SlideShare a Scribd company logo
1 of 28
INTRODUCTION
Meaning Of Word Cyber
It is a combining form
relating to information
technology, the
Internet, and virtual
reality.
Cybercrime is defined as a crime in which a computer
is the object of the crime (hacking, phishing,
spamming) or is used as a tool to commit an offense
(child pornography, hate crimes). Cybercriminals
may use computer technology to access personal
information, business trade secrets or use the
internet for exploitative or malicious purposes.
Criminals can also use computers for communication
and document or data storage. Criminals who
perform these illegal activities are often referred to
as hackers.
CYBERCRIME
TYPES OF CYBER CRIME
1. HACKING
• Hacking in simple terms means an illegal intrusion into a computer
system and/or network.
2. DENIAL OF SERVICE ATTACK
• Act by the criminal, who floods the bandwidth of the victims
network.
3. VIRUS DISSEMINATION
• Malicious software that attaches itself to other software. (virus,
worms, Trojan Horse, web jacking, e-mail bombing etc.)
4. COMPUTER VANDALISM
• Damaging or destroying data rather than stealing.
5. CYBER TERRORISM
• Use of Internet based attacks in terrorist activities.
6. SOFTWARE PIRACY • Theft of software through the illegal copying of
genuine programs.
CYBER SECURITY
• The term Cyber security is used to
refer to the security offered through
on-line services to protect your
online information. With an
increasing amount of people getting
connected to Internet, the security
threats that cause massive harm are
increasing also.
WHAT IS CYBERBULLYING ?
Cyber Bullying is the use of the Internet and related
technologies to harm other people in a deliberate, repeated,
and hostile manner."
• Sending mean messages or threats to a person's email
account or cell phone.
• Spreading rumors online or through texts. • Posting hurtful
or threatening messages on social networking sites or web
pages.
• Stealing a person's account information to break into their
account and send damaging messages.
• Pretending to be someone else online to hurt another
person.
• Taking unflattering pictures of a person and spreading them
through cell phones or the Internet
FORMS OF CYBERBULLYING ?
• Whether it's posting public pictures, social statuses, or personal
messages, cyber bullying takes many forms. The most popular cyber
bullying tactics are:
• FLAMING -Online fights using electronic messages with angry and
vulgar language.
• HARASSMENT -Repeatedly sending nasty, mean, and insulting
messages.
• DENIGRATION - "Dissing" someone on line. Sending or posting
gossip or rumors about a person to damage his or her reputation or
friendships,
• IMPERSONATION - Pretending to be someone else and sending or
posting material to get that person in trouble or danger or to
damage that person's reputation or friendships.
EFFECTS OF CYBERBULLING
• SOLUTION :-
MALWAR
• The word "malware" comes from the term
"MALicious softWARE." Malware is any
software that infects and damages a
computer system without the owner's
knowledge or permission.
• SOLUTION :-
• To Stop Malware
• Download an anti-malware program that
also helps prevent infections. Activate
Network Threat Protection, Firewall,
TROJAN HORSES
• A Trojan horse is a file that is often confused to be
a computer virus. While it is still harmful, it is not
considered a virus because it does not spread from
computer to computer. What a Trojan horse does
do is disguise itself as another file, such as a
computer game or a Word document, and then
activates once you open up the file.
• SOLUTION :-
• Security suites, such as Avast Internet Security, will
