2. The internet in India is growing rapidly. It has
given rise to new opportunities in every field we
can think of be it entertainment, business,
sports or education.
There’re two sides to a coin. Internet also has
it’s own disadvantages is Cyber crime- illegal
activity committed on the internet.
Introduction
3. Cyber terrorists usually use the computer as a
tool, target, or both for their unlawful act either
to gain information which can result in heavy
loss/damage to the owner of that intangible
sensitive information.
Cyber crime is emerging as a serious threat. Due
to this cyber crimes increases day by day. Cyber
criminals are becoming more sophisticated and
are targeting consumers as well as public and
private organizations
Introduction
4. HISTORY
The first recorded cyber crime took place in 1820.
That is not surprising considering the fact that the
abacus, which is thought to be the earliest form of a
computer, has been around since 3500 B.c.
In India, Japan and China, the era of modern
computer, however, began with the analytical engine of
Charles Babbage.
The first spam email took place in 1976 when it was
sent out over the ARPANT.
The first virus was installed on an Apple computer in
1982.
5. It is a combining form relating to information
technology, the Internet, and virtual reality.
Meaning of the Word CYBER
6. Need of cyber Preventions
Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
8. Viruses and Worms
A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes. Malicious software that
attaches itself to other software. (virus, worms,
Trojan Horse, web jacking, e-mail bombing etc.
9.
10. Hackers
In common a hacker is a person who breaks
into computers, usually by gaining access to
administrative controls.
11. Malware
The word "malware" comes from the term
"MALicious softWARE."
Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.
12. Trojan Horses
Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
These viruses are the
most serious threats to
computers
14. Use Authentication Technology
Use password bio-metric devices, finger print or
voice recognition technology and retinal
imaging, greatly immense the difficulty of
obtaining unauthorized access to information
systems. Attention to be paid to bio-metric
technology as this recognizes the particular
user’s authentication for using the particular
computer
15. Think about Nature of Crime
Computer crime is diverse, a deep
thought to be given, what cyber crime can
take place in one’s particular
organization, so that different types of
monitoring/security System can be
designed and proper documentation can
be written for security system.
16. Install antivirus programs on
your computers
Viruses may break the immunity of your
computers, making them vulnerable to
external attacks. It is advisable to install
latest antivirus programs on your
computers and to keep them regularly
updated.
17. Back-up your information
regularly
The safety of your business is more guaranteed
if you regularly back up your information.
You should back up your files, data, and other
resources that are the backbones of your
business. You can always turn to the backed
up files in case of data loss through the
invasion.
18. Keep the Computer System Up-
To-Date
Cyber criminals will use software flaws to attack
computer systems frequently and anonymously. Most
Windows based systems can be configured to
download software patches and updates automatically.
By doing this they will monitor all online activity with
the intent to protect the system from viruses and other
malicious programs. They will also be upgraded to
protect against Spyware and Adware.
19. Parental Control
Monitor the online activities of your children.
They should only have access to a computer
located in a central area of your home and you
should regularly check all browser and email
activity. A wise thing to do is to use parental
control software that limits the types of sites
the user can gain access to. Educate the
children in relation to the hazards of cyber
crime.
22. Conclusion
Technology is destructive only in the hands of people
who do not realize that they are one and the same
process as the universe.
I hope that my presentation will be helpful for my
audience to improve their knowledge about cyber
security and to overcome several security loopholes
on their computer operation. Also it helps to spread
awareness among normal people about emerging
security threats. If everyone does their part, not only
will they be safer but it will be setting an example for
others as well as making it more difficult for hackers
to cause damage.