SlideShare a Scribd company logo
SUBMITTED BY:-
VARUN
ME IST YR
ROLL NO -162220
 Definition.
 History.
 Categories of cyber crime.
 Types of cyber crime.
 IT Act.
 Safety tips.
 Cyber Security.
 Importance of Cyber security.
 Agencies involved in Cyber Security.
 Be vigilant and follow the tips.
 Cybercrime or Computer crime is crime that
involves a Computer and a Network .The
computer may have been used in the commission
of a crime, or it may be the target
 Crime committed using a computer and the
internet to steal data or information.
 Professor Debarati Halder and K. Jaishankar define
cybercrimes as: "Offences that are committed against
individuals or groups of individuals with a criminal
motive to intentionally harm the reputation of the victim
or cause physical or mental harm, or loss, to the victim
directly or indirectly, using modern telecommunication
networks
 The first recorded cyber crime was recorded in the year
1820.
 The person involved was JOSEPH-MARIE JACQUARD.
 He was a textile manufacture, he made looms.
 He invented looms that can store designs.
 Cyber crimes are broadly categorized into three
categories, namely crime against
 INDIVIDUAL (against people)
 PROPERTY (against properties)
 GOVERNMENT (against nation)
 INDIVIDUAL:-This type of cyber crime can be in
the form of cyber stalking, distributing
pornography, trafficking and “grooming”
 PROPERTY:-In this case, they can steal a person’s
bank details and siphon off money; misuse the
credit card to make numerous purchases online
 GOVERNMENT:-crimes against a government are
referred to as cyber terrorism. In this category,
criminals hack government websites, military
websites or circulate propaganda
Categories Of Cyber Crime
 When any crime is committed over the Internet it
is referred to as a cyber crime. There are many
types of cyber crimes:-
 Hacking
 Cyber Stalking
 cyber bullying
 Identity Theft
 Malicious Software
 Child soliciting and Abuse
 This is a type of crime wherein a person’s
computer is broken into so that his personal or
sensitive information can be accessed.
 The person engaged in hacking
activities is generally referred to
as a HACKER.
Hacker are the person who learn
About the computer system in details. they
write program referred to as hacks.
 Website Hacking
 Network Hacking
 Email Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking
 Website Hacking : Hacking a website means
taking control from the website owner to a
person who hacks the website.
 Network Hacking: is generally means gathering
information about domain by using tools like
Telnet, Ns look UP, Ping, Tracert, Netstat, etc
over the network.
 Email hacking:- is illicit access to an email
account or email correspondence
 Password Hacking:- Password cracking is the
process of recovering secret passwords from
data that has been stored in or transmitted by a
computer system.
 Online banking Hacking:- Unauthorized
accessing bank accounts without knowing the
password or without permission of account
holder is known as Online banking hacking.
 Computer Hacking:- is when files on your
computer are viewed, created, or edited without
your authorization.
Website Hacking Network Hacking
Email hacking
Password Hacking
Online banking
Computer Hacking
 This is a kind of online harassment wherein the
victim is subjected to a criticisms of online
messages and emails.
 Target victim through chat room, message boards
and emails.
 Examples of cyber stalking
Threatening or obscene e-mail
Make fake social network account
Sending unsolicited email.
Cyber bullying is defined as electronically
mediated behaviors among peers such as making
fun of ,telling lies ,spreading rumors, threats and
sharing private information or picture without
permission to do so.
 Example of cyber bullying
Posting hurtful message on social network .
Spreading rumour online or through texts.
Stealing identity of person.
 This has become a major problem with people
using the Internet for cash transactions and
banking services. In this cyber crime, a criminal
accesses data about a person’s bank account,
credit cards, Social Security, debit card and other
sensitive information to buy things online in the
victim’s name.
Malicious software, commonly known as
MALWARE, is any software that brings harm to
a computer system. Malware can be in the form
of worms, viruses, Trojans, spyware, adware
and root kits, etc. which steal protected data,
delete documents or add software not approved
by a user.
 Virus
 Worms
 Trojan horse
 Fast Facts: Attaches to an executable file,
requires human action to spread.
A computer virus attach itself to a program or a file
enabling it to spread from one computer to
another. Almost all viruses are attached to an
executable file, which means the virus may exist
on your computer but it actually cannot infect your
