2. CONTENT
1. Introduction
2. What is Cyber Security ?
3. Cyber Crimes
4. Types of Cyber Crimes
5. Reasons of increasing Cyber Crimes
6. Thank you
3. Introduction
INTERNET IS A GLOBAL NETWORK ACCESSIBLE FROM ALL OVER THE
WORLD. MILLIONS OF COMPUTERS ARE CONNECTED WITH INTERNET
WORLDWIDE. INTERNET PLAYS AN IMPORTANT ROLE TO MAKE OUR
LIFE SIMPLE, BUT IT ALSO HAS SOME DISADVANTAGES THAT WE
SHOULD PREVENT. WE SHOULD GIVE SECURITIES TO OUR WORK OR
DATA SAVED OR DONE IN OUR COMPUTER .SECURITY IS AN
IMPORTANT ISSUE FOR ALL MODERN INFORMATION SYSTEM.
4.
5. The process of protecting computer resources
such as networks, devices, programs, and data
from unauthorized access , damage or attack is
called Cyber Security . Confidential data and
privacy must be safe guarded and the system
must beProtected against malicious acts of theft
oe disruption.
7. Cyber crime is
a criminal
activity in
which
computers are
used to
damage data,
steal data or
disrupt digital
life of a person
8.
9. DATA DIDDLING:-
efers to the process of changing the data going into or out of a
computer. For example ,a student breaks into his/her university’s grade
recording system and changes the grades he/she earned in last
semester’s or class, thus raising his/ her grade point average.
10. PHREAKING:-
This crime is committed against telephone companies by using
computers with the goal of making free distance calls, impersonating
directory assistant or other operator service, diverting calls to numbers
of the preparators choice ,or tapping phone lines.
11. CLONING:-
This refers to a fraudin which scanners are used to stealthe electric
serial numbers of cellular phones, which may be used for billing
purposes and making broadcast calls. With stolen serial number, clones
can be made to make free calls that are billed to the owner of the
original cell phone.
12. CARDING:-
This refers to the process of stealing credit card numbers online ,to be
resold or used to charge merchandise against victims account.
13. HACKING:-
Computer hacking is the practice of modified
computer hardware and software to Kamlesh a girl
outside of the creators original purpose. People who
in which in computer hacking activity are often called
hackers.
. Some organisation actually
employee computer hackers as part of their technical
support staff. These individuals use their skills to
find flaws in the companies Security system so that
they can be repaired quickly. In many cases, this type
of computer hacking helps prevent identity and other
14. CRACKING:-
The process of stealing personal information, changing financial data,
making security systems to gain unauthorised access of computer
system is called cracking . The person who involved in the process of
cracking is known as cracker. Software cracking is considered illegal and
cracked software is often called pirated software.