SlideShare ist ein Scribd-Unternehmen logo
1 von 53
SUBMITTED BY:-
VARUN
ME IST YR
ROLL NO -162220
 Definition.
 History.
 Categories of cyber crime.
 Types of cyber crime.
 IT Act.
 Safety tips.
 Cyber Security.
 Importance of Cyber security.
 Agencies involved in Cyber Security.
 Be vigilant and follow the tips.
 Cybercrime or Computer crime is crime that
involves a Computer and a Network .The
computer may have been used in the commission
of a crime, or it may be the target
 Crime committed using a computer and the
internet to steal data or information.
 Professor Debarati Halder and K. Jaishankar define
cybercrimes as: "Offences that are committed against
individuals or groups of individuals with a criminal
motive to intentionally harm the reputation of the victim
or cause physical or mental harm, or loss, to the victim
directly or indirectly, using modern telecommunication
networks
 The first recorded cyber crime was recorded in the year
1820.
 The person involved was JOSEPH-MARIE JACQUARD.
 He was a textile manufacture, he made looms.
 He invented looms that can store designs.
 Cyber crimes are broadly categorized into three
categories, namely crime against
 INDIVIDUAL (against people)
 PROPERTY (against properties)
 GOVERNMENT (against nation)
 INDIVIDUAL:-This type of cyber crime can be in
the form of cyber stalking, distributing
pornography, trafficking and “grooming”
 PROPERTY:-In this case, they can steal a person’s
bank details and siphon off money; misuse the
credit card to make numerous purchases online
 GOVERNMENT:-crimes against a government are
referred to as cyber terrorism. In this category,
criminals hack government websites, military
websites or circulate propaganda
Categories Of Cyber Crime
 When any crime is committed over the Internet it
is referred to as a cyber crime. There are many
types of cyber crimes:-
 Hacking
 Cyber Stalking
 cyber bullying
 Identity Theft
 Malicious Software
 Child soliciting and Abuse
 This is a type of crime wherein a person’s
computer is broken into so that his personal or
sensitive information can be accessed.
 The person engaged in hacking
activities is generally referred to
as a HACKER.
Hacker are the person who learn
About the computer system in details. they
write program referred to as hacks.
 Website Hacking
 Network Hacking
 Email Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking
 Website Hacking : Hacking a website means
taking control from the website owner to a
person who hacks the website.
 Network Hacking: is generally means gathering
information about domain by using tools like
Telnet, Ns look UP, Ping, Tracert, Netstat, etc
over the network.
 Email hacking:- is illicit access to an email
account or email correspondence
 Password Hacking:- Password cracking is the
process of recovering secret passwords from
data that has been stored in or transmitted by a
computer system.
 Online banking Hacking:- Unauthorized
accessing bank accounts without knowing the
password or without permission of account
holder is known as Online banking hacking.
 Computer Hacking:- is when files on your
computer are viewed, created, or edited without
your authorization.
Website Hacking Network Hacking
Email hacking
Password Hacking
Online banking
Computer Hacking
 This is a kind of online harassment wherein the
victim is subjected to a criticisms of online
messages and emails.
 Target victim through chat room, message boards
and emails.
 Examples of cyber stalking
Threatening or obscene e-mail
Make fake social network account
Sending unsolicited email.
Cyber bullying is defined as electronically
mediated behaviors among peers such as making
fun of ,telling lies ,spreading rumors, threats and
sharing private information or picture without
permission to do so.
 Example of cyber bullying
Posting hurtful message on social network .
Spreading rumour online or through texts.
Stealing identity of person.
 This has become a major problem with people
using the Internet for cash transactions and
banking services. In this cyber crime, a criminal
accesses data about a person’s bank account,
credit cards, Social Security, debit card and other
sensitive information to buy things online in the
victim’s name.
Malicious software, commonly known as
MALWARE, is any software that brings harm to
a computer system. Malware can be in the form
of worms, viruses, Trojans, spyware, adware
and root kits, etc. which steal protected data,
delete documents or add software not approved
by a user.
 Virus
 Worms
 Trojan horse
 Fast Facts: Attaches to an executable file,
requires human action to spread.
A computer virus attach itself to a program or a file
enabling it to spread from one computer to
another. Almost all viruses are attached to an
executable file, which means the virus may exist
on your computer but it actually cannot infect your