computer unless you run or open the malicious
program.
 Dormant phase:- The virus program is idle during
this stage. The virus program has managed to
access the target user's computer or software, but
during this stage, the virus does not take any
action.
 Propagation phase:-The virus starts propagating,
that is multiplying and self-replicating itself. The
virus places a copy of itself into other programs or
into certain system areas on the disk. The copy
may not be identical to the propagating version.
 Triggering phase:- A dormant virus moves into his
phase when it is activated, and will now perform the
function for which it was intended. The triggering phase
can be caused by a variety of system events, including a
count of the number of times that this copy of the virus
has made copies of itself.
 Execution phase:- This is the actual work of the virus,
where the "payload" will be released. It can be
destructive such as deleting files on disk, crashing the
system, or corrupting files or relatively harmless such as
popping up humorous or political messages on screen.
Boot Viruses
 Infect the boot block on a floppy or hard disk
File Viruses
 Infect .EXE or .COM files
Multi-partite Viruses
 Infect both boot blocks and executable files.
Polymorphic Viruses
 Is self-modifying, changes each time it infects a file or
disk.
 Fast Facts:- Can replicate itself on system, does not
require human action to spread
A worm is similar to a virus by design and is considered
to be a sub-class of a virus. Worms spread from
computer to computer, but unlike a virus, it has the
capability to travel without any human action.
The biggest danger with a worm is its capability to
replicate itself on your system, so rather than your
computer sending out a single worm, it could send out
hundreds or thousands of copies of itself, creating a
huge devastating effect
 Fast Facts:- Appears useful but damages system,
requires human action to run, do not self-replicate.
The Trojan Horse, at first glance will appear to be
useful software but will actually do damage once
installed or run on your computer. Trojan is
activated on your computer, the results can vary.
Some Trojans are designed to be more annoying
than malicious (like changing your desktop, adding
silly active desktop icons)
 Lots of popup messages.
 The home page in your browser has changed.
 Programs start with no reason or interaction
from the user.
 Files and folders disappear.
 The PC feels slower than usual.
 Install Anti-Virus/Malware Software.
 Keep Your Anti-Virus Software Up to Date.
 Run Regularly Scheduled Scans with Your Anti-
Virus Software.
 Keep Your Operating System Current.
 Secure Your Network.
 Keep Your Personal Information Safe.
 Don’t Use Open Wi-Fi.
 Use Multiple Strong Passwords.
 This is also a type of cyber crime wherein
criminals solicit minors via chat rooms for the
purpose of child pornography.
 Child pornography is one of fastest bussiness
going online.
 1 in 5 girls and 1 in 20 boys is victim of child
sexual abuse
 In order to prevent child abuse you should:
 Explian your children the safety rules of the internet.
 Keep your home computer out in the open.
 Set up an internet protection program on the computers
your children use.
 Tell your children not to
give out passwords,
even to a good friend.
 Spam is unsolicited or bulk electronic message used to
promote material that is often not wanted or applicable to
the recipient
 The content of spam can also immoral ,illegal and
offensive
 spam is often refered to as unsolicated bulk
mail(ubm),excessive multi posting (emp),unsolicated
commerical mail(uce),spam mail,,bulk mail or junk mail
 The first spam message
 3rd may 1978
 Gary thuerk salesman a marketer for the Digital
Equipment Corporation, blasted out his
message Using ARPANET sent to 593
accounts numerous times to restrictions of email
account
 It's usually sent by a "spammer," a company in
the business of distributing unsolicited email
 The cost of spam is far less than postal bulk
mailings.
 15 million email addresses can be purchased for
as little as $129
 Sometimes they may buy your address .
 They obtain them by using software programs
known as "harvesters" that pluck names from
websites, newsgroups
 Don’t give out email addresses to unreliable sources.
 Delete spam mail without read them.
Read carefully when filling out online forms requesting
your e-mail address, and exercise your choice.
 Use multiple e-mail addresses.
 Short e-mail addresses are easy to guess, and may
receive more spam.
• Use of internet based attacks in terrorists
activities against computers/networks with the
intension of causing harm.
• Cyber terrorism can also include attacks on
Internet business, but when this is done for
economic motivations rather than ideological.
 Software piracy is the unauthorized or illegal copying,
