SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Seminar Presentation
               on
    Cyber Crime And Security
               By
   Shishupal Nagar 8CSB-1(95)




DEPARTMENT OF COMPUTER SCIENCE &ENGINEERING
    Jaipur Engineering College & Research Centre
            Sitapura , Tonk , Road Jaipur
What is Cyber Crime?
Reasons for Cyber Crime
Cyber Criminals
Classification
Types of Cyber Crime
Safety tips for Cyber crime
Cyber Security
Advantage of Security
Conclusions
References
Cybercrime is nothing but where the computer used as an
 object or subject of crime.
Crime committed using a computer and the internet to steal
 a person’s identity.
Illegal imports.
Malicious programs.
Capacity to store data in comparatively small space
Easy to access
Complex
Negligence
Loss of evidence
Those who are doing crimes by using the computer as an target or
object.

Children and adolescents between the age group of 6 – 18 years
Organised hackers
Professional hackers / crackers
Dissatisfied employees
When Computer Is used:-
As a Target: using a computer to attack other computers.

As a weapon: using a computer to commit real world crimes.
Hacking
Email bombing
Data diddling
Salami attacks
Email spoofing
Denial of Service attack
Virus / worm attacks
Logic bombs
Software piracy
Hacking in simple terms
  means an illegal instruction
  into a computer system
  and/or network. It is also
  known as CRACKING.

Government websites are the
  hot targets of the hackers
  due to the press coverage, it
  receives. Hackers enjoy the
  media coverage..
Sending huge volumes of e-mail
To an address or server in an attempt to overflow the mailbox
 or overwhelm the server
Zip Bombing
Methods of email bombing
     Mass Mailing

     Link Listing
Changing of data before or during entry into the
 computer system
Forging or counterfeiting documents used for data
 entry
Exchanging valid disks and tapes with modified
 replacements.
Prevention:
  Regular Audits
  Supervising employees
A series of minor attacks that together results in a larger
 attack
Used for financial crimes in which criminals steal money
 or resources a bit at a time from a system
Prevention:
   Find indications of an attack
   Random audits
   Don't ignore what appear to be errors in computer-
    based financial systems.
The sender address and other parts of the e-mail header are
 altered .
From, Return-Path and Reply-To fields
Although the e-mail appears to come from the address
 indicated in the From field it actually comes from another
 source.
Prevention
      Antivirus
      Use cryptographic signatures
This is an act by the cyber criminal to make any host network
  unavailable for the guests.

These attacks are mostly done by group of people.

This is an act by the criminal, who floods the bandwidth of the
  victims network or fills his e-mail box with spam mail depriving
  him of the services he is entitled to access or provide.
Viruses are programs that attach themselves to a computer or a
  file and then circulate themselves to other files and to other
  computers on a network.

They usually affect the data on a computer, either by altering
  or deleting it.

Programs that multiply like viruses but spread from computer
  to computer are called as worms.
If a piece of code intentionally inserted into a software system.


That will set off a malicious function when specified
  conditions are met.

Prevention:
   Monitoring system
   Application logs are the keys to identifying unwarranted
     activity
Theft of software through the illegal copying of genuine
 programs.
Distribution of products intended to pass for the original.
Use antivirus software’s
Insert firewalls
Uninstall unnecessary software
Maintain backup
Check security settings
Stay anonymous - choose a genderless
 screen name
Never give your full name or address
 to strangers
Avoiding use of Unauthorized software.
Avoid opening of unknown email.
Use internet filtering software.
Data Level Security (Using encrypting software's).
Don't respond to harassing or negative messages.
Get out of uncomfortable or hostile situations quickly.
Save offending messages.
Learn more about Internet privacy.
Internet security is a branch of computer security specifically
 related to the Internet.
It's objective is to establish rules and measure to use against
 attacks over the Internet.
The cyber security will defend us from critical attacks.
It helps us to browse the safe website.
Internet security process all the incoming and outgoing data on
 our computer.
Security will defend from hacks and viruses.
It is not possible to eliminate cyber crime from the cyber
  space.

It is quite possible to check them.

Awareness is the first step in protecting yourself.

So we must pay attention to all those issues and protect the
  World from Cyber Crime.

