we need cyber
security
What are the security
problems in Cyber
field
How to implement
and maintain
Security of a
Cyber field around
us.
introduction
The internet is growing rapidly. It has given rise to new
opportunities in every field we can think of be it
entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own
disadvantages is Cyber crime- illegal activity committed on
the internet.
Cyber crime is an activity done using computers and
internet. We can say that it is an unlawful acts wherein the
computer either a tool or target or both.
definition of cyber crime
• Cybercrime is nothing but where the computer used as an
object or subject of crime!
• Crime committed using a computer and the internet to steal
a person’s identity!!
• Illegal imports
• Malicious programs
History of cyber crime
• The first recorded cyber crime took place in 1920.
• India, Japan and China, the era of modern computer,
however, began with the analytical engine of Charles
Babbage.
• The first spam email took place in 1976 when it was sent
out over the ARPANT.
• The first virus was installed on an Apple computer in 1982
when a high school student, Rich skrenta, developed the
EIK Cloner.
Categorization of cyber crime
 The Computer as a Target:-using a computer to attack
other computers. E.g. Hacking, Virus/Worm attacks, DOS
attack etc.
The computer as a weapon:-using a computer to commit
real world crimes. E.g. Cyber Terrorism, IPR violations,
Credit card frauds, EFT frauds, Pornography etc. Cyber
Crime regulated by Cyber Laws or Internet Laws.
types of cyber crime
 The Hacking
 Denial of service attack
 Virus Dissemination
 Computer Vandalism
 Cyber Terrorism
 Software Piracy
types of cyber crime
Web
Jacking
Reason for cyber crime
1. Easy to Access: - The problem encountered in guarding a computer
system from unauthorized access is that there is every possibility of
breach not due to human error but due to the complex technology.
2. Complex: - The computers work on operating systems and these
operating systems in turn are composed of millions of codes. Human
mind is fallible and it is not possible that there might not be a lapse at
any stage.
3. Negligence: - Negligence is very closely connected with human
conduct. It is therefore very probable that while protecting the
computer system there might be any negligence, which in turn
provides a cyber-criminal to gain access and control over the computer
system.
4. Loss of Evidence: - Loss of evidence is a very common & obvious
problem as all the data are routinely destroyed.
security
What is cyber security
Cyber security is a branch of computer security
specifically related to the internet.
It’s objectives is to establish rules and measure to use
against attacks over the internet.
Advantages of Cyber security
The cyber security will defend us from critical attacks.
 It helps us to browse the site, website.
Internet Security process all the incoming and outgoing
data on your computer.
It will defend us from hacks and virus.
Application of cyber security used in our PC needs update
every week
Cybercrime prevention
• Cybercrime prevention can be straight-forward - when
armed with a little technical advice and common sense,
many attacks can be avoided.
• In general, online criminals are trying to make their money
as quickly and easily as possible. The more difficult you
make their job, the more likely they are to leave you alone
and move on to an easier target.
Safety tips for cyber crime
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a genderless screen name.
• Never give your full name or address to strangers.
• Learn more about Internet privacy.
• Make Sure your Computer is configured securely
• Choose Strong Passwords and Keep them Safe.
Conclusion
 The Computer Security is a continuous battle
◦ As computer security gets tighter hackers are
getting smarter!!!
◦ Computer and information security continue to
grow in importance
◦ Nobody ever said this was going to be easy!
◦ Neglecting security is the worst thing you can
do!!
Cyber security is everyone’s responsibility
Cyber crime and security
Cyber crime and security

More Related Content

What's hot

Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Greater Noida Institute Of Technology
 
Cyber security
Cyber securityCyber security
Cyber security
Shivaani srinivas iyer
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
Kunal Sinha
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Anchit Rajawat
 

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 

Viewers also liked

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...
Tore Hoel
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
 
Sweta kumari
Sweta kumariSweta kumari
Sweta kumari
sweta kumari
 
Internet, Database, Cyber Crime
Internet, Database,  Cyber CrimeInternet, Database,  Cyber Crime
Internet, Database, Cyber Crime
Gaditek
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistanFahad Abbasi
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
Anish Rai
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
CYBERWISER .eu
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
pinkutinku26
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04
kevin_donovan
 
Developing An Effective e-Learning Platform From Ready-Made Script
Developing An Effective e-Learning Platform From Ready-Made ScriptDeveloping An Effective e-Learning Platform From Ready-Made Script
Developing An Effective e-Learning Platform From Ready-Made Script
iScripts
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
Paige Rasid
 
MIS Presentation about SalesForce.com
MIS Presentation about SalesForce.comMIS Presentation about SalesForce.com
MIS Presentation about SalesForce.com
Likhan Banik
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessRobin Rafique
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Kokonda Nikhil Kumar
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
Indian Air Force
 

Viewers also liked (20)

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Sweta kumari
Sweta kumariSweta kumari
Sweta kumari
 
