SlideShare a Scribd company logo
Contents
What is cyber crime?
 Cyber crime refers to any crime that involves a
computer/mobile and a network. The computer
may have been used in the commission of a
crime, or it may be the target.
 Cyber hackers apply all sorts of techniques
(hacking, use of malware for intercepting data,
etc.) in stealing personal or financial data from
their victims, generally from their computers.
History
 The first spam email took place in 1978 when it was
sent out over the ARPANET (Advanced Research
Projects Agency Network).
 The first virus was installed on an Apple computer by a
high school student, Rich Skrenta in the year 1982.
CYBER THREAT EVOLUTION
Computer as a tool
 When the individual is the main target of the crime the computer can be
considered as a tool rather than target.
 These crimes are not done by technical experts.
 Eg: Spam, cyber stalking , cyber theft etc.
Computer as a target
 These crimes are committed by a selected
group of people with technical knowledge.
 Destruction of information in the
computer by spreading virus.
 Eg : Defacement, cyber terrorism etc.
Defacement
Computer as an instrumentality
 The crime is committed by manipulating the contents of computer
systems.
 With the advent of computer the criminal have started using the
technology as an aid for its perpetuation.
 Eg: money laundering.
Crime associated with prevalence of
computers
 Copyright violation
 Material copied from sources that are not public domain or
compatibly licensed without the permission of copyright holder.
 Copyright violation causes legal issues.
Types of cyber crime
• Financial crimes
• IP spoofing
• Trojan
• Web jacking
• Session Hijacking
• Mail bombing
• Key loggers
Types Of crime
• Financial crime includes credit card frauds, money
laundering, Forgery etc
• Money laundering is the process by which large amount of
illegally obtained money is given the appearance of having
originated from a legitimate source
IP Spoofing – Source Routing
Definition:
Attacker spoofs the address of another machine and inserts
itself between the attacked machine and the spoofed machine
to intercept replies
Replies sent back
to 10.10.20.30
Spoofed Address
10.10.20.30
Attacker
10.10.50.50
John
10.10.5.5
From Address: 10.10.20.30
To Address: 10.10.5.5
Attacker intercepts packets
as they go to 10.10.20.30
Trojan & Web Jacking
• Trojan Horse-A Trojan as this program is aptly called, is an unauthorized program
which functions from inside what seems to be an authorized program, thereby
concealing what it is actually doing.
• Web jacking-This occurs when someone forcefully takes control of a website (by
cracking the password ). The actual owner of the website does not have any more
control over what appears on that website.
Attacker can
monitor the session
periodically inject commands into session
launch passive and active attacks from the session
Session Hijacking
Bob telnets to Server
Bob authenticates to Server
Bob
Attacker
Server
Die! Hi! I am Bob
Mail Bombing
• A mail bomb is the sending of a massive amount of e-mail to a
specific person or system. A huge amount of mail may simply fill
up the recipient's disk space on the server or, in some cases,
may be too much for a server to handle and may cause the
server to stop functioning.
Clickjacking
• Clickjacking is a form of cyber attack where the hacker uses an invisible layer over the
embedded web content (this could be an image, video or button) to intercept and
‘hijack’ you to a mirror website and mine information from you.
Keyloggers
• Keyloggers are regularly used in computers to log all the strokes a victim makes on the
keyboard.
Cyber security
• It is not possible to eliminate cyber crime from the cyber
space. It is quite possible to check them.
• Awareness is the first step in protecting yourself.
• Invest in Anti-virus, Firewall, and SPAM blocking software
for your PC.
• Change passwords on a regular basis
• Use complex passwords (include numbers and special
characters)
Cyber security
• Do not automatically check boxes before reading the
contents of any agreement of the software.
• Avoiding use of unauthorized software.
• Avoid opening of unknown emails.
• Use internet filtering software.
• Data Level Security Using encrypting software's
• Disable remote connectivity (such as Bluetooth)
ADVANTAGES OF CYBER SECURITY
• Defend us from critical attacks.
• Browse the safe website.
• Internet security process all the incoming and outgoing
data on our computer.
Conclusion
Technology is destructive only in the hands of people who do
not realize that they are one and the same process as the
universe.

