SlideShare a Scribd company logo
1 of 17
Download to read offline
CYBER
SECURITY Phishing
Identity
Theft Fraud
cctv Hacking
Overview
• What is Cyber Security ?
• What is Cyber Crime ?
• History of Cyber Crime and Cyber Security
• Types of Cyber Crime
• What is Cyber Law and Why it is necessary ?
• IT ( Information Technology ) ACT 2000
• Safety tips
• Conclusion
What is Cyber Security ?
• Cyber security is the practice of defending computers, servers, mobile
devices, electronic systems, networks, and data from malicious attacks.
• It's also known as information technology security or electronic
information security.
• The term applies in a variety of contexts, from business to mobile
computing, and can be divided into a few common categories.
What is Cyber Crime ?
• A cybercrime is a crime that involves a computer or a
computer network.
• Cybercrime, especially through the Internet, has
grown in importance as the computer has become
central to commerce, entertainment, and government.
History of Cyber Crime and Cyber Security
• The first recorded cyber crime took place in the year 1820.
• The first spam email took place in 1978 when it was send
over the Arpanet(Advanced Research Projects Agency
Network).
• The first virus was installed on an apple computer in 1982.
Types of Cyber Crime
• Phishing
• Ransomware
• Identity Theft
• Cyber Bullying
Phishing
• Phishing is a type of fraud that involves stealing personal
information such as Customer ID, IPIN, Credit/Debit Card
number, Card expiry date, CVV number, etc. through
emails that appear to be from a legitimate source.
Ransomware
• It is a type of malware that prevents or limits users from
accessing their system, either by locking the system's
screen or by locking the users' files until a ransom is paid.
Identity theft
• Identity theft occurs when someone uses another person's
personal identifying information, like their name, identifying
number, or credit card number, without their permission, to
commit fraud or other crimes.
Cyber Bullying
• Cyberbullying is a form of bullying or harassment using
electronic means.
• Cyberbullying takes place when a teen or younger child uses a
computing device to threaten, humiliate, or otherwise harass a
peer.
What is Cyber Law and Why it is necessary ?
• Term used to describe the legal issue related to the use of communications technology
.i.e. ‘INTERNET’.
• Regulates the use of internet and other forms of digital communication.
• To protect against cyber attacks and data breaches.
• To conduct digital transactions without any fear.
Cyber Crimes reported [2012 to 2021]
IT ( Information Technology ) ACT 2000
Section 66B: Using stolen devices for a personal use imposes up to 1
Lakh rupees.
Section 66C: Digital signatures, password hacking, and other forms of
identity theft. imposes imprisonment up to 3 years along with one lakh
rupees as a fine.
Section 66E: Taking pictures of prohibited areas and publishing them
without a person’s consent.
• Use strong passwords, don’t give personal information unless required .
• Keep your devices, browsers, and apps up to date.
• Open attachment carefully.
• Use Anti-Virus Protection & Firewall.
• Use Two-Factor or Multi-Factor Authentication.
• Maintain backup.
• Use secure connection.
Safety tips ….
Conclusion
• Cyber security is one of the most important aspects of the
fast-paced growing digital world.
• The threats of it are hard to deny, so it is crucial to learn how
to defend from them and teach others how to do it too.
Team Members
• ABHAY SINGH
• ASHUTOSH NEGI
• ASHWINI KUMAR SAH
• DEVANSH TIWARI
cyber security .pdf

More Related Content

Similar to cyber security .pdf

Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy lawsesther_sonu
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptxRahuljain40418
 
cyber crime
cyber crimecyber crime
cyber crimeMukund10
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safetyAashiGupta46
 
Information Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 IndiaInformation Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 Indiabarsha2011
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Deepam Aggarwal
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 

Similar to cyber security .pdf (20)

Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Information Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 IndiaInformation Technology (IT) Act 2000 India
Information Technology (IT) Act 2000 India
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 

Recently uploaded

💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...gragchanchal546
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 

Recently uploaded (20)

💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 

cyber security .pdf

  • 2. Overview • What is Cyber Security ? • What is Cyber Crime ? • History of Cyber Crime and Cyber Security • Types of Cyber Crime • What is Cyber Law and Why it is necessary ? • IT ( Information Technology ) ACT 2000 • Safety tips • Conclusion
  • 3. What is Cyber Security ? • Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. • It's also known as information technology security or electronic information security. • The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.
  • 4. What is Cyber Crime ? • A cybercrime is a crime that involves a computer or a computer network. • Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.
  • 5. History of Cyber Crime and Cyber Security • The first recorded cyber crime took place in the year 1820. • The first spam email took place in 1978 when it was send over the Arpanet(Advanced Research Projects Agency Network). • The first virus was installed on an apple computer in 1982.
  • 6. Types of Cyber Crime • Phishing • Ransomware • Identity Theft • Cyber Bullying
  • 7. Phishing • Phishing is a type of fraud that involves stealing personal information such as Customer ID, IPIN, Credit/Debit Card number, Card expiry date, CVV number, etc. through emails that appear to be from a legitimate source.
  • 8. Ransomware • It is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files until a ransom is paid.
  • 9. Identity theft • Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
  • 10. Cyber Bullying • Cyberbullying is a form of bullying or harassment using electronic means. • Cyberbullying takes place when a teen or younger child uses a computing device to threaten, humiliate, or otherwise harass a peer.
  • 11. What is Cyber Law and Why it is necessary ? • Term used to describe the legal issue related to the use of communications technology .i.e. ‘INTERNET’. • Regulates the use of internet and other forms of digital communication. • To protect against cyber attacks and data breaches. • To conduct digital transactions without any fear.
  • 12. Cyber Crimes reported [2012 to 2021]
  • 13. IT ( Information Technology ) ACT 2000 Section 66B: Using stolen devices for a personal use imposes up to 1 Lakh rupees. Section 66C: Digital signatures, password hacking, and other forms of identity theft. imposes imprisonment up to 3 years along with one lakh rupees as a fine. Section 66E: Taking pictures of prohibited areas and publishing them without a person’s consent.
  • 14. • Use strong passwords, don’t give personal information unless required . • Keep your devices, browsers, and apps up to date. • Open attachment carefully. • Use Anti-Virus Protection & Firewall. • Use Two-Factor or Multi-Factor Authentication. • Maintain backup. • Use secure connection. Safety tips ….
  • 15. Conclusion • Cyber security is one of the most important aspects of the fast-paced growing digital world. • The threats of it are hard to deny, so it is crucial to learn how to defend from them and teach others how to do it too.
  • 16. Team Members • ABHAY SINGH • ASHUTOSH NEGI • ASHWINI KUMAR SAH • DEVANSH TIWARI