SlideShare a Scribd company logo
CYBER CRIME is an activity done
using computers and Internet. we
can say that it is an unlawful acts
wherein the computer either a
tool or Target or Both.
 Cyber crime is emerging as a
major threat . World wide
Governments ,police departments
,and inelligence units have started
to react.
Categories of cyber crimes
We can categorize cyber crimes into two types:
Computer as a target : using a computer to
target another computer. E.g;Hacking,
virus/worms attacks, Dos attacks etc.
Computer as a Weapon : Using a computer to
commit a real world crime. E.g; cyber
terrorism, credit card fraud and pornography.
TYPES OF CYBER CRIMES
• HACKING : Hacking in simple terms means an
illegal intrusion into a computer system
and/or network. It is also known as
CRACKING. Governments websites are the hot
target of the hackers due to press coverage,it
receives. Hackers enjoy the media coverage.
• Hacking is a crime which entiles cracking
systems and gaining unauthorized access to
the data stored in them.
CYBER CRIMES
• CYBER SQUATTING : Cyber squatting is the act
of registering a famous domain name and
then selling it for the fortune.
• CHILD PORNOGRAPHY : The internet is highly
used by its abusers to reach and abuse
children sexually, world wide. As more homes
have access to internet, more children would
be using the internet and more the chances of
falling victim to the aggression Pedophiles.
How do they operate: pedophiles use false identity to trap the children,
pedophiles connect children in various chat rooms which are used by the children
to interact with other people.
CYBER CRIMES
• DENIAL OF SERVICE ATTACKS: This is an act by
the criminals who floods the band width of
the victims network or fills his E-mail box with
spam mail depriving him of the service he is
entitled to access or provide.
• VIRUS DISSIMINITION: malicious software that
attaches itself to the software. VIRUS ,
WORMS, TROJAN HORSE AND WEB JACKING.
CYBER CRIMES
• COMPUTER VANDALISM: Damaging or
destroying data rather than stealing or
misusing them is called computer vandalism.
These are program that attach themselves to a
file and then circulate.
• CYBER TERRORISM: Terrorist attacks on the
internet is by distributing denial of service
attacks, hate websites and hate E-mails,
attacks on service networks etc.
CYBER CRIMES
• SOFTWARE PIRACY: Theft of software through
the illegal copying of geunine programs are
the counterfeiting and distribution of products
intended to pass for the original.
CYBER SECURITY
 DISABLE REMOTE CONNECTIVITY: some PDA’s
and phones are equipped with wire less
technologies, such as bluetooth, that can be
used to connect to other devices or
computers. you should disable these features
when they are not in use.
CYBER CRIMES
• CYBER SECURITY involves protection of sensitive
personal and bussiness information through
prevention , detection and response to different
online attacks.
• Keep the software upto date: If the seller reduces
patches for the software operating system of
your device, install them as early as possible.
Install them as early as possible. Installing them
will prevent attackers from being able to take
advantage. Use good password that will be
difficult to the attacker to guess.
Advantage of cyber security
• The cyber security will defend us from critical
attacks.
• Internet security process all the incoming and
outgoing data on your computer.
• It will defend us from Hacks and Virus.
Safety tips
• Use antivirus software.
• Insert firewalls.
• Uninstall unnecessary files.
• Maintain backup.
• Check security settings.
pravallika chowdary

More Related Content

What's hot

Anti corruption laws in india-ppt as on 25.02.2018
Anti corruption laws in india-ppt as on 25.02.2018Anti corruption laws in india-ppt as on 25.02.2018
Anti corruption laws in india-ppt as on 25.02.2018
Sourav Banerjee
 
Virtual reality
Virtual   realityVirtual   reality
Virtual reality
Faisal Al Mamun
 
G20 ppt
G20 pptG20 ppt
G20 ppt
Musferah Amal
 
a brief introduction IN IT & ITES INDUSTRIES IN INDIA.
a brief introduction IN IT & ITES INDUSTRIES IN INDIA.a brief introduction IN IT & ITES INDUSTRIES IN INDIA.
a brief introduction IN IT & ITES INDUSTRIES IN INDIA.
RUNGTA COLLEGE OF ENGINEERING AND TECHNOLOGY,BHILAI,CHHATTISGARH
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
Himanshu Pathak
 
