3. Meaning Of Word Cyber
It is a combining form
relating to information
technology, the
Internet, and virtual
reality.
4. Cybercrime is defined as a crime in which a computer
is the object of the crime (hacking, phishing,
spamming) or is used as a tool to commit an offense
(child pornography, hate crimes). Cybercriminals
may use computer technology to access personal
information, business trade secrets or use the
internet for exploitative or malicious purposes.
Criminals can also use computers for communication
and document or data storage. Criminals who
perform these illegal activities are often referred to
as hackers.
CYBERCRIME
5. TYPES OF CYBER CRIME
1. HACKING
• Hacking in simple terms means an illegal intrusion into a computer
system and/or network.
2. DENIAL OF SERVICE ATTACK
• Act by the criminal, who floods the bandwidth of the victims
network.
3. VIRUS DISSEMINATION
• Malicious software that attaches itself to other software. (virus,
worms, Trojan Horse, web jacking, e-mail bombing etc.)
4. COMPUTER VANDALISM
• Damaging or destroying data rather than stealing.
5. CYBER TERRORISM
• Use of Internet based attacks in terrorist activities.
6. SOFTWARE PIRACY • Theft of software through the illegal copying of
genuine programs.
6. CYBER SECURITY
• The term Cyber security is used to
refer to the security offered through
on-line services to protect your
online information. With an
increasing amount of people getting
connected to Internet, the security
threats that cause massive harm are
increasing also.
7.
8. WHAT IS CYBERBULLYING ?
Cyber Bullying is the use of the Internet and related
technologies to harm other people in a deliberate, repeated,
and hostile manner."
• Sending mean messages or threats to a person's email
account or cell phone.
• Spreading rumors online or through texts. • Posting hurtful
or threatening messages on social networking sites or web
pages.
• Stealing a person's account information to break into their
account and send damaging messages.
• Pretending to be someone else online to hurt another
person.
• Taking unflattering pictures of a person and spreading them
through cell phones or the Internet
9. FORMS OF CYBERBULLYING ?
• Whether it's posting public pictures, social statuses, or personal
messages, cyber bullying takes many forms. The most popular cyber
bullying tactics are:
• FLAMING -Online fights using electronic messages with angry and
vulgar language.
• HARASSMENT -Repeatedly sending nasty, mean, and insulting
messages.
• DENIGRATION - "Dissing" someone on line. Sending or posting
gossip or rumors about a person to damage his or her reputation or
friendships,
• IMPERSONATION - Pretending to be someone else and sending or
posting material to get that person in trouble or danger or to
damage that person's reputation or friendships.
13. MALWAR
• The word "malware" comes from the term
"MALicious softWARE." Malware is any
software that infects and damages a
computer system without the owner's
knowledge or permission.
• SOLUTION :-
• To Stop Malware
• Download an anti-malware program that
also helps prevent infections. Activate
Network Threat Protection, Firewall,
14. TROJAN HORSES
• A Trojan horse is a file that is often confused to be
a computer virus. While it is still harmful, it is not
considered a virus because it does not spread from
computer to computer. What a Trojan horse does
do is disguise itself as another file, such as a
computer game or a Word document, and then
activates once you open up the file.
• SOLUTION :-
• Security suites, such as Avast Internet Security, will
prevent you from downloading Trojan Horses
16. • Password attacks are attacks by
hackers that are able to determine
passwords or find passwords to
different protected electronic areas
and social network sites
17. • In common a hacker is a person who breaks into
computers, usually by gaining access to administrative
controls.
• Types of Hackers ::-
• White Hat Hacker
• Grey Hat Hacker
• Black Hat Hacker
• SOLUTION:-
• It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.
19. • Viruses have been designed by cybercriminals to compromise
the data in your system.
• In the absence of an antivirus solution, they can easily
damage important information and disturb the operating
system, ultimately rendering the machine virtually
worthless.
• With the security provided by strong antivirus protection,
however, the self-replicating codes don’t stand a chance of
reaching the heart and brain of your computer that is the
CPU – accordingly protecting your system and the data it
contains.
21. ADVANTAGES OF ANTIVIRUS
Extends the life of your computer
• Some of the most comprehensive and
reliable antivirus applications on the
market are viewed as an unnecessary
and costly addition to your computer
when, in real sense, they are offering
insurance against future expense
22. • "Identity theft is a form of stealing someone's identity in
which someone pretends to be someone else by assuming
that person's identity“
BE CAREFUL
• While there are many ways for your identity to get stolen,
the easiest way to become a victim of identity theft is by
sharing personal information over the internet. If you
aren't careful, criminals could steal your identity by
finding any of the following:
• Credit Card Information
• Bank Account Number
• Personal Identification
24. • QUICK TIPS:-
• Update your software frequently.There are new types of
viruses coming out every day and if your anti-virus program
might not catch them if it's too old.
• Always be careful, even if you have an anti-virus software. It
is common for some programs to miss Trojan horses so you
watch out for suspicious files.
• Backup your computer regularly. This is a good habit to get
into in case any fatal errors occur.
• Be aware of everything you download. This task might seem
mundane but it's one of the most important steps you can
take.
• Scan any new files you may download. You can perform a
virus scan with your anti-virus software as an extra
protection measure.
25. GENERAL INTERNET SAFETY• It's always good to be cautious while on the internet. There are people in
the cyber world who want to do harm to you or your computer.
• These are some good tips to keep in mind while you are surfing:
• Be careful about what you put on the web.
• It's on there forever and can be used to trace back to you at any time.
• Keep track of who you interact with on the internet.
• Some people may not be who they seem to be.
• Know that privacy is just an illusion.
• Even personal information on social networks can be easily recovered by
anyone.
• Don't open any links in emails or chat rooms that look suspicious or
unfamiliar.
• Also, never open any strange files that your computer may have
downloaded from an email or a website.
26. I hope that my presentation will be helpful
for my audience to improve their knowledge
about cyber security and to overcome
several security loopholes on their
computer operation. Also it helps to spread
awareness among normal people about
emerging security threats. Simple and
practical prevention methods are explained
in the Seminar to prevent PCs from infection