prevent you from downloading Trojan Horses
EMAIL VIRUSES
• Password attacks are attacks by
hackers that are able to determine
passwords or find passwords to
different protected electronic areas
and social network sites
• In common a hacker is a person who breaks into
computers, usually by gaining access to administrative
controls.
• Types of Hackers ::-
• White Hat Hacker
• Grey Hat Hacker
• Black Hat Hacker
• SOLUTION:-
• It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.
ANTIVIRUS
• Viruses have been designed by cybercriminals to compromise
the data in your system.
• In the absence of an antivirus solution, they can easily
damage important information and disturb the operating
system, ultimately rendering the machine virtually
worthless.
• With the security provided by strong antivirus protection,
however, the self-replicating codes don’t stand a chance of
reaching the heart and brain of your computer that is the
CPU – accordingly protecting your system and the data it
contains.
Protection from Hackers
ADVANTAGES OF ANTIVIRUS
Extends the life of your computer
• Some of the most comprehensive and
reliable antivirus applications on the
market are viewed as an unnecessary
and costly addition to your computer
when, in real sense, they are offering
insurance against future expense
• "Identity theft is a form of stealing someone's identity in
which someone pretends to be someone else by assuming
that person's identity“
BE CAREFUL
• While there are many ways for your identity to get stolen,
the easiest way to become a victim of identity theft is by
sharing personal information over the internet. If you
aren't careful, criminals could steal your identity by
finding any of the following:
• Credit Card Information
• Bank Account Number
• Personal Identification
DIFFERENT ANTIVIRUS
NAME:-
• QUICK TIPS:-
• Update your software frequently.There are new types of
viruses coming out every day and if your anti-virus program
might not catch them if it's too old.
• Always be careful, even if you have an anti-virus software. It
is common for some programs to miss Trojan horses so you
watch out for suspicious files.
• Backup your computer regularly. This is a good habit to get
into in case any fatal errors occur.
• Be aware of everything you download. This task might seem
mundane but it's one of the most important steps you can
take.
• Scan any new files you may download. You can perform a
virus scan with your anti-virus software as an extra
protection measure.
GENERAL INTERNET SAFETY• It's always good to be cautious while on the internet. There are people in
the cyber world who want to do harm to you or your computer.
• These are some good tips to keep in mind while you are surfing:
• Be careful about what you put on the web.
• It's on there forever and can be used to trace back to you at any time.
• Keep track of who you interact with on the internet.
• Some people may not be who they seem to be.
• Know that privacy is just an illusion.
• Even personal information on social networks can be easily recovered by
anyone.
• Don't open any links in emails or chat rooms that look suspicious or
unfamiliar.
• Also, never open any strange files that your computer may have
downloaded from an email or a website.
I hope that my presentation will be helpful
for my audience to improve their knowledge
about cyber security and to overcome
several security loopholes on their
computer operation. Also it helps to spread
awareness among normal people about
emerging security threats. Simple and
practical prevention methods are explained
in the Seminar to prevent PCs from infection
Saurabh Kaushik

