Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
content explained:-
what is cyber crime
history
categories
types
motives
safety tips
cyber security
advantages and disadvantages
cyber law
cyber law objectives
cyber law in india
conclusion
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
2. At the end of this lesson, the students should be
able to:
1. understand the several problems ICT has created in
their generation; and
2. write a reflective essay on how ICT can change the
world for better or for worse.
4. In 2012, Stephen Nale (Complex.com)
posted a list of ten most common Internet
cybercrimes as follows:
1. Phishing/Spoofing – the act of sending multiple
emails to multiple users in hopes of having a
number of them clicking on the links or malwares
attached to the email.
2. Blackmail/Extortion – the act of using the
Internet to threaten or damage someone’s
reputation to extort money or anything else of
value. This can be avoided if you are aware of what
you should post on the Internet.
5. 3. Accessing Stored Communications – or hacking; the act
of obtaining unauthorized access to data from a computer
network.
4. Sports Betting – the act of wagering on any sports event
over the Internet. In some countries, gambling (including
sports betting) is illegal even if you are doing it over the
Internet.
5. Non-Delivery of Merchandise – the act of devising a
scheme wherein a culprit posts an item or service for sale
over the Internet and once the transactions have been done,
does not really give the item or service.
6. Electronic Harassment – the act of anonymously using
the Internet to harass, abuse, threaten, or annoy other people.
6. 7. Child Pornography – the act of using the Internet to show
child pornography. This act is highly punishable by law.
8. Drug Trafficking – the act of selling illegal substances
using the Internet.
9. Criminal Copyright Infringement – the act of piracy
mainly for financial gain. In late 2014, the number one pirate
website, ThePirateBay, was raided for the second time due to
years of pirating movies, music, games, books, and other
software. These kinds of websites earn money through
advertising.
7. Combatting Cybercrimes
1. Network Security. Before a hacker can get through the
unauthorized files he or she is targeting, the hacker has to
get through several security measures like firewalls, secure
connections, passwords, anti-malwares, and data
encryptions. The Disadvantages of ICT 177
2. Investigation. URL tracing and logging are used by
websites to track your unique IP addresses. This can be used
by investigators to trace hackers. In piracy, trackers are used
to identify IP addresses currently sharing a pirated file.
3. Penalties. More and more laws are being created and
implemented today. Penalties include both a fine and
imprisonment.
Editor's Notes
Ask the students to share to the class an instance when they (or someone they know) became a victim of cybercrime.
Ask the students what actions were done to take down their issue (in re: 1st item).
Divide the class into groups, ask them to make an advertisement of their choice (slogan, role play, jingle) to campaign on fight against cyberbullying.