CONTENTS
 Introduction.
 Definition.
 Cyber threat evolution.
 Types of cyber crime.
 Prevention.
 Security.
 Conclusion.
Newspaper Cuttings on Cybercrime
INTRODUCTION
oThe internet in India is growing rapidly. It has given
rise to new opportunities in every field we can think of
be it entertainment, business, sports or education.
o There’re two sides to a coin. Internet also has it’s
own disadvantages is Cyber crime- illegal activity
committed on the internet.
o With an increasing amount of people getting
connected to Internet, the security threats that
cause massive harm are increasing also.
 As the world has made a shift from the physical to the digital
landscape, security threats have also changed from physical
to cyber.
 Cyber Crime is quickly becoming more profitable that illegal
Drug Trade.
 This computer virus is named “MyDoom,” and is considered
to be the world’s most expensive computer virus ever. This
virus was first discovered back in 2004, and it spread quickly.
It not only became the most expensive virus, but also the
fastest spreading virus. The virus was transmitted through a
spam e-mail. This virus caused a lot of problems, and even
allowed the virus created to gain remote access to infected
computers!
DEFINING CYBER CRIME
 Crime committed using a computer and the internet to steal data
or information.
 Illegal imports.
 Malicious programs.
TYPES OF CYBER CRIME
 Hacking
 Denial of service attack
 Virus Dissemination
 Computer Vandalism
 Cyber Terrorism
 Software Privacy
Interesting Stats About Cyber Crime
 Half of all Cyber attacks are targeted at small businesses.
 Only 10% of cybercrimes are reported in the U.S each year.
 Ransomware attack every 14 seconds.
 In 2019 IOT (Internet Of Things) will become major targets for
malware attacks.
 By 2020, There will be 300 Billion Passwords utilized across the
world.
 PERSONAL DATA CAN BE PURCHASED WITHIN THE RANGE
OF $0.20 TO $15.00
 Only 10% of cybercrimes are reported in the U.S each year.
 China is the country with most MALWARE in the world.
 The Lowest Cyber Crime rate award goes to the Netherlands.
The Highest goes to Indonesia.
 Word, PowerPoint, And Excel (The Microsoft Office formats)
comprise the most prevalent group of malicious file extension.
 The Cyber Security Unemployment Rate is Approaching 0 % .
 Android Platforms are highly used for Cyber Security Attacks.
 A Hacker Attacks occurs Every 39 Seconds in the world.
 Greatest data breaches in history you won’t believe!
Company Accounts Hacked Date of Hack
Yahoo! 3 billion Aug 2013
Marriott 500 million 2014-2018
Yahoo! 500 million Late 2014
MySpace 360 million May 2016
Under Armor 150 million Feb 2018
Equifax 145.5 million Jul 2017
EBay 145 million May 2014
Target 110 million Nov 2013
LinkedIn 100 million Jun 2012
Uber 68 million 2016
Facebook 50 million Jul 2017
Marriott International 500 million 2018
Sony's PlayStation Network 77 million April 2011
Need of cyber security
 Cyber security is necessary since it helps in securing data from
threats such as data theft or misuse, also safeguards your system
from viruses.
Major security problems and
Solutions
 Virus
 Hacker
 Malware
 Trojan horses
 Password cracking
Viruses and Worms
 A Virus is a “program that is loaded onto your
computer without your knowledge and runs against your
wishes.
Solution
 Install a security suite that protects the computer against
threats such as viruses and worms.
Hackers
 In common a hacker is a person who breaks into
computers, usually by gaining access to administrative
controls.
How To prevent hacking
 It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.
Malware
 The word "malware" comes from the term "MALicious
softWARE.“
 Malware is any software that infects and damages a computer
system without the owner's knowledge or permission.
To Stop Malware
 Download an anti-malware
program that also
helps prevent infections.
 Activate Network Threat
Protection, Firewall, Antivirus.
Trojan Horses
 Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer system.
 These viruses are the
most serious threats to
computers
How to Avoid Trojans
 Security suites, such as Avast Internet Security, will prevent you
from downloading Trojan Horses.
Password Cracking
 Password attacks are attacks by hackers that are able
to determine passwords or find passwords to different
protected electronic areas and social network sites.
Securing Password
 Use always Strong password.
 Never use same password for two different sites.
What happen if do not take
proper precaution

Risk for Email Account
Precaution for email account
Password Strategy
Normal : 123india
Good : 123@india
Better : 123&InDIa.NanDurbar
Best : NanDurBar#$%789_..01
Risk Of Social Media (Facebook)
Precaution for Facebook Use
 Don’t share anyone your personal information
Like :
 Your mobile no.
 Security ans(fev-teacher,food,hobby,book,first
mobile no etc.)
 Always check your name on Google or
Facebook
Precaution for Facebook
 Use proper privacy settings
How to Secure
Government Offices
PROPER CONFIGURATION OF
FIREWALLS
PROPER CONFIGURATION OF OPERATING
SYSTEMS
INSTALLING ESSENTIAL SOFTWARE'S WITH
PROPER CONFIGURATION
INSTALLING ESSENTIAL SECURITY
CERTIFICATES
MONITORING ACTIVITIES ON INTERNET AND
NETWORKS
CONCLUSION
Cyber Security Is Everyone’s Responsibility
Newspaper Cuttings on
Cybercrime
Sim Card Swap fraud
Sim Card Swap fraud
Cyber Attack on Cosmos
Bank
Dark Web
Finger printing gadgets to stop
crime
JEE data Leakage
ATM Fraud
Bank Fraud
Whatsapp calling fake message
Mobile Fraud
Ebay gift card scam
Congratulations popup virus
Media Coverage
Media Coverage
Cyber Security