Provision of Human rights in Indian Constitution
 Provision of Human rights in Indian Constitution Provision of Human rights in Indian Constitution
Provision of Human rights in Indian Constitution
Forum of Blended Learning
 
Corruption in india
Corruption in indiaCorruption in india
Corruption in india
HARSH PATHAK
 
Class 12 Economics Project - Make In India
Class 12 Economics Project - Make In IndiaClass 12 Economics Project - Make In India
Class 12 Economics Project - Make In India
MeetNirania
 
Digital india
Digital indiaDigital india
Digital india
AnandKapur3
 
Education and Training Sector Report - January 2019
Education and Training Sector Report - January 2019Education and Training Sector Report - January 2019
Education and Training Sector Report - January 2019
India Brand Equity Foundation
 
Virtual Reality: A Step into Land of Imagination
Virtual Reality: A Step into Land of ImaginationVirtual Reality: A Step into Land of Imagination
Virtual Reality: A Step into Land of Imagination
Siddharth Mishra
 
Corruption and inequality and impact on growth ndc final 05 june 2018
Corruption and inequality and impact on growth ndc final 05 june 2018Corruption and inequality and impact on growth ndc final 05 june 2018
Corruption and inequality and impact on growth ndc final 05 june 2018
DrShamsulArefin
 
Digital india
Digital india Digital india
Digital india
Col Mukteshwar Prasad
 
Virtual Reality
Virtual RealityVirtual Reality
Virtual Reality
Sagar Reddy
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone Crimes
MrityunjaySaraswat
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
Tushar Rajput
 
corruption in india
corruption in indiacorruption in india
corruption in india
Divyam Tantia
 
Augmented Reality in the Library
Augmented Reality in the LibraryAugmented Reality in the Library
Augmented Reality in the Library
Eliot Boden
 
constitutional provision and environment protection
constitutional provision and environment protectionconstitutional provision and environment protection
constitutional provision and environment protection
Ramanand Karwa
 
Article 370
Article 370Article 370
Article 370
Altacit Global
 

What's hot (20)

Anti corruption laws in india-ppt as on 25.02.2018
Anti corruption laws in india-ppt as on 25.02.2018Anti corruption laws in india-ppt as on 25.02.2018
Anti corruption laws in india-ppt as on 25.02.2018
 
Virtual reality
Virtual   realityVirtual   reality
Virtual reality
 
G20 ppt
G20 pptG20 ppt
G20 ppt
 
a brief introduction IN IT & ITES INDUSTRIES IN INDIA.
a brief introduction IN IT & ITES INDUSTRIES IN INDIA.a brief introduction IN IT & ITES INDUSTRIES IN INDIA.
a brief introduction IN IT & ITES INDUSTRIES IN INDIA.
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
Provision of Human rights in Indian Constitution
 Provision of Human rights in Indian Constitution Provision of Human rights in Indian Constitution
Provision of Human rights in Indian Constitution
 
Corruption in india
Corruption in indiaCorruption in india
Corruption in india
 
Class 12 Economics Project - Make In India
Class 12 Economics Project - Make In IndiaClass 12 Economics Project - Make In India
Class 12 Economics Project - Make In India
 
Digital india
Digital indiaDigital india
Digital india
 
Education and Training Sector Report - January 2019
Education and Training Sector Report - January 2019Education and Training Sector Report - January 2019
Education and Training Sector Report - January 2019
 
Virtual Reality: A Step into Land of Imagination
Virtual Reality: A Step into Land of ImaginationVirtual Reality: A Step into Land of Imagination
Virtual Reality: A Step into Land of Imagination
 
Corruption and inequality and impact on growth ndc final 05 june 2018
Corruption and inequality and impact on growth ndc final 05 june 2018Corruption and inequality and impact on growth ndc final 05 june 2018
Corruption and inequality and impact on growth ndc final 05 june 2018
 