computer unless you run or open the malicious
program.
 Dormant phase:- The virus program is idle during
this stage. The virus program has managed to
access the target user's computer or software, but
during this stage, the virus does not take any
action.
 Propagation phase:-The virus starts propagating,
that is multiplying and self-replicating itself. The
virus places a copy of itself into other programs or
into certain system areas on the disk. The copy
may not be identical to the propagating version.
 Triggering phase:- A dormant virus moves into his
phase when it is activated, and will now perform the
function for which it was intended. The triggering phase
can be caused by a variety of system events, including a
count of the number of times that this copy of the virus
has made copies of itself.
 Execution phase:- This is the actual work of the virus,
where the "payload" will be released. It can be
destructive such as deleting files on disk, crashing the
system, or corrupting files or relatively harmless such as
popping up humorous or political messages on screen.
Boot Viruses
 Infect the boot block on a floppy or hard disk
File Viruses
 Infect .EXE or .COM files
Multi-partite Viruses
 Infect both boot blocks and executable files.
Polymorphic Viruses
 Is self-modifying, changes each time it infects a file or
disk.
 Fast Facts:- Can replicate itself on system, does not
require human action to spread
A worm is similar to a virus by design and is considered
to be a sub-class of a virus. Worms spread from
computer to computer, but unlike a virus, it has the
capability to travel without any human action.
The biggest danger with a worm is its capability to
replicate itself on your system, so rather than your
computer sending out a single worm, it could send out
hundreds or thousands of copies of itself, creating a
huge devastating effect
 Fast Facts:- Appears useful but damages system,
requires human action to run, do not self-replicate.
The Trojan Horse, at first glance will appear to be
useful software but will actually do damage once
installed or run on your computer. Trojan is
activated on your computer, the results can vary.
Some Trojans are designed to be more annoying
than malicious (like changing your desktop, adding
silly active desktop icons)
 Lots of popup messages.
 The home page in your browser has changed.
 Programs start with no reason or interaction
from the user.
 Files and folders disappear.
 The PC feels slower than usual.
 Install Anti-Virus/Malware Software.
 Keep Your Anti-Virus Software Up to Date.
 Run Regularly Scheduled Scans with Your Anti-
Virus Software.
 Keep Your Operating System Current.
 Secure Your Network.
 Keep Your Personal Information Safe.
 Don’t Use Open Wi-Fi.
 Use Multiple Strong Passwords.
 This is also a type of cyber crime wherein
criminals solicit minors via chat rooms for the
purpose of child pornography.
 Child pornography is one of fastest bussiness
going online.
 1 in 5 girls and 1 in 20 boys is victim of child
sexual abuse
 In order to prevent child abuse you should:
 Explian your children the safety rules of the internet.
 Keep your home computer out in the open.
 Set up an internet protection program on the computers
your children use.
 Tell your children not to
give out passwords,
even to a good friend.
 Spam is unsolicited or bulk electronic message used to
promote material that is often not wanted or applicable to
the recipient
 The content of spam can also immoral ,illegal and
offensive
 spam is often refered to as unsolicated bulk
mail(ubm),excessive multi posting (emp),unsolicated
commerical mail(uce),spam mail,,bulk mail or junk mail
 The first spam message
 3rd may 1978
 Gary thuerk salesman a marketer for the Digital
Equipment Corporation, blasted out his
message Using ARPANET sent to 593
accounts numerous times to restrictions of email
account
 It's usually sent by a "spammer," a company in
the business of distributing unsolicited email
 The cost of spam is far less than postal bulk
mailings.
 15 million email addresses can be purchased for
as little as $129
 Sometimes they may buy your address .
 They obtain them by using software programs
known as "harvesters" that pluck names from
websites, newsgroups
 Don’t give out email addresses to unreliable sources.
 Delete spam mail without read them.
Read carefully when filling out online forms requesting
your e-mail address, and exercise your choice.
 Use multiple e-mail addresses.
 Short e-mail addresses are easy to guess, and may
receive more spam.
• Use of internet based attacks in terrorists
activities against computers/networks with the
intension of causing harm.
• Cyber terrorism can also include attacks on
Internet business, but when this is done for
economic motivations rather than ideological.
 Software piracy is the unauthorized or illegal copying,
