SlideShare a Scribd company logo
1 of 26
CYBER
CRIME AND
SECURITY
Presenting to: Miss. Rohinee pathak
What is Cyber
Security?
The technique of protecting internet- connected
systems such as computers, servers,mobile
devices, Electronic systems,, networks, and data
from malicious attacks is known as cybersecurity.
By applying Cyber
security Methods.
Why it is needed?
With so much good
coming from technology
it can be hard to believe
that potential threats
lurk behind every device
and platform . A steady
rise in cyber crime
highlights the flaws in
devices and services
we’ve come to depend
on. This concern
focuses to ask what
cyber security is why
it’s essential and what
to learn about it.
Types of Cyber crime or threats
(i) Malware
(ii) Phishing
(iii) Password attacks
(iv) DDOS (Distributed denial of service)
(v) Man in the middle
(vi) Drive by downloads
(vii) Mal-advertising
(viii) Rogue Software
(i) Malware
(ii) Phishing
Phishing is a fraudulent
practice in which an attacker
masquerades as a reputable
entity or person in an email
or other form of
communication. Attackers
commonly use phishing emails
to distribute malicious links
or attatchments that can
extract login credentials ,
account numbers and other
personal information from
victims.
(ii)Password attacks
Password attack is a type of cyberattack
where hackers attempt to access a file folder
account or computer secured with a password.
password attacks in cyber security require
special techniques and software. If a hacker is
close to you they may try guessing your
password using a combination of names
hobbies essential years or numbers.
If that doesn’t work they use specialised
applications that scan through a list of words
many people use as passwords. Surprisingly
over 75% of the internet population set
password consisting of the first 500 words
only.
With this in mind imagine how easy it is for
malicious actors to gain access to your crucial
information!
(iv) DDoS(Distributed denial of service)
It is a cybercrime in which
the attacker floods a server
with internet traffic to
prevent users from accessing
connected online services with
sites. It is a malicious
attempt to disrupt the normal
traffic of a targeted server
service or network by
overwhelming the target or
its surrounding infrastructure
with a flood of internet of
traffic.
(v) Man in the middle
A man in the middle (MITM)
attack is a general term for
when a perpetrator positions
himself in a conversation
between a user and an
application-either to eavesdrop
or to impersonate one of the
parties, making it appear as if
a normal exchange of
information is underway.
The goal of an attack is to
steal personal information,
such as login credentials,
account details and credit card
numbers.
(vi) Drive by downloads
A drive by download refers to the
unintentional download of malicious code
onto a computer or mobile device that
exposes user to different types of threats.
What sets this type of attack apart from
others is that users need not click on
anything to initiate the download Simply
accessing or browsing a website can
activate to initiate the download.
The malicious code is designes to download
malicious files onto the victim’s PC without
the user being aware that anything
untoward has happened.
(vii) Mal-advertising
Mal-advertising combines the
words “malicious advertising”
to describe “the practice of
using advertisements to
distribute malware. We’re
accustomed to recognising it
in pop-ups , or ads in the
margins begging us to click,
offering a surprise , and
distracting us from otherwise
enjoyable game of tetris.
(Viii) Rogue Software
Rogue security software is a
form of malware that’s
designed to trick victims
into thinking their computer
or device has been infected
with a virus. Like legitimate
antivirus products, it
displays pop-up messages
telling the victim that his or
her computer or device has
been infected with a virus.
Goals of Cyber Security
Who attacks and Who protects?
BAD SUSPICIOUS GOOD
Cyber Security Methods
1. Use Strong password
(i) Use a combination of capital and lower-case letters
,numbers and symbols.
(ii) making it between eight and twelve characters long.
(iii) avoid the use of personal data.
(iv) changing it regularly.
(v) never use it in case of multiple accounts.
(vi) using two-factor authentication.
2. Put up a firewall.
3. Control Access to data and systems.
Don’t click on suspicious emails,
websites and pop-ups.
4.
5. Use security software.
Security software is designed to protect and secure servers, laptops, mobile devices,
and networks from unauthorized access, intrusions, viruses, and other threats.Types
of security software include anti-virus software, firewall software, network security
software, Internet security software, malware/spamware removal and protection
software, cryptographic software, and more.
6. Update programs and systems regularly.
7. Monitor For Intrusion.
8. Raise Awareness.
9. Download softwares or any data from
trusted and authorised sources only.
In practice if a software is getting many honest good reviews it is probably safe.
As a smart user specially we IT students ,
Prepared and Presented By :
Mradul Sonare
Bachelor of computer applications (plain)
SAM Global University, Bhopal (M.P.)