distribution, or use of software. It is such a profitable
“Business" that it has caught the attention of organized
crime groups in a number of countries.
o Use Anti-virus software.
o Insert Firewall.
o Uninstall unnecessary software.
o Maintain Backup.
o Check security settings.
o Stay Anonymous - choose a genderless screen
name.
o Never give your full name or address to
strangers.
o Learn more about Internet Privacy.
 Cyber security denotes the technologies and
procedures intended to safeguard computers,
networks, and data from unlawful admittance,
weaknesses, and attacks transported through the
Internet
 Cyber security standards are security standards
which enable organizations to practice safe
security techniques to minimize the number of
successful cyber security attacks.
 Governments, military, corporations, financial
institutions, hospitals and other businesses collect,
process and store a great deal of confidential
information on computers and transmit that data
across networks to other computers. With the
growing volume and sophistication of cyber
attacks, ongoing attention is required to protect
sensitive business and personal information, as
well as safeguard national security.
 ISO 27001 is the international Cybersecurity
Standard that delivers a model for creating,
applying, functioning, monitoring, reviewing,
preserving, and improving an Information Security
Management System.
 The Ministry of Communication and Information
Technology under the government of India
provides a strategy outline called the National
Cybersecurity Policy. The purpose of this
government body is to protect the public and
private infrastructure from cyber-attacks.
Mission:-
To safeguard information and information infrastructure in
cyberspace.
 To build capabilities to prevent and respond to cyber
threats.
 To reduce vulnerabilities and minimize damage from
cyber incidents through a combination of institutional
structures, people, processes, technology, and
cooperation
 Vision:- To build a secure and resilient cyberspace for
citizens, businesses, and Government.
 Protects system against viruses, worms,
spyware and other unwanted programs.
 Protection against data from theft.
 Protects the computer from being hacked.
 Protect it from criminal attack.
 Application of cyber security used in our
computer need to be update every week.
 National Cyber Security Awareness Month is
designed to engage and educate public and
private sector partners through events and
initiatives with the goal of raising awareness about
cyber security and increasing the resiliency of the
nation in the event of a cyber incident.
October 2014 marks the 11th Annual National
Cyber Security Awareness Month
 CERT-In(Computer Emergency Response Team India)
 NCIIPC(National Critical Information Infrastructure
Protection Center)
 CS&C(Office Of Cyber Security & Communication)
 NCCIC(National Cyber Security & Communication
Integration Center)
 NCCC(National Cyber Coordination Center)
 Be vigilant and follow the tips given below while you
participate in online activities:
 Filter the visibility of personal information in social sites.
 Do not keep the "remember password" button active for
any email address and passwords
 Make sure your online banking platform is secure.
 Keep a watchful eye while shopping online.
 Do not save passwords on mobile devices.
 Secure the login details for mobile devices and
computers, etc.
 To tackle the issue of cybercrimes, CIDs (Criminal
Investigation Departments) of various cities opened up
Cyber Crime Cells in different cities.
 Process--
 Step 1- For Cyber Crime Complaint First of all write an
application in the name head of cyber crime cell.
 Step 2- Provide the following things with the application-
 Name
 Address
 Email address
 Telephone no.
 Step 3- For required documents there are two cases.
 a) In case of vulgar emails, abusive email etc the following
details is required cyber crime compliant-
 The header of email which is offending you.
 The email address of offending sender.
 b) In case of Hacking the following details is required for
cyber crime complaint-
 Logs of the server.
 A hard copy and soft copy of the defected page.
 If the data of the defected site is compromised then you will
need a soft copy of original data as well as compromised
data.
 Control mechanism details of access in which you have to tell
who has access the computer.
 If you have any doubt or your feeling suspicious about
anyone then you have to provide the list of these suspicions.
 Step 4- You can file the complaint from any cyber cell of any
of the cities and also send direct email on below given email
of Cyber Cell Police Station.
 Technology is destructive only in the hands of
people who do not realize that they are one
And the same process as the universe.
Presentation on cyber security