distribution, or use of software. It is such a profitable
“Business" that it has caught the attention of organized
crime groups in a number of countries.
o Use Anti-virus software.
o Insert Firewall.
o Uninstall unnecessary software.
o Maintain Backup.
o Check security settings.
o Stay Anonymous - choose a genderless screen
name.
o Never give your full name or address to
strangers.
o Learn more about Internet Privacy.
 Cyber security denotes the technologies and
procedures intended to safeguard computers,
networks, and data from unlawful admittance,
weaknesses, and attacks transported through the
Internet
 Cyber security standards are security standards
which enable organizations to practice safe
security techniques to minimize the number of
successful cyber security attacks.
 Governments, military, corporations, financial
institutions, hospitals and other businesses collect,
process and store a great deal of confidential
information on computers and transmit that data
across networks to other computers. With the
growing volume and sophistication of cyber
attacks, ongoing attention is required to protect
sensitive business and personal information, as
well as safeguard national security.
 ISO 27001 is the international Cybersecurity
Standard that delivers a model for creating,
applying, functioning, monitoring, reviewing,
preserving, and improving an Information Security
Management System.
 The Ministry of Communication and Information
Technology under the government of India
provides a strategy outline called the National
Cybersecurity Policy. The purpose of this
government body is to protect the public and
private infrastructure from cyber-attacks.
Mission:-
To safeguard information and information infrastructure in
cyberspace.
 To build capabilities to prevent and respond to cyber
threats.
 To reduce vulnerabilities and minimize damage from
cyber incidents through a combination of institutional
structures, people, processes, technology, and
cooperation
 Vision:- To build a secure and resilient cyberspace for
citizens, businesses, and Government.
 Protects system against viruses, worms,
spyware and other unwanted programs.
 Protection against data from theft.
 Protects the computer from being hacked.
 Protect it from criminal attack.
 Application of cyber security used in our
computer need to be update every week.
 National Cyber Security Awareness Month is
designed to engage and educate public and
private sector partners through events and
initiatives with the goal of raising awareness about
cyber security and increasing the resiliency of the
nation in the event of a cyber incident.
October 2014 marks the 11th Annual National
Cyber Security Awareness Month
 CERT-In(Computer Emergency Response Team India)
 NCIIPC(National Critical Information Infrastructure
Protection Center)
 CS&C(Office Of Cyber Security & Communication)
 NCCIC(National Cyber Security & Communication
Integration Center)
 NCCC(National Cyber Coordination Center)
 Be vigilant and follow the tips given below while you
participate in online activities:
 Filter the visibility of personal information in social sites.
 Do not keep the "remember password" button active for
any email address and passwords
 Make sure your online banking platform is secure.
 Keep a watchful eye while shopping online.
 Do not save passwords on mobile devices.
 Secure the login details for mobile devices and
computers, etc.
 To tackle the issue of cybercrimes, CIDs (Criminal
Investigation Departments) of various cities opened up
Cyber Crime Cells in different cities.
 Process--
 Step 1- For Cyber Crime Complaint First of all write an
application in the name head of cyber crime cell.
 Step 2- Provide the following things with the application-
 Name
 Address
 Email address
 Telephone no.
 Step 3- For required documents there are two cases.
 a) In case of vulgar emails, abusive email etc the following
details is required cyber crime compliant-
 The header of email which is offending you.
 The email address of offending sender.
 b) In case of Hacking the following details is required for
cyber crime complaint-
 Logs of the server.
 A hard copy and soft copy of the defected page.
 If the data of the defected site is compromised then you will
need a soft copy of original data as well as compromised
data.
 Control mechanism details of access in which you have to tell
who has access the computer.
 If you have any doubt or your feeling suspicious about
anyone then you have to provide the list of these suspicions.
 Step 4- You can file the complaint from any cyber cell of any
of the cities and also send direct email on below given email
of Cyber Cell Police Station.
 Technology is destructive only in the hands of
people who do not realize that they are one
And the same process as the universe.
Presentation on cyber security