Cyber Security

  • 2.
    CONTENTS  Introduction.  Definition. Cyber threat evolution.  Types of cyber crime.  Prevention.  Security.  Conclusion. Newspaper Cuttings on Cybercrime
  • 3.
    INTRODUCTION oThe internet inIndia is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. o There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet. o With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
  • 4.
     As theworld has made a shift from the physical to the digital landscape, security threats have also changed from physical to cyber.  Cyber Crime is quickly becoming more profitable that illegal Drug Trade.  This computer virus is named “MyDoom,” and is considered to be the world’s most expensive computer virus ever. This virus was first discovered back in 2004, and it spread quickly. It not only became the most expensive virus, but also the fastest spreading virus. The virus was transmitted through a spam e-mail. This virus caused a lot of problems, and even allowed the virus created to gain remote access to infected computers!
  • 5.
    DEFINING CYBER CRIME Crime committed using a computer and the internet to steal data or information.  Illegal imports.  Malicious programs.
  • 7.
    TYPES OF CYBERCRIME  Hacking  Denial of service attack  Virus Dissemination  Computer Vandalism  Cyber Terrorism  Software Privacy
  • 8.
    Interesting Stats AboutCyber Crime  Half of all Cyber attacks are targeted at small businesses.  Only 10% of cybercrimes are reported in the U.S each year.  Ransomware attack every 14 seconds.  In 2019 IOT (Internet Of Things) will become major targets for malware attacks.  By 2020, There will be 300 Billion Passwords utilized across the world.  PERSONAL DATA CAN BE PURCHASED WITHIN THE RANGE OF $0.20 TO $15.00
  • 9.
     Only 10%of cybercrimes are reported in the U.S each year.  China is the country with most MALWARE in the world.  The Lowest Cyber Crime rate award goes to the Netherlands. The Highest goes to Indonesia.  Word, PowerPoint, And Excel (The Microsoft Office formats) comprise the most prevalent group of malicious file extension.  The Cyber Security Unemployment Rate is Approaching 0 % .  Android Platforms are highly used for Cyber Security Attacks.  A Hacker Attacks occurs Every 39 Seconds in the world.
  • 10.
     Greatest databreaches in history you won’t believe! Company Accounts Hacked Date of Hack Yahoo! 3 billion Aug 2013 Marriott 500 million 2014-2018 Yahoo! 500 million Late 2014 MySpace 360 million May 2016 Under Armor 150 million Feb 2018 Equifax 145.5 million Jul 2017 EBay 145 million May 2014 Target 110 million Nov 2013 LinkedIn 100 million Jun 2012 Uber 68 million 2016 Facebook 50 million Jul 2017 Marriott International 500 million 2018 Sony's PlayStation Network 77 million April 2011
  • 11.
    Need of cybersecurity  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 12.
    Major security problemsand Solutions  Virus  Hacker  Malware  Trojan horses  Password cracking
  • 13.
    Viruses and Worms A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes.
  • 14.
    Solution  Install asecurity suite that protects the computer against threats such as viruses and worms.
  • 16.
    Hackers  In commona hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 17.
    How To preventhacking  It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 18.
    Malware  The word"malware" comes from the term "MALicious softWARE.“  Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 19.
    To Stop Malware Download an anti-malware program that also helps prevent infections.  Activate Network Threat Protection, Firewall, Antivirus.
  • 20.
    Trojan Horses  Trojanhorses are email viruses that can duplicate themselves, steal information, or harm the computer system.  These viruses are the most serious threats to computers
  • 21.
    How to AvoidTrojans  Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.
  • 22.
    Password Cracking  Passwordattacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  • 23.
    Securing Password  Usealways Strong password.  Never use same password for two different sites.
  • 24.
    What happen ifdo not take proper precaution 
  • 25.
  • 26.
    Precaution for emailaccount Password Strategy Normal : 123india Good : 123@india Better : 123&InDIa.NanDurbar Best : NanDurBar#$%789_..01
  • 27.
    Risk Of SocialMedia (Facebook)
  • 28.
    Precaution for FacebookUse  Don’t share anyone your personal information Like :  Your mobile no.  Security ans(fev-teacher,food,hobby,book,first mobile no etc.)  Always check your name on Google or Facebook
  • 29.
    Precaution for Facebook Use proper privacy settings
  • 30.
  • 32.
  • 33.
    PROPER CONFIGURATION OFOPERATING SYSTEMS
  • 34.
    INSTALLING ESSENTIAL SOFTWARE'SWITH PROPER CONFIGURATION
  • 35.
  • 36.
    MONITORING ACTIVITIES ONINTERNET AND NETWORKS
  • 37.
    CONCLUSION Cyber Security IsEveryone’s Responsibility
  • 38.
  • 39.
    Sim Card Swapfraud Sim Card Swap fraud
  • 40.
    Cyber Attack onCosmos Bank
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.