PRESENTATION
ON
CYBER CRIME
AND ITS
SECURITY
TECHNIQUES
PRESENTED BY
SNEHA CHAUHAN
INTRODUCTION
ď‚— The internet in India is growing
rapidly. It has given rise to new
opportunities in every field we can
think of be it entertainment,
business, sports or education.
 There’s two side to a coin. Internet
also has it’s own disadvantages is
Cyber crime- illegal activity
committed on the internet
DEFINING CYBER CRIME
ď‚— Crime committed using a computer and the internet to
steal data or informati0n.
ď‚— Illegal imports.
ď‚— Malicious programs
TYPES OF CYBER CRIME
ď‚— Hacking
ď‚— Denial of service attack
ď‚— Virus Dissemination
ď‚— Computer Vandalism
ď‚— Cyber terrorism
ď‚— Software Piracy
SAFETY TIPS FOR CYBER CRIME
 Use antivirus software’s
ď‚— Insert firewalls
ď‚— Maintain backup
ď‚— Check security settings
ď‚— Never give your full name or address to strangers
ď‚— Learn more about internet policy
CYBER SECURITY
ď‚— DISABLE REMOTE
CONNECTIVITY: some PDA’s
and phones are equipped with
wireless technologies , such as
Bluetooth that can be used top
connect to other devices or
computers . You should disable
these features when they are not
in use.
CYBER SECURITY
ď‚— CYBER SECURITY: Cyber security involves protection
of sensitive personal and business information
through prevention, detection and response to
different online attacks.
ď‚— PRIVACY POLICY: Before submitting your name, e-
mail address, on a website look for the sites privacy
policy.
ď‚— KEEP SOFTWARE UP TO DATE: If the seller reduces
patches for the software operating system your device
,install them as soon as possible.
DEFINITION
ď‚— As the internet and other forms of electronic
communication become more prevalent , electronic
security is becoming increasingly important.
Cryptography is used to protect e-mail messages,
credit card information, and corporate data. One of
the most popular cryptography systems used on the
internet is PRETTY GOOD PRIVACY because it’s
effective and free.
TYPES OF CRYPTOGRAPHY
PUBLIC-KEY
CRYPTOGRAPHY
PRIVATE –KEY
CRYPTOGRAPHY
PUBLIC KEY CRYPTOGRAPHY
ď‚— It is also known as asymmetric cryptography ,is a class
of cryptographic protocols based on algorithm that
require two separate keys , one of which is secret and
one of which is public. The public key is used for
encrypt the plain text and private key is used for
decrypt the cipher text.
PRIVATE KEY CRYPTOGRAPHY
ď‚— It is also known as symmetric cryptography that uses
the same cryptography keys for both encryption the
plain text and decryption the cipher text.
ENCRYPTION AND DECRYPTION
APPLICATIONS
ď‚— Defense services
ď‚— Secure data manipulation
ď‚— E-commerce
ď‚— Business transactions
ď‚— Internet payment systems
ď‚— User identification systems
ď‚— Access control
ď‚— Data security
CONCLUSION
ď‚— By using of encryption technique a fair unit of
confidentiality, authentication, integrity, access
control and availability of data is maintained
Ppt

Ppt

  • 1.
  • 2.
    INTRODUCTION  The internetin India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.  There’s two side to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet
  • 3.
    DEFINING CYBER CRIME ď‚—Crime committed using a computer and the internet to steal data or informati0n. ď‚— Illegal imports. ď‚— Malicious programs
  • 4.
    TYPES OF CYBERCRIME ď‚— Hacking ď‚— Denial of service attack ď‚— Virus Dissemination ď‚— Computer Vandalism ď‚— Cyber terrorism ď‚— Software Piracy
  • 5.
    SAFETY TIPS FORCYBER CRIME  Use antivirus software’s  Insert firewalls  Maintain backup  Check security settings  Never give your full name or address to strangers  Learn more about internet policy
  • 6.
    CYBER SECURITY  DISABLEREMOTE CONNECTIVITY: some PDA’s and phones are equipped with wireless technologies , such as Bluetooth that can be used top connect to other devices or computers . You should disable these features when they are not in use.
  • 7.
    CYBER SECURITY ď‚— CYBERSECURITY: Cyber security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks. ď‚— PRIVACY POLICY: Before submitting your name, e- mail address, on a website look for the sites privacy policy. ď‚— KEEP SOFTWARE UP TO DATE: If the seller reduces patches for the software operating system your device ,install them as soon as possible.
  • 9.
    DEFINITION  As theinternet and other forms of electronic communication become more prevalent , electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data. One of the most popular cryptography systems used on the internet is PRETTY GOOD PRIVACY because it’s effective and free.
  • 10.
  • 11.
    PUBLIC KEY CRYPTOGRAPHY ď‚—It is also known as asymmetric cryptography ,is a class of cryptographic protocols based on algorithm that require two separate keys , one of which is secret and one of which is public. The public key is used for encrypt the plain text and private key is used for decrypt the cipher text.
  • 13.
    PRIVATE KEY CRYPTOGRAPHY ď‚—It is also known as symmetric cryptography that uses the same cryptography keys for both encryption the plain text and decryption the cipher text.
  • 15.
  • 16.
    APPLICATIONS ď‚— Defense services ď‚—Secure data manipulation ď‚— E-commerce ď‚— Business transactions ď‚— Internet payment systems ď‚— User identification systems ď‚— Access control ď‚— Data security
  • 17.
    CONCLUSION ď‚— By usingof encryption technique a fair unit of confidentiality, authentication, integrity, access control and availability of data is maintained