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Ähnlich wie Presentation on cyber security

Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Anoop Mishra
 

Ähnlich wie Presentation on cyber security (20)

Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
 

Kürzlich hochgeladen

scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 

Kürzlich hochgeladen (20)

Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 

Presentation on cyber security

  • 1. SUBMITTED BY:- VARUN ME IST YR ROLL NO -162220
  • 2.
  • 3.  Definition.  History.  Categories of cyber crime.  Types of cyber crime.  IT Act.  Safety tips.  Cyber Security.  Importance of Cyber security.  Agencies involved in Cyber Security.  Be vigilant and follow the tips.
  • 4.  Cybercrime or Computer crime is crime that involves a Computer and a Network .The computer may have been used in the commission of a crime, or it may be the target  Crime committed using a computer and the internet to steal data or information.
  • 5.  Professor Debarati Halder and K. Jaishankar define cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks
  • 6.  The first recorded cyber crime was recorded in the year 1820.  The person involved was JOSEPH-MARIE JACQUARD.  He was a textile manufacture, he made looms.  He invented looms that can store designs.
  • 7.  Cyber crimes are broadly categorized into three categories, namely crime against  INDIVIDUAL (against people)  PROPERTY (against properties)  GOVERNMENT (against nation)
  • 8.
  • 9.  INDIVIDUAL:-This type of cyber crime can be in the form of cyber stalking, distributing pornography, trafficking and “grooming”  PROPERTY:-In this case, they can steal a person’s bank details and siphon off money; misuse the credit card to make numerous purchases online  GOVERNMENT:-crimes against a government are referred to as cyber terrorism. In this category, criminals hack government websites, military websites or circulate propaganda Categories Of Cyber Crime
  • 10.  When any crime is committed over the Internet it is referred to as a cyber crime. There are many types of cyber crimes:-  Hacking  Cyber Stalking  cyber bullying  Identity Theft  Malicious Software  Child soliciting and Abuse
  • 11.  This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed.  The person engaged in hacking activities is generally referred to as a HACKER. Hacker are the person who learn About the computer system in details. they write program referred to as hacks.
  • 12.  Website Hacking  Network Hacking  Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking
  • 13.  Website Hacking : Hacking a website means taking control from the website owner to a person who hacks the website.  Network Hacking: is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc over the network.
  • 14.  Email hacking:- is illicit access to an email account or email correspondence  Password Hacking:- Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 15.  Online banking Hacking:- Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.  Computer Hacking:- is when files on your computer are viewed, created, or edited without your authorization.
  • 16. Website Hacking Network Hacking Email hacking Password Hacking Online banking Computer Hacking
  • 17.  This is a kind of online harassment wherein the victim is subjected to a criticisms of online messages and emails.  Target victim through chat room, message boards and emails.  Examples of cyber stalking Threatening or obscene e-mail Make fake social network account Sending unsolicited email.
  • 18. Cyber bullying is defined as electronically mediated behaviors among peers such as making fun of ,telling lies ,spreading rumors, threats and sharing private information or picture without permission to do so.  Example of cyber bullying Posting hurtful message on social network . Spreading rumour online or through texts. Stealing identity of person.
  • 19.  This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to buy things online in the victim’s name.
  • 20. Malicious software, commonly known as MALWARE, is any software that brings harm to a computer system. Malware can be in the form of worms, viruses, Trojans, spyware, adware and root kits, etc. which steal protected data, delete documents or add software not approved by a user.
  • 21.  Virus  Worms  Trojan horse
  • 22.  Fast Facts: Attaches to an executable file, requires human action to spread. A computer virus attach itself to a program or a file enabling it to spread from one computer to another. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program.