More Related Content

What's hot

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
Tauhidul islam
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
PsychoticBanda
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Cyber crime
Cyber crimeCyber crime
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
Maira Asif
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus
 
Cyber security
Cyber securityCyber security
Cyber security
Shivaani srinivas iyer
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
vimal kumar arora
 

What's hot (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 

Similar to Presentation on cyber security

Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
GudipudiDayanandam
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Sukhdev48
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
SibyJames1
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
AFROZULLA KHAN Z
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
Deepak Kumar (D3)
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
ErAdityaSingh1
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
DrPraveenKumar37
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Anoop Mishra
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
faadu1
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
HArshMangasuli
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
HeroZero12
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
mohan jena
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
mabiratu
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
ssuser77bda9
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
VarunJain65422
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
KeerthikaaThiyagaraj
 

Similar to Presentation on cyber security (20)

Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
 

Recently uploaded

Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 

Presentation on cyber security

  • 1. SUBMITTED BY:- VARUN ME IST YR ROLL NO -162220
  • 2.
  • 3.  Definition.  History.  Categories of cyber crime.  Types of cyber crime.  IT Act.  Safety tips.  Cyber Security.  Importance of Cyber security.  Agencies involved in Cyber Security.  Be vigilant and follow the tips.
  • 4.  Cybercrime or Computer crime is crime that involves a Computer and a Network .The computer may have been used in the commission of a crime, or it may be the target  Crime committed using a computer and the internet to steal data or information.
  • 5.  Professor Debarati Halder and K. Jaishankar define cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks
  • 6.  The first recorded cyber crime was recorded in the year 1820.  The person involved was JOSEPH-MARIE JACQUARD.  He was a textile manufacture, he made looms.  He invented looms that can store designs.
  • 7.  Cyber crimes are broadly categorized into three categories, namely crime against  INDIVIDUAL (against people)  PROPERTY (against properties)  GOVERNMENT (against nation)
  • 8.
  • 9.  INDIVIDUAL:-This type of cyber crime can be in the form of cyber stalking, distributing pornography, trafficking and “grooming”  PROPERTY:-In this case, they can steal a person’s bank details and siphon off money; misuse the credit card to make numerous purchases online  GOVERNMENT:-crimes against a government are referred to as cyber terrorism. In this category, criminals hack government websites, military websites or circulate propaganda Categories Of Cyber Crime
  • 10.  When any crime is committed over the Internet it is referred to as a cyber crime. There are many types of cyber crimes:-  Hacking  Cyber Stalking  cyber bullying  Identity Theft  Malicious Software  Child soliciting and Abuse
  • 11.  This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed.  The person engaged in hacking activities is generally referred to as a HACKER. Hacker are the person who learn About the computer system in details. they write program referred to as hacks.
  • 12.  Website Hacking  Network Hacking  Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking
  • 13.  Website Hacking : Hacking a website means taking control from the website owner to a person who hacks the website.  Network Hacking: is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc over the network.
  • 14.  Email hacking:- is illicit access to an email account or email correspondence  Password Hacking:- Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 15.  Online banking Hacking:- Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.  Computer Hacking:- is when files on your computer are viewed, created, or edited without your authorization.
  • 16. Website Hacking Network Hacking Email hacking Password Hacking Online banking Computer Hacking
  • 17.  This is a kind of online harassment wherein the victim is subjected to a criticisms of online messages and emails.  Target victim through chat room, message boards and emails.  Examples of cyber stalking Threatening or obscene e-mail Make fake social network account Sending unsolicited email.
