Cybercrime &
Security
INDEX
• Introduction
• What is Cybercrime ?
• Cybercrimes in India
• Categorize of Cybercrimes
• Types of Cybercrimes
• Algorithms used for cybercrimes
• Security
Introduction :
• The IT revolution resulted in a phenomenal increase in the
number of cyberspace users all over the world. The birth of the
internet resulted in networking which helped millions of users to
connect online, thus facilitating the sharing of information.
• In India also, there was an overwhelming increase in the number
of internet users.
History:
• The first recorded cyber crime took place in the year 1820!
• In 1820, Joseph-Marie Jacquard, a textile manufacturer in France,
produced the loom. This device allowed the repetition of a series of
steps in the weaving of special fabrics. This resulted in a fear
amongst Jacquard's employees that their traditional employment
and livelihood were being threatened. They committed acts of
sabotage to discourage Jacquard from further use of the new
technology. This is the first recorded cyber crime !
What is Cybercrime ?
• Cybercrime is a term for any illegal activity that uses a computer as its
primary means of commission.
• Cybercrime encompasses any criminal act dealing with computers
and networks (called hacking).
• Additionally, cyber crime also includes traditional crimes conducted through
the Internet.
Categories:
• The Computer as a Target : Using a computer
to attack other computer.
• The Computer as a Weapon : Using a computer
to commit a real world crime.
Types of Cybercrimes
• Hacking
• Child Pornography
• Denial of Service attack
• Virus Dissemination
• Computer Vandalism
• Cyber Terrorism
• Software Piracy
Some algorithms used in Cybercrimes:
• Heart bleed
• Shellshock
• Poodle
• Rosetta Flash
• Facebook hosted DDoS with notes app
• Google Two Factors Authentication bypass
Cyber Security
• Internet security is a branch of computer security specifically
related to the internet.
• Its objective is to establish rules and measure to use against
attacks over the Internet.
Top 10 Cyber Crime Prevention Tips
• Use Strong Passwords
• Secure your computer
• Be Social-Media Savvy
• Secure your Mobile Devices
• Install the latest operating system updates
Contd.....
• Protect your Data
• Secure your wireless network
• Protect your e-identity
• Avoid being scammed
• Call the right person for help
Advantages of cyber security
• Protects system against viruses, worms, spyware and other unwanted
programs.
• Protection against data from theft.
• Protects the computer from being hacked.
• Minimizes computer freezing and crashes.
• Gives privacy to users
The Disadvantages
• Firewalls can be difficult to configure correctly.
• Incorrectly configured firewalls may block users from performing certain
actions on the Internet, until the firewall configured correctly.
• Makes the system slower than before.
• Need to keep updating the new software in order to keep security up to
date.
• Could be costly for average user.
“
”
Technology gives us power, but it does not and cannot tell us
how to use that power. Thanks to technology, we can instantly
communicate across the world, but it still doesn't help us know
what to say.
Jonathan Sacks
Cybercrime & Security
Cybercrime & Security

Cybercrime & Security

  • 1.
  • 2.
    INDEX • Introduction • Whatis Cybercrime ? • Cybercrimes in India • Categorize of Cybercrimes • Types of Cybercrimes • Algorithms used for cybercrimes • Security
  • 3.
    Introduction : • TheIT revolution resulted in a phenomenal increase in the number of cyberspace users all over the world. The birth of the internet resulted in networking which helped millions of users to connect online, thus facilitating the sharing of information. • In India also, there was an overwhelming increase in the number of internet users.
  • 4.
    History: • The firstrecorded cyber crime took place in the year 1820! • In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime !
  • 6.
    What is Cybercrime? • Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. • Cybercrime encompasses any criminal act dealing with computers and networks (called hacking). • Additionally, cyber crime also includes traditional crimes conducted through the Internet.
  • 8.
    Categories: • The Computeras a Target : Using a computer to attack other computer. • The Computer as a Weapon : Using a computer to commit a real world crime.
  • 9.
    Types of Cybercrimes •Hacking • Child Pornography • Denial of Service attack • Virus Dissemination • Computer Vandalism • Cyber Terrorism • Software Piracy
  • 10.
    Some algorithms usedin Cybercrimes: • Heart bleed • Shellshock • Poodle • Rosetta Flash • Facebook hosted DDoS with notes app • Google Two Factors Authentication bypass
  • 11.
    Cyber Security • Internetsecurity is a branch of computer security specifically related to the internet. • Its objective is to establish rules and measure to use against attacks over the Internet.
  • 12.
    Top 10 CyberCrime Prevention Tips • Use Strong Passwords • Secure your computer • Be Social-Media Savvy • Secure your Mobile Devices • Install the latest operating system updates
  • 13.
    Contd..... • Protect yourData • Secure your wireless network • Protect your e-identity • Avoid being scammed • Call the right person for help
  • 14.
    Advantages of cybersecurity • Protects system against viruses, worms, spyware and other unwanted programs. • Protection against data from theft. • Protects the computer from being hacked. • Minimizes computer freezing and crashes. • Gives privacy to users
  • 15.
    The Disadvantages • Firewallscan be difficult to configure correctly. • Incorrectly configured firewalls may block users from performing certain actions on the Internet, until the firewall configured correctly. • Makes the system slower than before. • Need to keep updating the new software in order to keep security up to date. • Could be costly for average user.
  • 16.
    “ ” Technology gives uspower, but it does not and cannot tell us how to use that power. Thanks to technology, we can instantly communicate across the world, but it still doesn't help us know what to say. Jonathan Sacks