SlideShare a Scribd company logo
1 of 17
Download to read offline
Cyber Security
CONTENT
1. Introduction
2. What is Cyber Security ?
3. Cyber Crimes
4. Types of Cyber Crimes
5. Reasons of increasing Cyber Crimes
6. Thank you
Introduction
INTERNET IS A GLOBAL NETWORK ACCESSIBLE FROM ALL OVER THE
WORLD. MILLIONS OF COMPUTERS ARE CONNECTED WITH INTERNET
WORLDWIDE. INTERNET PLAYS AN IMPORTANT ROLE TO MAKE OUR
LIFE SIMPLE, BUT IT ALSO HAS SOME DISADVANTAGES THAT WE
SHOULD PREVENT. WE SHOULD GIVE SECURITIES TO OUR WORK OR
DATA SAVED OR DONE IN OUR COMPUTER .SECURITY IS AN
IMPORTANT ISSUE FOR ALL MODERN INFORMATION SYSTEM.
The process of protecting computer resources
such as networks, devices, programs, and data
from unauthorized access , damage or attack is
called Cyber Security . Confidential data and
privacy must be safe guarded and the system
must beProtected against malicious acts of theft
oe disruption.
Cyber Crimes 😈
Cyber crime is
a criminal
activity in
which
computers are
used to
damage data,
steal data or
disrupt digital
life of a person
DATA DIDDLING:-
efers to the process of changing the data going into or out of a
computer. For example ,a student breaks into his/her university’s grade
recording system and changes the grades he/she earned in last
semester’s or class, thus raising his/ her grade point average.
PHREAKING:-
This crime is committed against telephone companies by using
computers with the goal of making free distance calls, impersonating
directory assistant or other operator service, diverting calls to numbers
of the preparators choice ,or tapping phone lines.
CLONING:-
This refers to a fraudin which scanners are used to stealthe electric
serial numbers of cellular phones, which may be used for billing
purposes and making broadcast calls. With stolen serial number, clones
can be made to make free calls that are billed to the owner of the
original cell phone.
CARDING:-
This refers to the process of stealing credit card numbers online ,to be
resold or used to charge merchandise against victims account.
HACKING:-
Computer hacking is the practice of modified
computer hardware and software to Kamlesh a girl
outside of the creators original purpose. People who
in which in computer hacking activity are often called
hackers.
. Some organisation actually
employee computer hackers as part of their technical
support staff. These individuals use their skills to
find flaws in the companies Security system so that
they can be repaired quickly. In many cases, this type
of computer hacking helps prevent identity and other
CRACKING:-
The process of stealing personal information, changing financial data,
making security systems to gain unauthorised access of computer
system is called cracking . The person who involved in the process of
cracking is known as cracker. Software cracking is considered illegal and
cracked software is often called pirated software.
Reasons Of Increasing Cyber Crimes. 😈
INCREASING USE OF INTERNET
EXISTING LOOPHOLES IN
SOFTWARE
LACK OF AWARENESS
UNTRAINED INTERNET USERS
MULTI PRONGED ATTACKS.
Cyber_security_.pdf

More Related Content

Similar to Cyber_security_.pdf

cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptxPradeeshSAI
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threadsLeena Reddy
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Home cyber security
Home cyber securityHome cyber security
Home cyber securityMichael File
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxAkshayKhade21
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber securityJetking
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxCabdullhiY
 

Similar to Cyber_security_.pdf (20)

Hacking 1
Hacking 1Hacking 1
Hacking 1
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
 
Bi
BiBi
Bi
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
 

Recently uploaded

Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxpradhanghanshyam7136
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxBroad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxjana861314
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxAleenaTreesaSaji
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsSumit Kumar yadav
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡anilsa9823
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisDiwakar Mishra
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)PraveenaKalaiselvan1
 

Recently uploaded (20)

Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptx
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptxBroad bean, Lima Bean, Jack bean, Ullucus.pptx
Broad bean, Lima Bean, Jack bean, Ullucus.pptx
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptx
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questions
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)
 

Cyber_security_.pdf

  • 2. CONTENT 1. Introduction 2. What is Cyber Security ? 3. Cyber Crimes 4. Types of Cyber Crimes 5. Reasons of increasing Cyber Crimes 6. Thank you
  • 3. Introduction INTERNET IS A GLOBAL NETWORK ACCESSIBLE FROM ALL OVER THE WORLD. MILLIONS OF COMPUTERS ARE CONNECTED WITH INTERNET WORLDWIDE. INTERNET PLAYS AN IMPORTANT ROLE TO MAKE OUR LIFE SIMPLE, BUT IT ALSO HAS SOME DISADVANTAGES THAT WE SHOULD PREVENT. WE SHOULD GIVE SECURITIES TO OUR WORK OR DATA SAVED OR DONE IN OUR COMPUTER .SECURITY IS AN IMPORTANT ISSUE FOR ALL MODERN INFORMATION SYSTEM.
  • 4.
  • 5. The process of protecting computer resources such as networks, devices, programs, and data from unauthorized access , damage or attack is called Cyber Security . Confidential data and privacy must be safe guarded and the system must beProtected against malicious acts of theft oe disruption.
  • 7. Cyber crime is a criminal activity in which computers are used to damage data, steal data or disrupt digital life of a person
  • 8.
  • 9. DATA DIDDLING:- efers to the process of changing the data going into or out of a computer. For example ,a student breaks into his/her university’s grade recording system and changes the grades he/she earned in last semester’s or class, thus raising his/ her grade point average.
  • 10. PHREAKING:- This crime is committed against telephone companies by using computers with the goal of making free distance calls, impersonating directory assistant or other operator service, diverting calls to numbers of the preparators choice ,or tapping phone lines.
  • 11. CLONING:- This refers to a fraudin which scanners are used to stealthe electric serial numbers of cellular phones, which may be used for billing purposes and making broadcast calls. With stolen serial number, clones can be made to make free calls that are billed to the owner of the original cell phone.
  • 12. CARDING:- This refers to the process of stealing credit card numbers online ,to be resold or used to charge merchandise against victims account.
  • 13. HACKING:- Computer hacking is the practice of modified computer hardware and software to Kamlesh a girl outside of the creators original purpose. People who in which in computer hacking activity are often called hackers. . Some organisation actually employee computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the companies Security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity and other
  • 14. CRACKING:- The process of stealing personal information, changing financial data, making security systems to gain unauthorised access of computer system is called cracking . The person who involved in the process of cracking is known as cracker. Software cracking is considered illegal and cracked software is often called pirated software.
  • 15. Reasons Of Increasing Cyber Crimes. 😈
  • 16. INCREASING USE OF INTERNET EXISTING LOOPHOLES IN SOFTWARE LACK OF AWARENESS UNTRAINED INTERNET USERS MULTI PRONGED ATTACKS.