  • 18. Cyber bullying is defined as electronically mediated behaviors among peers such as making fun of ,telling lies ,spreading rumors, threats and sharing private information or picture without permission to do so.  Example of cyber bullying Posting hurtful message on social network . Spreading rumour online or through texts. Stealing identity of person.
  • 19.  This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to buy things online in the victim’s name.
  • 20. Malicious software, commonly known as MALWARE, is any software that brings harm to a computer system. Malware can be in the form of worms, viruses, Trojans, spyware, adware and root kits, etc. which steal protected data, delete documents or add software not approved by a user.
  • 21.  Virus  Worms  Trojan horse
  • 22.  Fast Facts: Attaches to an executable file, requires human action to spread. A computer virus attach itself to a program or a file enabling it to spread from one computer to another. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program.
  • 23.  Dormant phase:- The virus program is idle during this stage. The virus program has managed to access the target user's computer or software, but during this stage, the virus does not take any action.  Propagation phase:-The virus starts propagating, that is multiplying and self-replicating itself. The virus places a copy of itself into other programs or into certain system areas on the disk. The copy may not be identical to the propagating version.
  • 24.  Triggering phase:- A dormant virus moves into his phase when it is activated, and will now perform the function for which it was intended. The triggering phase can be caused by a variety of system events, including a count of the number of times that this copy of the virus has made copies of itself.  Execution phase:- This is the actual work of the virus, where the "payload" will be released. It can be destructive such as deleting files on disk, crashing the system, or corrupting files or relatively harmless such as popping up humorous or political messages on screen.
  • 25. Boot Viruses  Infect the boot block on a floppy or hard disk File Viruses  Infect .EXE or .COM files Multi-partite Viruses  Infect both boot blocks and executable files. Polymorphic Viruses  Is self-modifying, changes each time it infects a file or disk.
  • 26.  Fast Facts:- Can replicate itself on system, does not require human action to spread A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect
  • 27.  Fast Facts:- Appears useful but damages system, requires human action to run, do not self-replicate. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons)
  • 28.  Lots of popup messages.  The home page in your browser has changed.  Programs start with no reason or interaction from the user.  Files and folders disappear.  The PC feels slower than usual.
  • 29.  Install Anti-Virus/Malware Software.  Keep Your Anti-Virus Software Up to Date.  Run Regularly Scheduled Scans with Your Anti- Virus Software.  Keep Your Operating System Current.  Secure Your Network.  Keep Your Personal Information Safe.  Don’t Use Open Wi-Fi.  Use Multiple Strong Passwords.
  • 30.  This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography.  Child pornography is one of fastest bussiness going online.  1 in 5 girls and 1 in 20 boys is victim of child sexual abuse
  • 31.  In order to prevent child abuse you should:  Explian your children the safety rules of the internet.  Keep your home computer out in the open.  Set up an internet protection program on the computers your children use.  Tell your children not to give out passwords, even to a good friend.
  • 32.  Spam is unsolicited or bulk electronic message used to promote material that is often not wanted or applicable to the recipient  The content of spam can also immoral ,illegal and offensive  spam is often refered to as unsolicated bulk mail(ubm),excessive multi posting (emp),unsolicated commerical mail(uce),spam mail,,bulk mail or junk mail
  • 33.  The first spam message  3rd may 1978  Gary thuerk salesman a marketer for the Digital Equipment Corporation, blasted out his message Using ARPANET sent to 593 accounts numerous times to restrictions of email account
  • 34.  It's usually sent by a "spammer," a company in the business of distributing unsolicited email  The cost of spam is far less than postal bulk mailings.  15 million email addresses can be purchased for as little as $129
  • 35.  Sometimes they may buy your address .  They obtain them by using software programs known as "harvesters" that pluck names from websites, newsgroups
  • 36.  Don’t give out email addresses to unreliable sources.  Delete spam mail without read them. Read carefully when filling out online forms requesting your e-mail address, and exercise your choice.  Use multiple e-mail addresses.  Short e-mail addresses are easy to guess, and may receive more spam.