More Related Content

What's hot

What's hot (20)

Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
cyber security
cyber security cyber security
cyber security
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Hacking
HackingHacking
Hacking
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 

Similar to Cyber Security Seminar: Understanding Threats and Best Practices

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 

Similar to Cyber Security Seminar: Understanding Threats and Best Practices (20)

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 

Cyber Security Seminar: Understanding Threats and Best Practices

  • 1.
  • 3. Meaning Of Word Cyber It is a combining form relating to information technology, the Internet, and virtual reality.
  • 4. Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes. Criminals can also use computers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers. CYBERCRIME
  • 5. TYPES OF CYBER CRIME 1. HACKING • Hacking in simple terms means an illegal intrusion into a computer system and/or network. 2. DENIAL OF SERVICE ATTACK • Act by the criminal, who floods the bandwidth of the victims network. 3. VIRUS DISSEMINATION • Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.) 4. COMPUTER VANDALISM • Damaging or destroying data rather than stealing. 5. CYBER TERRORISM • Use of Internet based attacks in terrorist activities. 6. SOFTWARE PIRACY • Theft of software through the illegal copying of genuine programs.
  • 6. CYBER SECURITY • The term Cyber security is used to refer to the security offered through on-line services to protect your online information. With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
  • 7.
  • 8. WHAT IS CYBERBULLYING ? Cyber Bullying is the use of the Internet and related technologies to harm other people in a deliberate, repeated, and hostile manner." • Sending mean messages or threats to a person's email account or cell phone. • Spreading rumors online or through texts. • Posting hurtful or threatening messages on social networking sites or web pages. • Stealing a person's account information to break into their account and send damaging messages. • Pretending to be someone else online to hurt another person. • Taking unflattering pictures of a person and spreading them through cell phones or the Internet
  • 9. FORMS OF CYBERBULLYING ? • Whether it's posting public pictures, social statuses, or personal messages, cyber bullying takes many forms. The most popular cyber bullying tactics are: • FLAMING -Online fights using electronic messages with angry and vulgar language. • HARASSMENT -Repeatedly sending nasty, mean, and insulting messages. • DENIGRATION - "Dissing" someone on line. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships, • IMPERSONATION - Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships.
  • 11.
  • 13. MALWAR • The word "malware" comes from the term "MALicious softWARE." Malware is any software that infects and damages a computer system without the owner's knowledge or permission. • SOLUTION :- • To Stop Malware • Download an anti-malware program that also helps prevent infections. Activate Network Threat Protection, Firewall,
  • 14. TROJAN HORSES • A Trojan horse is a file that is often confused to be a computer virus. While it is still harmful, it is not considered a virus because it does not spread from computer to computer. What a Trojan horse does do is disguise itself as another file, such as a computer game or a Word document, and then activates once you open up the file. • SOLUTION :- • Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses
  • 16. • Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites
  • 17. • In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls. • Types of Hackers ::- • White Hat Hacker • Grey Hat Hacker • Black Hat Hacker • SOLUTION:- • It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 19. • Viruses have been designed by cybercriminals to compromise the data in your system. • In the absence of an antivirus solution, they can easily damage important information and disturb the operating system, ultimately rendering the machine virtually worthless. • With the security provided by strong antivirus protection, however, the self-replicating codes don’t stand a chance of reaching the heart and brain of your computer that is the CPU – accordingly protecting your system and the data it contains.
  • 21. ADVANTAGES OF ANTIVIRUS Extends the life of your computer • Some of the most comprehensive and reliable antivirus applications on the market are viewed as an unnecessary and costly addition to your computer when, in real sense, they are offering insurance against future expense
  • 22. • "Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity“ BE CAREFUL • While there are many ways for your identity to get stolen, the easiest way to become a victim of identity theft is by sharing personal information over the internet. If you aren't careful, criminals could steal your identity by finding any of the following: • Credit Card Information • Bank Account Number • Personal Identification
  • 24. • QUICK TIPS:- • Update your software frequently.There are new types of viruses coming out every day and if your anti-virus program might not catch them if it's too old. • Always be careful, even if you have an anti-virus software. It is common for some programs to miss Trojan horses so you watch out for suspicious files. • Backup your computer regularly. This is a good habit to get into in case any fatal errors occur. • Be aware of everything you download. This task might seem mundane but it's one of the most important steps you can take. • Scan any new files you may download. You can perform a virus scan with your anti-virus software as an extra protection measure.
  • 25. GENERAL INTERNET SAFETY• It's always good to be cautious while on the internet. There are people in the cyber world who want to do harm to you or your computer. • These are some good tips to keep in mind while you are surfing: • Be careful about what you put on the web. • It's on there forever and can be used to trace back to you at any time. • Keep track of who you interact with on the internet. • Some people may not be who they seem to be. • Know that privacy is just an illusion. • Even personal information on social networks can be easily recovered by anyone. • Don't open any links in emails or chat rooms that look suspicious or unfamiliar. • Also, never open any strange files that your computer may have downloaded from an email or a website.
  • 26. I hope that my presentation will be helpful for my audience to improve their knowledge about cyber security and to overcome several security loopholes on their computer operation. Also it helps to spread awareness among normal people about emerging security threats. Simple and practical prevention methods are explained in the Seminar to prevent PCs from infection
  • 27.