More Related Content

Similar to Untitled presentation.pptx

cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptxsakshiyad2611
 
Exploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat LandscapeExploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat Landscapecyberprosocial
 
Cyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk AdvisoryCyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk AdvisoryCR Group
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
Cyber security
Cyber securityCyber security
Cyber securityRIPPER95
 
Security Threats & Cyber Crimes
Security Threats & Cyber CrimesSecurity Threats & Cyber Crimes
Security Threats & Cyber CrimesKushan Dananjaya
 
What Is Denial Of Service Attack
What Is Denial Of Service AttackWhat Is Denial Of Service Attack
What Is Denial Of Service AttackStephanie Williams
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdfPhD Assistance
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismawderdlfy
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Cyber security beginner level presentation slide
Cyber security beginner level presentation slideCyber security beginner level presentation slide
Cyber security beginner level presentation slideMd. Ismiel Hossen Abir
 
Ict presentation pptx
Ict presentation pptxIct presentation pptx
Ict presentation pptxGulsherZ
 

Similar to Untitled presentation.pptx (20)

cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Cyber security
Cyber security Cyber security
Cyber security
 
Exploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat LandscapeExploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat Landscape
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk AdvisoryCyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk Advisory
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security Threats & Cyber Crimes
Security Threats & Cyber CrimesSecurity Threats & Cyber Crimes
Security Threats & Cyber Crimes
 
SAHITHI.PPT.pptx
SAHITHI.PPT.pptxSAHITHI.PPT.pptx
SAHITHI.PPT.pptx
 
What Is Denial Of Service Attack
What Is Denial Of Service AttackWhat Is Denial Of Service Attack
What Is Denial Of Service Attack
 
Computer security and
Computer security andComputer security and
Computer security and
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber security beginner level presentation slide
Cyber security beginner level presentation slideCyber security beginner level presentation slide
Cyber security beginner level presentation slide
 
Ict presentation pptx
Ict presentation pptxIct presentation pptx
Ict presentation pptx
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Untitled presentation.pptx

  • 2. What is Cyber Security? The technique of protecting internet- connected systems such as computers, servers,mobile devices, Electronic systems,, networks, and data from malicious attacks is known as cybersecurity. By applying Cyber security Methods.
  • 3. Why it is needed? With so much good coming from technology it can be hard to believe that potential threats lurk behind every device and platform . A steady rise in cyber crime highlights the flaws in devices and services we’ve come to depend on. This concern focuses to ask what cyber security is why it’s essential and what to learn about it.
  • 4. Types of Cyber crime or threats (i) Malware (ii) Phishing (iii) Password attacks (iv) DDOS (Distributed denial of service) (v) Man in the middle (vi) Drive by downloads (vii) Mal-advertising (viii) Rogue Software
  • 6.
  • 7. (ii) Phishing Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person in an email or other form of communication. Attackers commonly use phishing emails to distribute malicious links or attatchments that can extract login credentials , account numbers and other personal information from victims.
  • 8. (ii)Password attacks Password attack is a type of cyberattack where hackers attempt to access a file folder account or computer secured with a password. password attacks in cyber security require special techniques and software. If a hacker is close to you they may try guessing your password using a combination of names hobbies essential years or numbers. If that doesn’t work they use specialised applications that scan through a list of words many people use as passwords. Surprisingly over 75% of the internet population set password consisting of the first 500 words only. With this in mind imagine how easy it is for malicious actors to gain access to your crucial information!
  • 9. (iv) DDoS(Distributed denial of service) It is a cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services with sites. It is a malicious attempt to disrupt the normal traffic of a targeted server service or network by overwhelming the target or its surrounding infrastructure with a flood of internet of traffic.
  • 10. (v) Man in the middle A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application-either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway. The goal of an attack is to steal personal information, such as login credentials, account details and credit card numbers.
  • 11. (vi) Drive by downloads A drive by download refers to the unintentional download of malicious code onto a computer or mobile device that exposes user to different types of threats. What sets this type of attack apart from others is that users need not click on anything to initiate the download Simply accessing or browsing a website can activate to initiate the download. The malicious code is designes to download malicious files onto the victim’s PC without the user being aware that anything untoward has happened.
  • 12. (vii) Mal-advertising Mal-advertising combines the words “malicious advertising” to describe “the practice of using advertisements to distribute malware. We’re accustomed to recognising it in pop-ups , or ads in the margins begging us to click, offering a surprise , and distracting us from otherwise enjoyable game of tetris.
  • 13. (Viii) Rogue Software Rogue security software is a form of malware that’s designed to trick victims into thinking their computer or device has been infected with a virus. Like legitimate antivirus products, it displays pop-up messages telling the victim that his or her computer or device has been infected with a virus.
  • 14. Goals of Cyber Security
  • 15. Who attacks and Who protects? BAD SUSPICIOUS GOOD
  • 16. Cyber Security Methods 1. Use Strong password (i) Use a combination of capital and lower-case letters ,numbers and symbols. (ii) making it between eight and twelve characters long. (iii) avoid the use of personal data. (iv) changing it regularly. (v) never use it in case of multiple accounts. (vi) using two-factor authentication.
  • 17. 2. Put up a firewall.
  • 18. 3. Control Access to data and systems.
  • 19. Don’t click on suspicious emails, websites and pop-ups. 4.
  • 20. 5. Use security software. Security software is designed to protect and secure servers, laptops, mobile devices, and networks from unauthorized access, intrusions, viruses, and other threats.Types of security software include anti-virus software, firewall software, network security software, Internet security software, malware/spamware removal and protection software, cryptographic software, and more.
  • 21. 6. Update programs and systems regularly.
  • 22. 7. Monitor For Intrusion.
  • 24. 9. Download softwares or any data from trusted and authorised sources only. In practice if a software is getting many honest good reviews it is probably safe.
  • 25. As a smart user specially we IT students ,
  • 26. Prepared and Presented By : Mradul Sonare Bachelor of computer applications (plain) SAM Global University, Bhopal (M.P.)