  • 37. • Use of internet based attacks in terrorists activities against computers/networks with the intension of causing harm. • Cyber terrorism can also include attacks on Internet business, but when this is done for economic motivations rather than ideological.
  • 38.  Software piracy is the unauthorized or illegal copying, distribution, or use of software. It is such a profitable “Business" that it has caught the attention of organized crime groups in a number of countries.
  • 39.
  • 40. o Use Anti-virus software. o Insert Firewall. o Uninstall unnecessary software. o Maintain Backup. o Check security settings. o Stay Anonymous - choose a genderless screen name. o Never give your full name or address to strangers. o Learn more about Internet Privacy.
  • 41.
  • 42.  Cyber security denotes the technologies and procedures intended to safeguard computers, networks, and data from unlawful admittance, weaknesses, and attacks transported through the Internet  Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks.
  • 43.  Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security.
  • 44.  ISO 27001 is the international Cybersecurity Standard that delivers a model for creating, applying, functioning, monitoring, reviewing, preserving, and improving an Information Security Management System.  The Ministry of Communication and Information Technology under the government of India provides a strategy outline called the National Cybersecurity Policy. The purpose of this government body is to protect the public and private infrastructure from cyber-attacks.
  • 45. Mission:- To safeguard information and information infrastructure in cyberspace.  To build capabilities to prevent and respond to cyber threats.  To reduce vulnerabilities and minimize damage from cyber incidents through a combination of institutional structures, people, processes, technology, and cooperation  Vision:- To build a secure and resilient cyberspace for citizens, businesses, and Government.
  • 46.  Protects system against viruses, worms, spyware and other unwanted programs.  Protection against data from theft.  Protects the computer from being hacked.  Protect it from criminal attack.  Application of cyber security used in our computer need to be update every week.
  • 47.  National Cyber Security Awareness Month is designed to engage and educate public and private sector partners through events and initiatives with the goal of raising awareness about cyber security and increasing the resiliency of the nation in the event of a cyber incident. October 2014 marks the 11th Annual National Cyber Security Awareness Month
  • 48.  CERT-In(Computer Emergency Response Team India)  NCIIPC(National Critical Information Infrastructure Protection Center)  CS&C(Office Of Cyber Security & Communication)  NCCIC(National Cyber Security & Communication Integration Center)  NCCC(National Cyber Coordination Center)
  • 49.  Be vigilant and follow the tips given below while you participate in online activities:  Filter the visibility of personal information in social sites.  Do not keep the "remember password" button active for any email address and passwords  Make sure your online banking platform is secure.  Keep a watchful eye while shopping online.  Do not save passwords on mobile devices.  Secure the login details for mobile devices and computers, etc.
  • 50.  To tackle the issue of cybercrimes, CIDs (Criminal Investigation Departments) of various cities opened up Cyber Crime Cells in different cities.  Process--  Step 1- For Cyber Crime Complaint First of all write an application in the name head of cyber crime cell.  Step 2- Provide the following things with the application-  Name  Address  Email address  Telephone no.  Step 3- For required documents there are two cases.  a) In case of vulgar emails, abusive email etc the following details is required cyber crime compliant-  The header of email which is offending you.  The email address of offending sender.
  • 51.  b) In case of Hacking the following details is required for cyber crime complaint-  Logs of the server.  A hard copy and soft copy of the defected page.  If the data of the defected site is compromised then you will need a soft copy of original data as well as compromised data.  Control mechanism details of access in which you have to tell who has access the computer.  If you have any doubt or your feeling suspicious about anyone then you have to provide the list of these suspicions.  Step 4- You can file the complaint from any cyber cell of any of the cities and also send direct email on below given email of Cyber Cell Police Station.
  • 52.  Technology is destructive only in the hands of people who do not realize that they are one And the same process as the universe.