More Related Content

What's hot

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Anchit Rajawat
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Cyber security
Cyber security Cyber security
Cyber security
Sachith Lekamge
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Cyber security
Cyber securityCyber security
Cyber security
manoj duli
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha
 

What's hot (20)

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 

Viewers also liked

2 july 2015 sab ki khabren
2 july 2015 sab ki khabren2 july 2015 sab ki khabren
2 july 2015 sab ki khabrenSantosh Tiwari
 
рождество
рождестворождество
рождествоdetki
 
Banking awareness 2014
Banking awareness 2014Banking awareness 2014
Banking awareness 2014
sanu
 
BGREVE - Dec 2016 - Base
BGREVE - Dec 2016 - BaseBGREVE - Dec 2016 - Base
BGREVE - Dec 2016 - BaseBill Greve
 
Latin for beginners
Latin for beginnersLatin for beginners
Latin for beginnersMansour1
 
URL 4013 Historisch Parket versie 1.0 - def (gew 161223)
URL 4013 Historisch Parket versie 1.0 - def (gew 161223)URL 4013 Historisch Parket versie 1.0 - def (gew 161223)
URL 4013 Historisch Parket versie 1.0 - def (gew 161223)Eric Jongmans
 
Laporan akhir e lifestyle
Laporan akhir e lifestyleLaporan akhir e lifestyle
Laporan akhir e lifestyle
Adityamelia Permana
 
Development and use of selected response item
Development and use of selected response itemDevelopment and use of selected response item
Development and use of selected response itemguevarra_2000
 
תיק עבודות מצגת
תיק עבודות  מצגתתיק עבודות  מצגת
תיק עבודות מצגת
עופר מלי
 
Městská knihovna třinec
Městská knihovna třinecMěstská knihovna třinec
Městská knihovna třinec
Martina Wolna
 
Thinking Laterally to Unlock Your Assets and Enable Development in Hard Times
Thinking Laterally to Unlock Your Assets and Enable Development in Hard TimesThinking Laterally to Unlock Your Assets and Enable Development in Hard Times
Thinking Laterally to Unlock Your Assets and Enable Development in Hard Times
PurcellUK
 
Iana dotcenko cv eng
Iana dotcenko cv   engIana dotcenko cv   eng
Iana dotcenko cv eng
Iana Dotcenko
 
C3 Transformations
C3 TransformationsC3 Transformations
C3 Transformations
JJkedst
 
WeilerPortfolio copy
WeilerPortfolio copyWeilerPortfolio copy
WeilerPortfolio copyLibby Weiler
 
Tartalomszolgáltatás a könyvtári honlapokon (Papp József)
Tartalomszolgáltatás a könyvtári honlapokon (Papp József)Tartalomszolgáltatás a könyvtári honlapokon (Papp József)
Tartalomszolgáltatás a könyvtári honlapokon (Papp József)
Daniel Takacs
 

Viewers also liked (17)

2 july 2015 sab ki khabren
2 july 2015 sab ki khabren2 july 2015 sab ki khabren
2 july 2015 sab ki khabren
 
рождество
рождестворождество
рождество
 
}
}}
}
 
Banking awareness 2014
Banking awareness 2014Banking awareness 2014
Banking awareness 2014
 
Allison
AllisonAllison
Allison
 
BGREVE - Dec 2016 - Base
BGREVE - Dec 2016 - BaseBGREVE - Dec 2016 - Base
BGREVE - Dec 2016 - Base
 
Latin for beginners
Latin for beginnersLatin for beginners
Latin for beginners
 
URL 4013 Historisch Parket versie 1.0 - def (gew 161223)
URL 4013 Historisch Parket versie 1.0 - def (gew 161223)URL 4013 Historisch Parket versie 1.0 - def (gew 161223)
URL 4013 Historisch Parket versie 1.0 - def (gew 161223)
 
Laporan akhir e lifestyle
Laporan akhir e lifestyleLaporan akhir e lifestyle
Laporan akhir e lifestyle
 
Development and use of selected response item
Development and use of selected response itemDevelopment and use of selected response item
Development and use of selected response item
 
תיק עבודות מצגת
תיק עבודות  מצגתתיק עבודות  מצגת
תיק עבודות מצגת
 
Městská knihovna třinec
Městská knihovna třinecMěstská knihovna třinec
Městská knihovna třinec
 
Thinking Laterally to Unlock Your Assets and Enable Development in Hard Times
Thinking Laterally to Unlock Your Assets and Enable Development in Hard TimesThinking Laterally to Unlock Your Assets and Enable Development in Hard Times
Thinking Laterally to Unlock Your Assets and Enable Development in Hard Times
 
Iana dotcenko cv eng
Iana dotcenko cv   engIana dotcenko cv   eng
Iana dotcenko cv eng
 
C3 Transformations
C3 TransformationsC3 Transformations
C3 Transformations
 
WeilerPortfolio copy
WeilerPortfolio copyWeilerPortfolio copy
WeilerPortfolio copy
 
Tartalomszolgáltatás a könyvtári honlapokon (Papp József)
Tartalomszolgáltatás a könyvtári honlapokon (Papp József)Tartalomszolgáltatás a könyvtári honlapokon (Papp József)
Tartalomszolgáltatás a könyvtári honlapokon (Papp József)
 