Internet, Database, Cyber Crime
Internet, Database,  Cyber CrimeInternet, Database,  Cyber Crime
Internet, Database, Cyber Crime
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04
 
Developing An Effective e-Learning Platform From Ready-Made Script
Developing An Effective e-Learning Platform From Ready-Made ScriptDeveloping An Effective e-Learning Platform From Ready-Made Script
Developing An Effective e-Learning Platform From Ready-Made Script
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
MIS Presentation about SalesForce.com
MIS Presentation about SalesForce.comMIS Presentation about SalesForce.com
MIS Presentation about SalesForce.com
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 

Similar to Cyber crime and security

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
AfnanHusain
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
Dr. Amitabha Yadav
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
NitishChoudhary23
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
Yagnesh Garud
 
CYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptxCYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptx
IrfanaRahim2
 
Cyber crime and security (1)
Cyber crime and security (1)Cyber crime and security (1)
Cyber crime and security (1)
Tanikella Sai Abhijyan
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.pptArshad Khan
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
Tech Mahindra Ltd.
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuityAlisha Korpal
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
RishabhDwivedi70
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Ratnesh Sharma
 
E secuity
E secuityE secuity
E secuity
arpit sadana
 
Persentation
PersentationPersentation
Persentation
Mehar Tayyab
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Tarseam Singh
 

Similar to Cyber crime and security (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
CYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptxCYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptx
 
Cyber crime and security (1)
Cyber crime and security (1)Cyber crime and security (1)
Cyber crime and security (1)
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
E secuity
E secuityE secuity
E secuity
 
Persentation
PersentationPersentation
Persentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Recently uploaded

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 

Recently uploaded (20)

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 

Cyber crime and security

  • 1. Shuaib Ibrahim Adam ME. Telecommunication Engineering Nanjing University of Posts & Telecommunications
  • 2. Out Line • Introduction • Definition • History • Categories of Cyber crime • Types of Cyber Crime • Reason for Cyber crime • Security of Cyber • Advantages of Cyber Security • Prevention tips for cyber security • Conclusion
  • 3. TO Understand What is the CYBER CRIMES Why we need cyber security What are the security problems in Cyber field How to implement and maintain Security of a Cyber field around us.
  • 4. introduction The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet. Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 5. definition of cyber crime • Cybercrime is nothing but where the computer used as an object or subject of crime! • Crime committed using a computer and the internet to steal a person’s identity!! • Illegal imports • Malicious programs
  • 6. History of cyber crime • The first recorded cyber crime took place in 1920. • India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. • The first spam email took place in 1976 when it was sent out over the ARPANT. • The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 7. Categorization of cyber crime  The Computer as a Target:-using a computer to attack other computers. E.g. Hacking, Virus/Worm attacks, DOS attack etc. The computer as a weapon:-using a computer to commit real world crimes. E.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc. Cyber Crime regulated by Cyber Laws or Internet Laws.
  • 8. types of cyber crime  The Hacking  Denial of service attack  Virus Dissemination  Computer Vandalism  Cyber Terrorism  Software Piracy
  • 9. types of cyber crime Web Jacking
  • 10. Reason for cyber crime 1. Easy to Access: - The problem encountered in guarding a computer system from unauthorized access is that there is every possibility of breach not due to human error but due to the complex technology. 2. Complex: - The computers work on operating systems and these operating systems in turn are composed of millions of codes. Human mind is fallible and it is not possible that there might not be a lapse at any stage. 3. Negligence: - Negligence is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber-criminal to gain access and control over the computer system. 4. Loss of Evidence: - Loss of evidence is a very common & obvious problem as all the data are routinely destroyed.
  • 12. What is cyber security Cyber security is a branch of computer security specifically related to the internet. It’s objectives is to establish rules and measure to use against attacks over the internet.
  • 13. Advantages of Cyber security The cyber security will defend us from critical attacks.  It helps us to browse the site, website. Internet Security process all the incoming and outgoing data on your computer. It will defend us from hacks and virus. Application of cyber security used in our PC needs update every week
  • 14. Cybercrime prevention • Cybercrime prevention can be straight-forward - when armed with a little technical advice and common sense, many attacks can be avoided. • In general, online criminals are trying to make their money as quickly and easily as possible. The more difficult you make their job, the more likely they are to leave you alone and move on to an easier target.
  • 15. Safety tips for cyber crime • Use antivirus software’s. • Insert firewalls. • Uninstall unnecessary software • Maintain backup. • Check security settings. • Stay anonymous - choose a genderless screen name. • Never give your full name or address to strangers. • Learn more about Internet privacy. • Make Sure your Computer is configured securely • Choose Strong Passwords and Keep them Safe.
  • 16. Conclusion  The Computer Security is a continuous battle ◦ As computer security gets tighter hackers are getting smarter!!! ◦ Computer and information security continue to grow in importance ◦ Nobody ever said this was going to be easy! ◦ Neglecting security is the worst thing you can do!!
  • 17. Cyber security is everyone’s responsibility