The IT Act is a historical step in the cyber world.
 http://www.computerhope.com/jargon/d

 http://www.slideshare.com/

 www.google.com/

 http://seminarsonly.com/

 http://1000projects.com/
Seminar on Cyber Crime and Security
Seminar on Cyber Crime and Security

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber security cyber security
cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber security
Cyber securityCyber security
Cyber security
 

Andere mochten auch

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Computer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account informationComputer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account informationChurch of the Epiphany
 
ATA 2009 Translation Tools Seminar
ATA 2009 Translation Tools SeminarATA 2009 Translation Tools Seminar
ATA 2009 Translation Tools SeminarDierk Seeburg
 
La serie de fourier y su aplicaciones
La serie de fourier y su aplicacionesLa serie de fourier y su aplicaciones
La serie de fourier y su aplicacionesdey30
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & SecurityShreeraj Nair
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Presentation to NCCA Computer Science Seminar. Dublin Castle, Ireland. 21st F...
Presentation to NCCA Computer Science Seminar. Dublin Castle, Ireland. 21st F...Presentation to NCCA Computer Science Seminar. Dublin Castle, Ireland. 21st F...
Presentation to NCCA Computer Science Seminar. Dublin Castle, Ireland. 21st F...Neil Keane
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Object Orinted Programing(OOP) concepts \
Object Orinted Programing(OOP) concepts \Object Orinted Programing(OOP) concepts \
Object Orinted Programing(OOP) concepts \Pritom Chaki
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And SecurityShaheda Afreen
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
Quality Function Deployment (QFD) Seminar Presentation
Quality Function Deployment (QFD) Seminar PresentationQuality Function Deployment (QFD) Seminar Presentation
Quality Function Deployment (QFD) Seminar PresentationOrange Slides
 
Basics of ups seminar presentation
Basics of ups   seminar presentationBasics of ups   seminar presentation
Basics of ups seminar presentationMurali Krishnan
 
Rapid Prototyping and its Applications
Rapid Prototyping and its ApplicationsRapid Prototyping and its Applications
Rapid Prototyping and its Applicationsmalikusman
 

Andere mochten auch (20)

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Usol seminar presentation
Usol seminar presentationUsol seminar presentation
Usol seminar presentation
 
Computer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account informationComputer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account information
 
ATA 2009 Translation Tools Seminar
ATA 2009 Translation Tools SeminarATA 2009 Translation Tools Seminar
ATA 2009 Translation Tools Seminar
 
La serie de fourier y su aplicaciones
La serie de fourier y su aplicacionesLa serie de fourier y su aplicaciones
La serie de fourier y su aplicaciones
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Presentation to NCCA Computer Science Seminar. Dublin Castle, Ireland. 21st F...
Presentation to NCCA Computer Science Seminar. Dublin Castle, Ireland. 21st F...Presentation to NCCA Computer Science Seminar. Dublin Castle, Ireland. 21st F...
Presentation to NCCA Computer Science Seminar. Dublin Castle, Ireland. 21st F...
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Object Orinted Programing(OOP) concepts \
Object Orinted Programing(OOP) concepts \Object Orinted Programing(OOP) concepts \
Object Orinted Programing(OOP) concepts \
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And Security
 
Seminar presentation on 5G
Seminar presentation on 5GSeminar presentation on 5G
Seminar presentation on 5G
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Quality Function Deployment (QFD) Seminar Presentation
Quality Function Deployment (QFD) Seminar PresentationQuality Function Deployment (QFD) Seminar Presentation
Quality Function Deployment (QFD) Seminar Presentation
 
Basics of ups seminar presentation
Basics of ups   seminar presentationBasics of ups   seminar presentation
Basics of ups seminar presentation
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
 
Rapid Prototyping and its Applications
Rapid Prototyping and its ApplicationsRapid Prototyping and its Applications
Rapid Prototyping and its Applications
 

Ähnlich wie Seminar on Cyber Crime and Security

Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityPatty Ramsey
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security Sanguine_Eva
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptxKarthikShivanand
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security BasitShah18
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfssusera0b94b
 
Cyber security
Cyber securityCyber security
Cyber securityRIPPER95
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfjainutkarsh078
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 