Similar to Cyber security

Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
Yagnesh Garud
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
MayurSapkale7
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Ratnesh Sharma
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
Mehedi Hasan
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Eng. Shuaib ibrahim
 
Cyber crime
Cyber crimeCyber crime
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan
 
hacking
hackinghacking
hacking
ADAIKKAPPANS1
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Sanjeev Kumar Jaiswal
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
aravindanvaithilinga
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
Tenet Systems Pvt Ltd
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
JatinRajput67
 

Similar to Cyber security (20)

Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
hacking
hackinghacking
hacking
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 

More from Samsil Arefin

Transmission Control Protocol and User Datagram protocol
Transmission Control Protocol and User Datagram protocolTransmission Control Protocol and User Datagram protocol
Transmission Control Protocol and User Datagram protocol
Samsil Arefin
 
Evolution Phylogenetic
Evolution PhylogeneticEvolution Phylogenetic
Evolution Phylogenetic
Samsil Arefin
 
Evolution Phylogenetic
Evolution PhylogeneticEvolution Phylogenetic
Evolution Phylogenetic
Samsil Arefin
 
Ego net facebook data analysis
Ego net facebook data analysisEgo net facebook data analysis
Ego net facebook data analysis
Samsil Arefin
 
Augmented Reality (AR)
Augmented Reality (AR)Augmented Reality (AR)
Augmented Reality (AR)
Samsil Arefin
 
Client server chat application
Client server chat applicationClient server chat application
Client server chat application
Samsil Arefin
 
Strings in programming tutorial.
Strings  in programming tutorial.Strings  in programming tutorial.
Strings in programming tutorial.
Samsil Arefin
 
Linked list searching deleting inserting
Linked list searching deleting insertingLinked list searching deleting inserting
Linked list searching deleting inserting
Samsil Arefin
 
Number theory
Number theoryNumber theory
Number theory
Samsil Arefin
 
Program to sort the n names in an alphabetical order
Program to sort the n names in an alphabetical orderProgram to sort the n names in an alphabetical order
Program to sort the n names in an alphabetical order
Samsil Arefin
 
Linked list int_data_fdata
Linked list int_data_fdataLinked list int_data_fdata
Linked list int_data_fdata
Samsil Arefin
 
Linked list Output tracing
Linked list Output tracingLinked list Output tracing
Linked list Output tracing
Samsil Arefin
 
Stack
StackStack
Sorting
SortingSorting
Sorting
Samsil Arefin
 
Fundamentals of-electric-circuit
Fundamentals of-electric-circuitFundamentals of-electric-circuit
Fundamentals of-electric-circuit
Samsil Arefin
 
C programming
C programmingC programming
C programming
Samsil Arefin
 
Data structure lecture 1
Data structure   lecture 1Data structure   lecture 1
Data structure lecture 1
Samsil Arefin
 
Structure and union
Structure and unionStructure and union
Structure and union
Samsil Arefin
 
Structure in programming in c or c++ or c# or java
Structure in programming  in c or c++ or c# or javaStructure in programming  in c or c++ or c# or java
Structure in programming in c or c++ or c# or java
Samsil Arefin
 
String
StringString

More from Samsil Arefin (20)

Transmission Control Protocol and User Datagram protocol
Transmission Control Protocol and User Datagram protocolTransmission Control Protocol and User Datagram protocol
Transmission Control Protocol and User Datagram protocol
 
Evolution Phylogenetic
Evolution PhylogeneticEvolution Phylogenetic
Evolution Phylogenetic
 
Evolution Phylogenetic
Evolution PhylogeneticEvolution Phylogenetic
Evolution Phylogenetic
 
Ego net facebook data analysis
Ego net facebook data analysisEgo net facebook data analysis
Ego net facebook data analysis
 
Augmented Reality (AR)
Augmented Reality (AR)Augmented Reality (AR)
Augmented Reality (AR)
 
Client server chat application
Client server chat applicationClient server chat application
Client server chat application
 
Strings in programming tutorial.
Strings  in programming tutorial.Strings  in programming tutorial.
Strings in programming tutorial.
 