Digital india
Digital india Digital india
Digital india
 
Virtual Reality
Virtual RealityVirtual Reality
Virtual Reality
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone Crimes
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
corruption in india
corruption in indiacorruption in india
corruption in india
 
Augmented Reality in the Library
Augmented Reality in the LibraryAugmented Reality in the Library
Augmented Reality in the Library
 
constitutional provision and environment protection
constitutional provision and environment protectionconstitutional provision and environment protection
constitutional provision and environment protection
 
Article 370
Article 370Article 370
Article 370
 

Similar to pravallika chowdary

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cyber crime
Cyber crimeCyber crime
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
KoukiGaz
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
RishabhJain916
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rishabh Jain
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
Avinash Katariya
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Shareb Ismaeel
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
Kira Dess
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
Ambrish Mishra
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
raja jawahar
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Fraz Ali
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
sakshiyad2611
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
aravindanvaithilinga
 

Similar to pravallika chowdary (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 

pravallika chowdary

  • 1.
  • 2. CYBER CRIME is an activity done using computers and Internet. we can say that it is an unlawful acts wherein the computer either a tool or Target or Both.
  • 3.  Cyber crime is emerging as a major threat . World wide Governments ,police departments ,and inelligence units have started to react.
  • 4. Categories of cyber crimes We can categorize cyber crimes into two types: Computer as a target : using a computer to target another computer. E.g;Hacking, virus/worms attacks, Dos attacks etc. Computer as a Weapon : Using a computer to commit a real world crime. E.g; cyber terrorism, credit card fraud and pornography.
  • 5. TYPES OF CYBER CRIMES • HACKING : Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Governments websites are the hot target of the hackers due to press coverage,it receives. Hackers enjoy the media coverage. • Hacking is a crime which entiles cracking systems and gaining unauthorized access to the data stored in them.
  • 6. CYBER CRIMES • CYBER SQUATTING : Cyber squatting is the act of registering a famous domain name and then selling it for the fortune. • CHILD PORNOGRAPHY : The internet is highly used by its abusers to reach and abuse children sexually, world wide. As more homes have access to internet, more children would be using the internet and more the chances of falling victim to the aggression Pedophiles. How do they operate: pedophiles use false identity to trap the children, pedophiles connect children in various chat rooms which are used by the children to interact with other people.
  • 7. CYBER CRIMES • DENIAL OF SERVICE ATTACKS: This is an act by the criminals who floods the band width of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. • VIRUS DISSIMINITION: malicious software that attaches itself to the software. VIRUS , WORMS, TROJAN HORSE AND WEB JACKING.
  • 8. CYBER CRIMES • COMPUTER VANDALISM: Damaging or destroying data rather than stealing or misusing them is called computer vandalism. These are program that attach themselves to a file and then circulate. • CYBER TERRORISM: Terrorist attacks on the internet is by distributing denial of service attacks, hate websites and hate E-mails, attacks on service networks etc.
  • 9. CYBER CRIMES • SOFTWARE PIRACY: Theft of software through the illegal copying of geunine programs are the counterfeiting and distribution of products intended to pass for the original. CYBER SECURITY  DISABLE REMOTE CONNECTIVITY: some PDA’s and phones are equipped with wire less technologies, such as bluetooth, that can be used to connect to other devices or computers. you should disable these features when they are not in use.
  • 10. CYBER CRIMES • CYBER SECURITY involves protection of sensitive personal and bussiness information through prevention , detection and response to different online attacks. • Keep the software upto date: If the seller reduces patches for the software operating system of your device, install them as early as possible. Install them as early as possible. Installing them will prevent attackers from being able to take advantage. Use good password that will be difficult to the attacker to guess.
  • 11.
  • 12.
  • 13. Advantage of cyber security • The cyber security will defend us from critical attacks. • Internet security process all the incoming and outgoing data on your computer. • It will defend us from Hacks and Virus. Safety tips • Use antivirus software. • Insert firewalls. • Uninstall unnecessary files. • Maintain backup. • Check security settings.