Ähnlich wie Seminar on Cyber Crime and Security (20)

Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
Computer security
Computer securityComputer security
Computer security
 
Computer security and
Computer security andComputer security and
Computer security and
 
Cyber security
Cyber securityCyber security
Cyber security
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 

Kürzlich hochgeladen

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Kürzlich hochgeladen (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Seminar on Cyber Crime and Security

  • 1. Seminar Presentation on Cyber Crime And Security By Shishupal Nagar 8CSB-1(95) DEPARTMENT OF COMPUTER SCIENCE &ENGINEERING Jaipur Engineering College & Research Centre Sitapura , Tonk , Road Jaipur
  • 2. What is Cyber Crime? Reasons for Cyber Crime Cyber Criminals Classification Types of Cyber Crime Safety tips for Cyber crime Cyber Security Advantage of Security Conclusions References
  • 3. Cybercrime is nothing but where the computer used as an object or subject of crime. Crime committed using a computer and the internet to steal a person’s identity. Illegal imports. Malicious programs.
  • 4. Capacity to store data in comparatively small space Easy to access Complex Negligence Loss of evidence
  • 5. Those who are doing crimes by using the computer as an target or object. Children and adolescents between the age group of 6 – 18 years Organised hackers Professional hackers / crackers Dissatisfied employees
  • 6. When Computer Is used:- As a Target: using a computer to attack other computers. As a weapon: using a computer to commit real world crimes.
  • 7. Hacking Email bombing Data diddling Salami attacks Email spoofing Denial of Service attack Virus / worm attacks Logic bombs Software piracy
  • 8. Hacking in simple terms means an illegal instruction into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage..
  • 9. Sending huge volumes of e-mail To an address or server in an attempt to overflow the mailbox or overwhelm the server Zip Bombing Methods of email bombing  Mass Mailing  Link Listing
  • 10. Changing of data before or during entry into the computer system Forging or counterfeiting documents used for data entry Exchanging valid disks and tapes with modified replacements. Prevention: Regular Audits Supervising employees
  • 11. A series of minor attacks that together results in a larger attack Used for financial crimes in which criminals steal money or resources a bit at a time from a system Prevention:  Find indications of an attack  Random audits  Don't ignore what appear to be errors in computer- based financial systems.
  • 12. The sender address and other parts of the e-mail header are altered . From, Return-Path and Reply-To fields Although the e-mail appears to come from the address indicated in the From field it actually comes from another source. Prevention  Antivirus  Use cryptographic signatures
  • 13.
  • 14. This is an act by the cyber criminal to make any host network unavailable for the guests. These attacks are mostly done by group of people. This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.
  • 15. Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Programs that multiply like viruses but spread from computer to computer are called as worms.
  • 16. If a piece of code intentionally inserted into a software system. That will set off a malicious function when specified conditions are met. Prevention: Monitoring system Application logs are the keys to identifying unwarranted activity
  • 17. Theft of software through the illegal copying of genuine programs. Distribution of products intended to pass for the original.
  • 18. Use antivirus software’s Insert firewalls Uninstall unnecessary software Maintain backup Check security settings Stay anonymous - choose a genderless screen name Never give your full name or address to strangers
  • 19. Avoiding use of Unauthorized software. Avoid opening of unknown email. Use internet filtering software. Data Level Security (Using encrypting software's). Don't respond to harassing or negative messages. Get out of uncomfortable or hostile situations quickly. Save offending messages. Learn more about Internet privacy.
  • 20.
  • 21. Internet security is a branch of computer security specifically related to the Internet. It's objective is to establish rules and measure to use against attacks over the Internet.
  • 22. The cyber security will defend us from critical attacks. It helps us to browse the safe website. Internet security process all the incoming and outgoing data on our computer. Security will defend from hacks and viruses.
  • 23. It is not possible to eliminate cyber crime from the cyber space. It is quite possible to check them. Awareness is the first step in protecting yourself. So we must pay attention to all those issues and protect the World from Cyber Crime. The IT Act is a historical step in the cyber world.
  • 24.  http://www.computerhope.com/jargon/d  http://www.slideshare.com/  www.google.com/  http://seminarsonly.com/  http://1000projects.com/