Linked list searching deleting inserting
Linked list searching deleting insertingLinked list searching deleting inserting
Linked list searching deleting inserting
 
Number theory
Number theoryNumber theory
Number theory
 
Program to sort the n names in an alphabetical order
Program to sort the n names in an alphabetical orderProgram to sort the n names in an alphabetical order
Program to sort the n names in an alphabetical order
 
Linked list int_data_fdata
Linked list int_data_fdataLinked list int_data_fdata
Linked list int_data_fdata
 
Linked list Output tracing
Linked list Output tracingLinked list Output tracing
Linked list Output tracing
 
Stack
StackStack
Stack
 
Sorting
SortingSorting
Sorting
 
Fundamentals of-electric-circuit
Fundamentals of-electric-circuitFundamentals of-electric-circuit
Fundamentals of-electric-circuit
 
C programming
C programmingC programming
C programming
 
Data structure lecture 1
Data structure   lecture 1Data structure   lecture 1
Data structure lecture 1
 
Structure and union
Structure and unionStructure and union
Structure and union
 
Structure in programming in c or c++ or c# or java
Structure in programming  in c or c++ or c# or javaStructure in programming  in c or c++ or c# or java
Structure in programming in c or c++ or c# or java
 
String
StringString
String
 

Recently uploaded

H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 

Recently uploaded (20)

H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 

Cyber security

  • 1.
  • 3. What is cyber crime?  Cyber crime refers to any crime that involves a computer/mobile and a network. The computer may have been used in the commission of a crime, or it may be the target.  Cyber hackers apply all sorts of techniques (hacking, use of malware for intercepting data, etc.) in stealing personal or financial data from their victims, generally from their computers.
  • 4. History  The first spam email took place in 1978 when it was sent out over the ARPANET (Advanced Research Projects Agency Network).  The first virus was installed on an Apple computer by a high school student, Rich Skrenta in the year 1982.
  • 6. Computer as a tool  When the individual is the main target of the crime the computer can be considered as a tool rather than target.  These crimes are not done by technical experts.  Eg: Spam, cyber stalking , cyber theft etc.
  • 7. Computer as a target  These crimes are committed by a selected group of people with technical knowledge.  Destruction of information in the computer by spreading virus.  Eg : Defacement, cyber terrorism etc. Defacement
  • 8. Computer as an instrumentality  The crime is committed by manipulating the contents of computer systems.  With the advent of computer the criminal have started using the technology as an aid for its perpetuation.  Eg: money laundering.
  • 9. Crime associated with prevalence of computers  Copyright violation  Material copied from sources that are not public domain or compatibly licensed without the permission of copyright holder.  Copyright violation causes legal issues.
  • 10. Types of cyber crime • Financial crimes • IP spoofing • Trojan • Web jacking • Session Hijacking • Mail bombing • Key loggers
  • 11. Types Of crime • Financial crime includes credit card frauds, money laundering, Forgery etc • Money laundering is the process by which large amount of illegally obtained money is given the appearance of having originated from a legitimate source
  • 12. IP Spoofing – Source Routing Definition: Attacker spoofs the address of another machine and inserts itself between the attacked machine and the spoofed machine to intercept replies Replies sent back to 10.10.20.30 Spoofed Address 10.10.20.30 Attacker 10.10.50.50 John 10.10.5.5 From Address: 10.10.20.30 To Address: 10.10.5.5 Attacker intercepts packets as they go to 10.10.20.30
  • 13. Trojan & Web Jacking • Trojan Horse-A Trojan as this program is aptly called, is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing. • Web jacking-This occurs when someone forcefully takes control of a website (by cracking the password ). The actual owner of the website does not have any more control over what appears on that website.
  • 14. Attacker can monitor the session periodically inject commands into session launch passive and active attacks from the session Session Hijacking Bob telnets to Server Bob authenticates to Server Bob Attacker Server Die! Hi! I am Bob
  • 15. Mail Bombing • A mail bomb is the sending of a massive amount of e-mail to a specific person or system. A huge amount of mail may simply fill up the recipient's disk space on the server or, in some cases, may be too much for a server to handle and may cause the server to stop functioning.
  • 16. Clickjacking • Clickjacking is a form of cyber attack where the hacker uses an invisible layer over the embedded web content (this could be an image, video or button) to intercept and ‘hijack’ you to a mirror website and mine information from you.
  • 17. Keyloggers • Keyloggers are regularly used in computers to log all the strokes a victim makes on the keyboard.
  • 18. Cyber security • It is not possible to eliminate cyber crime from the cyber space. It is quite possible to check them. • Awareness is the first step in protecting yourself. • Invest in Anti-virus, Firewall, and SPAM blocking software for your PC. • Change passwords on a regular basis • Use complex passwords (include numbers and special characters)
  • 19. Cyber security • Do not automatically check boxes before reading the contents of any agreement of the software. • Avoiding use of unauthorized software. • Avoid opening of unknown emails. • Use internet filtering software. • Data Level Security Using encrypting software's • Disable remote connectivity (such as Bluetooth)
  • 20. ADVANTAGES OF CYBER SECURITY • Defend us from critical attacks. • Browse the safe website. • Internet security process all the incoming and outgoing data on our computer.
  • 21. Conclusion Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.