SlideShare a Scribd company logo
CYBER
CRIME
HACKER
SECURITY
CODE
INTERNET
OTP
COMPUTER
HACKER
CODE
MONEY
DATA
THIEF
PC
SAFETY
IDENTITY
PASSWORD
FRAUD
IDENTITY
MALWARE
CRIMINAL
TECHNOLOGY ID
DATA
ONLINE
COMMUNICATION
LOSS
THIEF
PRIVACY
FISHING
FRAUD
BINARY
CRACKING
TOJAN
VIRUS
MAIL
SPAM
INTERNET
HACKING
BLACKHAT
CRIME
HACKED
BINARY
STEAL
OTP
DIGITAL
COMMUNICATION
THIEF
WEB
LAPTOP
SAFETY
HACKER
SECURITY
CODE
INTERNET
OTP
COMPUTER
HACKER
CODE
MONEY
DATA
THIEF
PC
SAFETY
IDENTITY
PASSWORD
FRAUD
IDENTITY
MALWARE
CRIMINAL
TECHNOLOGY ID
DATA
ONLINE
COMMUNICATION
LOSS
THIEF
PRIVACY
FISHING
FRAUD
BINARY
CRACKING
TOJAN
VIRUS
MAIL
SPAM
INTERNET
HACKING
BLACKHAT
CRIME
HACKED
BINARY
STEAL
OTP
DIGITAL
COMMUNICATION
THIEF
WEB
LAPTOP
SAFETY
CYBER
CRIME
Introduction
Hacker
A Black Hat hackers are criminals
who break into computer networks
with malicious intent.
A Gray hat hackers often look for
vulnerabilities in a system without
the owner's permission or knowledge.
If issues are found, they report them
to the owner, sometimes requesting a
small fee to fix the problem.
A white hat hacker or Ethical
hacker is an individual who uses
hacking skills to identify security
vulnerabilities in hardware,
software or networks.
Trojan
Fraud
OTP
Virus
Fraud
Worms
Some common ways to reach you by the attackers Malware
Password
cracking
SQL
injection
Phishing is a type of social engineering attack that targets the user and tricks them by sending fake
messages and emails to get sensitive information about the user or trying to download malicious software
and exploit it on the target system.
Identity theft happens when someone steals your personal or sensitive information to commit
fraud. This theft is committed in many ways by gathering personal information such as
transactional information of another person to make transactions.
This term refers to the crime of unauthorized access to private computers or networks and
misuse of it either by shutting it down or tampering with the data stored or other illegal
approaches.
A malware attack is a common cyberattack where malware (normally malicious software) executes
unauthorized actions on the victim's system.
Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is
sent via email, but it can also be distributed via text messages, phone calls, or social media.
Hacking
The Most Common Cyber Attacks
Phishing
Identity
Theft
Malware
Attacks
spam
mail
1 2 3 4 5 6
No. of cases registered 12317 21796 27248 44546 50035 52974
year 2016 2017 2018 2019 2020 2021
SOURCES : National Crime Records Bureau (NCRB)
12317
21796
27248
44546
50035
52974
If you think an attacker is not interested me…
Wrong!!! You are exactly what an attacker wants!
Why is cyber Cybersecurity is important!
You have
to deploy a
soldier in your system.
Use a combination of at least eight letters, numbers, and symbols.
For example- M0l#eb9Qv
Never use personal information in such as your name, birthday,
user name, or mobile number in your password.
Don't write your password in any paper or note book.
Don't write your password in mobile or computer.
Always use Multi-Factor Authentication to secure your account.
Multi-factor Authentication (MFA) is an authentication method that
requires the user to provide two or more verification factors to
gain access to a resource such as an application, online
account.
You can use Google Authenticator app
Disconnect Your Device from internet The first thing you need to do is
immediately disconnect the compromised
device from the Internet.
Back Up Your Files You should back up your files. Because
data can be destroyed or erased in the
process of recovering from a phishing
attack.
If you already made the mistake of Clicking a phishing link or downloading a
malicious attachment, follow these steps to minimize the consequences.
(i)
(ii)
Change Your Credentials Malware can be used to obtain sensitive
information including online usernames and
passwords, credit card numbers, bank
account numbers, and other identifying
information. If you think you have been
tricked into acting on a phishing message,
change your online credentials immediately.
(iii)
Scan Your System for Malware After you have disconnected your device from the Internet,
run a complete scan with your anti-virus program. Or
(iv)
1
2
3
4 5
Scan your system by this process
USB Drive
&
More
USB is common way hackers install ransomware
and other types of malware.
Don’t connect unknown or unauthorized
media or Devices.
If make this mistake then Malware or virus
installed in your system without you doing
anything.
Don’t make This Mistake
Like Pen Drive, CDs or DVDs, USB, Flesh Drive,
External Hard Disk etc.
If You Find a Random USB Drive
So use your own charger or adaptor to charge your
phone or devices.
You could become a victim of "juice jacking," a new
cyber-theft tactic. Cybersecurity experts have
warned that criminals can load malware onto
public USB charging stations to maliciously
access electronic devices while they are being
charged. Malware installed through a dirty USB
port can lock a device or export personal data and
passwords.
Juice jacking is a cyber attack in which a
compromised Universal Serial Bus (USB) charging
station transfers malware to, or steals personal
information from, a connected device.
Make sure the website you are visiting is secure or not
Check the information
Hypertext Transfer Protocol Secure (HTTPS) is a protocol
that secures communication and data transfer between
a user's web browser and a website.
Make sure that the website has HTTPS
www.ncrb.gov.in
www.cybercrime.gov.in
If you have been defrauded financially
Do This Step Contact Your Bank.
Report to local Police.
Block your current account and move your
money to Your New Account or Card.
Dial toll free no.1930
www.cybercrime.gov.in
Created By:
Mohan Pandey

