SlideShare a Scribd company logo
1 of 23
Presented by:
Surkhab Shelly(Asst. Prof.)
Pt Mohan Lal SD college for Women,
Gurdaspur
CYBER CRIME IN OUR
SOCIETY –PROBLEMS &
PREVENTION
The internet in India is growing rapidly. It has
given rise to new opportunities in every field we
can think of be it entertainment, business,
sports or education.
There’re two sides to a coin. Internet also has
it’s own disadvantages is Cyber crime- illegal
activity committed on the internet.
Introduction
Cyber terrorists usually use the computer as a
tool, target, or both for their unlawful act either
to gain information which can result in heavy
loss/damage to the owner of that intangible
sensitive information.
Cyber crime is emerging as a serious threat. Due
to this cyber crimes increases day by day. Cyber
criminals are becoming more sophisticated and
are targeting consumers as well as public and
private organizations
Introduction
HISTORY
The first recorded cyber crime took place in 1820.
That is not surprising considering the fact that the
abacus, which is thought to be the earliest form of a
computer, has been around since 3500 B.c.
In India, Japan and China, the era of modern
computer, however, began with the analytical engine of
Charles Babbage.
The first spam email took place in 1976 when it was
sent out over the ARPANT.
The first virus was installed on an Apple computer in
1982.
It is a combining form relating to information
technology, the Internet, and virtual reality.
Meaning of the Word CYBER
Need of cyber Preventions
Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
Modes of Cyber Crimes
E mail bombing
Hacking
Virus
Phishing
Identity theft
Data diddling
Web jacking
Cyber warfare
Salami attacks
Viruses and Worms
A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes. Malicious software that
attaches itself to other software. (virus, worms,
Trojan Horse, web jacking, e-mail bombing etc.
Hackers
In common a hacker is a person who breaks
into computers, usually by gaining access to
administrative controls.
Malware
The word "malware" comes from the term
"MALicious softWARE."
Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
Trojan Horses
Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
These viruses are the
most serious threats to
computers
PREVENTION OF CYBER
CRIME
Use Authentication Technology
Use password bio-metric devices, finger print or
voice recognition technology and retinal
imaging, greatly immense the difficulty of
obtaining unauthorized access to information
systems. Attention to be paid to bio-metric
technology as this recognizes the particular
user’s authentication for using the particular
computer
Think about Nature of Crime
Computer crime is diverse, a deep
thought to be given, what cyber crime can
take place in one’s particular
organization, so that different types of
monitoring/security System can be
designed and proper documentation can
be written for security system.
Install antivirus programs on
your computers
Viruses may break the immunity of your
computers, making them vulnerable to
external attacks. It is advisable to install
latest antivirus programs on your
computers and to keep them regularly
updated.
Back-up your information
regularly
The safety of your business is more guaranteed
if you regularly back up your information.
You should back up your files, data, and other
resources that are the backbones of your
business. You can always turn to the backed
up files in case of data loss through the
invasion.
Keep the Computer System Up-
To-Date
Cyber criminals will use software flaws to attack
computer systems frequently and anonymously. Most
Windows based systems can be configured to
download software patches and updates automatically.
By doing this they will monitor all online activity with
the intent to protect the system from viruses and other
malicious programs. They will also be upgraded to
protect against Spyware and Adware.
Parental Control
Monitor the online activities of your children.
They should only have access to a computer
located in a central area of your home and you
should regularly check all browser and email
activity. A wise thing to do is to use parental
control software that limits the types of sites
the user can gain access to. Educate the
children in relation to the hazards of cyber
crime.
India stands 10th in the cyber
crime in the world
Cyber Security Is Everyone’s Responsibility
Conclusion
Technology is destructive only in the hands of people
who do not realize that they are one and the same
process as the universe.
I hope that my presentation will be helpful for my
audience to improve their knowledge about cyber
security and to overcome several security loopholes
on their computer operation. Also it helps to spread
awareness among normal people about emerging
security threats. If everyone does their part, not only
will they be safer but it will be setting an example for
others as well as making it more difficult for hackers
to cause damage.
 cyber crime

More Related Content

What's hot

Computer Infections
Computer InfectionsComputer Infections
Computer Infectionserowell
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Showzed_o07
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimessddj
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)Tanvi Jindal
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYRc Os
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesJayakumar PP
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
TC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaTC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaGeorge Braga
 
Computer safety
Computer safetyComputer safety
Computer safetyahentz
 

What's hot (20)

Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Computer Infections
Computer InfectionsComputer Infections
Computer Infections
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and Opportunities
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
TC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaTC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbraga
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Mobile security
Mobile securityMobile security
Mobile security
 

Similar to cyber crime

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityJay Moliya
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...theijes
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security BasitShah18
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Debabrata Singh
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 

Similar to cyber crime (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
cyber crime
cyber crime cyber crime
cyber crime
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Computer crime
 Computer crime Computer crime
Computer crime
 