More Related Content

What's hot

Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
Tejasvi Bhatia
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Anchit Rajawat
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
AnandKaGe
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Vivek Mohbe
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
Adeel Rasheed
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
PranjalShah18
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Social engineering
Social engineeringSocial engineering
Social engineering
ankushmohanty
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.pptArshad Khan
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
Jason Murray
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Shruti Bansal
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 

What's hot (20)

Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber Crime & Security.pdf

Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Soo Chin Hock
 
Security Primer
Security PrimerSecurity Primer
Security Primer
Alison Gianotto
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
K. A. M Lutfullah
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
KALPITKALPIT1
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
AFROZULLA KHAN Z
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx
ChloeLucas4
 
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptxCYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
Dhruvsinhbhati
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
selcukca84
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101HaroldCo
 
2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crime
QondileRamokgadi
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
Tapan Khilar
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
Symptai Consulting Limited
 
Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19
ArielMcCurdy
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
JOHN BABATUNDE LEE
 
26-Security.ppt
26-Security.ppt26-Security.ppt
26-Security.ppt
DhruvLuthra8
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 

Similar to Cyber Crime & Security.pdf (20)

Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Hacking
HackingHacking
Hacking
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx
 
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptxCYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
 
My presentation
My presentationMy presentation
My presentation
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crime
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19Protecting Your Business, Cybersecurity, and working remotely during COVID-19
Protecting Your Business, Cybersecurity, and working remotely during COVID-19
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
26-Security.ppt
26-Security.ppt26-Security.ppt
26-Security.ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Recently uploaded

Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 

Recently uploaded (20)

Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 

Cyber Crime & Security.pdf

  • 1.
  • 4. Hacker A Black Hat hackers are criminals who break into computer networks with malicious intent. A Gray hat hackers often look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem. A white hat hacker or Ethical hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks.
  • 5. Trojan Fraud OTP Virus Fraud Worms Some common ways to reach you by the attackers Malware Password cracking SQL injection
  • 6. Phishing is a type of social engineering attack that targets the user and tricks them by sending fake messages and emails to get sensitive information about the user or trying to download malicious software and exploit it on the target system. Identity theft happens when someone steals your personal or sensitive information to commit fraud. This theft is committed in many ways by gathering personal information such as transactional information of another person to make transactions. This term refers to the crime of unauthorized access to private computers or networks and misuse of it either by shutting it down or tampering with the data stored or other illegal approaches. A malware attack is a common cyberattack where malware (normally malicious software) executes unauthorized actions on the victim's system. Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is sent via email, but it can also be distributed via text messages, phone calls, or social media. Hacking The Most Common Cyber Attacks Phishing Identity Theft Malware Attacks spam mail
  • 7. 1 2 3 4 5 6 No. of cases registered 12317 21796 27248 44546 50035 52974 year 2016 2017 2018 2019 2020 2021 SOURCES : National Crime Records Bureau (NCRB) 12317 21796 27248 44546 50035 52974
  • 8. If you think an attacker is not interested me… Wrong!!! You are exactly what an attacker wants!
  • 9.
  • 10. Why is cyber Cybersecurity is important!
  • 11. You have to deploy a soldier in your system.
  • 12.
  • 13.
  • 14.
  • 15. Use a combination of at least eight letters, numbers, and symbols. For example- M0l#eb9Qv Never use personal information in such as your name, birthday, user name, or mobile number in your password. Don't write your password in any paper or note book. Don't write your password in mobile or computer. Always use Multi-Factor Authentication to secure your account. Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account. You can use Google Authenticator app
  • 16.
  • 17.
  • 18.
  • 19. Disconnect Your Device from internet The first thing you need to do is immediately disconnect the compromised device from the Internet. Back Up Your Files You should back up your files. Because data can be destroyed or erased in the process of recovering from a phishing attack. If you already made the mistake of Clicking a phishing link or downloading a malicious attachment, follow these steps to minimize the consequences. (i) (ii) Change Your Credentials Malware can be used to obtain sensitive information including online usernames and passwords, credit card numbers, bank account numbers, and other identifying information. If you think you have been tricked into acting on a phishing message, change your online credentials immediately. (iii)
  • 20. Scan Your System for Malware After you have disconnected your device from the Internet, run a complete scan with your anti-virus program. Or (iv) 1 2 3 4 5 Scan your system by this process
  • 21. USB Drive & More USB is common way hackers install ransomware and other types of malware. Don’t connect unknown or unauthorized media or Devices. If make this mistake then Malware or virus installed in your system without you doing anything. Don’t make This Mistake Like Pen Drive, CDs or DVDs, USB, Flesh Drive, External Hard Disk etc. If You Find a Random USB Drive
  • 22. So use your own charger or adaptor to charge your phone or devices. You could become a victim of "juice jacking," a new cyber-theft tactic. Cybersecurity experts have warned that criminals can load malware onto public USB charging stations to maliciously access electronic devices while they are being charged. Malware installed through a dirty USB port can lock a device or export personal data and passwords. Juice jacking is a cyber attack in which a compromised Universal Serial Bus (USB) charging station transfers malware to, or steals personal information from, a connected device.
  • 23. Make sure the website you are visiting is secure or not Check the information Hypertext Transfer Protocol Secure (HTTPS) is a protocol that secures communication and data transfer between a user's web browser and a website. Make sure that the website has HTTPS
  • 24.
  • 25.
  • 27. If you have been defrauded financially Do This Step Contact Your Bank. Report to local Police. Block your current account and move your money to Your New Account or Card. Dial toll free no.1930 www.cybercrime.gov.in
  • 28.
  • 29.