More from Surkhab Shelly (18)

2020 sd college- internet of everyhing
2020 sd college- internet of everyhing2020 sd college- internet of everyhing
2020 sd college- internet of everyhing
 
Intro to computer
Intro to computerIntro to computer
Intro to computer
 
Intro to dbms
Intro to dbmsIntro to dbms
Intro to dbms
 
Types of keys dbms
Types of keys dbmsTypes of keys dbms
Types of keys dbms
 
Architecture of dbms
Architecture of dbmsArchitecture of dbms
Architecture of dbms
 
Er model
Er modelEr model
Er model
 
Output devices
Output devicesOutput devices
Output devices
 
SQL
SQLSQL
SQL
 
Structured Query Language
Structured Query LanguageStructured Query Language
Structured Query Language
 
Types of secondary storage devices ppt
Types of secondary storage devices pptTypes of secondary storage devices ppt
Types of secondary storage devices ppt
 
Input devices
Input devicesInput devices
Input devices
 
FUNCTIONAL UNIT
FUNCTIONAL UNITFUNCTIONAL UNIT
FUNCTIONAL UNIT
 
TYPES OF MEMORY
TYPES OF MEMORYTYPES OF MEMORY
TYPES OF MEMORY
 
Fun ppt
Fun pptFun ppt
Fun ppt
 
Dbms
DbmsDbms
Dbms
 
Avl tree ppt
Avl tree pptAvl tree ppt
Avl tree ppt
 
7 foods-to-keep you healthy
7 foods-to-keep  you healthy7 foods-to-keep  you healthy
7 foods-to-keep you healthy
 
Dbms ppt
Dbms pptDbms ppt
Dbms ppt
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

cyber crime

  • 1. Presented by: Surkhab Shelly(Asst. Prof.) Pt Mohan Lal SD college for Women, Gurdaspur CYBER CRIME IN OUR SOCIETY –PROBLEMS & PREVENTION
  • 2. The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet. Introduction
  • 3. Cyber terrorists usually use the computer as a tool, target, or both for their unlawful act either to gain information which can result in heavy loss/damage to the owner of that intangible sensitive information. Cyber crime is emerging as a serious threat. Due to this cyber crimes increases day by day. Cyber criminals are becoming more sophisticated and are targeting consumers as well as public and private organizations Introduction
  • 4. HISTORY The first recorded cyber crime took place in 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.c. In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. The first spam email took place in 1976 when it was sent out over the ARPANT. The first virus was installed on an Apple computer in 1982.
  • 5. It is a combining form relating to information technology, the Internet, and virtual reality. Meaning of the Word CYBER
  • 6. Need of cyber Preventions Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 7. Modes of Cyber Crimes E mail bombing Hacking Virus Phishing Identity theft Data diddling Web jacking Cyber warfare Salami attacks
  • 8. Viruses and Worms A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes. Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.
  • 9.
  • 10. Hackers In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 11. Malware The word "malware" comes from the term "MALicious softWARE." Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 12. Trojan Horses Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system. These viruses are the most serious threats to computers
  • 14. Use Authentication Technology Use password bio-metric devices, finger print or voice recognition technology and retinal imaging, greatly immense the difficulty of obtaining unauthorized access to information systems. Attention to be paid to bio-metric technology as this recognizes the particular user’s authentication for using the particular computer
  • 15. Think about Nature of Crime Computer crime is diverse, a deep thought to be given, what cyber crime can take place in one’s particular organization, so that different types of monitoring/security System can be designed and proper documentation can be written for security system.
  • 16. Install antivirus programs on your computers Viruses may break the immunity of your computers, making them vulnerable to external attacks. It is advisable to install latest antivirus programs on your computers and to keep them regularly updated.
  • 17. Back-up your information regularly The safety of your business is more guaranteed if you regularly back up your information. You should back up your files, data, and other resources that are the backbones of your business. You can always turn to the backed up files in case of data loss through the invasion.
  • 18. Keep the Computer System Up- To-Date Cyber criminals will use software flaws to attack computer systems frequently and anonymously. Most Windows based systems can be configured to download software patches and updates automatically. By doing this they will monitor all online activity with the intent to protect the system from viruses and other malicious programs. They will also be upgraded to protect against Spyware and Adware.
  • 19. Parental Control Monitor the online activities of your children. They should only have access to a computer located in a central area of your home and you should regularly check all browser and email activity. A wise thing to do is to use parental control software that limits the types of sites the user can gain access to. Educate the children in relation to the hazards of cyber crime.
  • 20. India stands 10th in the cyber crime in the world
  • 21. Cyber Security Is Everyone’s Responsibility
  • 22. Conclusion Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe. I hope that my presentation will be helpful for my audience to improve their knowledge about cyber security and to overcome several security loopholes on their computer operation. Also it helps to spread awareness among normal people about emerging security threats. If everyone does their part, not only will they be safer but it will be setting an example for others as well as making it more difficult for hackers to cause damage.