  • 23.  Dormant phase:- The virus program is idle during this stage. The virus program has managed to access the target user's computer or software, but during this stage, the virus does not take any action.  Propagation phase:-The virus starts propagating, that is multiplying and self-replicating itself. The virus places a copy of itself into other programs or into certain system areas on the disk. The copy may not be identical to the propagating version.
  • 24.  Triggering phase:- A dormant virus moves into his phase when it is activated, and will now perform the function for which it was intended. The triggering phase can be caused by a variety of system events, including a count of the number of times that this copy of the virus has made copies of itself.  Execution phase:- This is the actual work of the virus, where the "payload" will be released. It can be destructive such as deleting files on disk, crashing the system, or corrupting files or relatively harmless such as popping up humorous or political messages on screen.
  • 25. Boot Viruses  Infect the boot block on a floppy or hard disk File Viruses  Infect .EXE or .COM files Multi-partite Viruses  Infect both boot blocks and executable files. Polymorphic Viruses  Is self-modifying, changes each time it infects a file or disk.
  • 26.  Fast Facts:- Can replicate itself on system, does not require human action to spread A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect
  • 27.  Fast Facts:- Appears useful but damages system, requires human action to run, do not self-replicate. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons)
  • 28.  Lots of popup messages.  The home page in your browser has changed.  Programs start with no reason or interaction from the user.  Files and folders disappear.  The PC feels slower than usual.
  • 29.  Install Anti-Virus/Malware Software.  Keep Your Anti-Virus Software Up to Date.  Run Regularly Scheduled Scans with Your Anti- Virus Software.  Keep Your Operating System Current.  Secure Your Network.  Keep Your Personal Information Safe.  Don’t Use Open Wi-Fi.  Use Multiple Strong Passwords.
  • 30.  This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography.  Child pornography is one of fastest bussiness going online.  1 in 5 girls and 1 in 20 boys is victim of child sexual abuse
  • 31.  In order to prevent child abuse you should:  Explian your children the safety rules of the internet.  Keep your home computer out in the open.  Set up an internet protection program on the computers your children use.  Tell your children not to give out passwords, even to a good friend.
  • 32.  Spam is unsolicited or bulk electronic message used to promote material that is often not wanted or applicable to the recipient  The content of spam can also immoral ,illegal and offensive  spam is often refered to as unsolicated bulk mail(ubm),excessive multi posting (emp),unsolicated commerical mail(uce),spam mail,,bulk mail or junk mail
  • 33.  The first spam message  3rd may 1978  Gary thuerk salesman a marketer for the Digital Equipment Corporation, blasted out his message Using ARPANET sent to 593 accounts numerous times to restrictions of email account
  • 34.  It's usually sent by a "spammer," a company in the business of distributing unsolicited email  The cost of spam is far less than postal bulk mailings.  15 million email addresses can be purchased for as little as $129
  • 35.  Sometimes they may buy your address .  They obtain them by using software programs known as "harvesters" that pluck names from websites, newsgroups
  • 36.  Don’t give out email addresses to unreliable sources.  Delete spam mail without read them. Read carefully when filling out online forms requesting your e-mail address, and exercise your choice.  Use multiple e-mail addresses.  Short e-mail addresses are easy to guess, and may receive more spam.
  • 37. • Use of internet based attacks in terrorists activities against computers/networks with the intension of causing harm. • Cyber terrorism can also include attacks on Internet business, but when this is done for economic motivations rather than ideological.
  • 38.  Software piracy is the unauthorized or illegal copying, distribution, or use of software. It is such a profitable “Business" that it has caught the attention of organized crime groups in a number of countries.
  • 39.
  • 40. o Use Anti-virus software. o Insert Firewall. o Uninstall unnecessary software. o Maintain Backup. o Check security settings. o Stay Anonymous - choose a genderless screen name. o Never give your full name or address to strangers. o Learn more about Internet Privacy.
  • 41.
  • 42.  Cyber security denotes the technologies and procedures intended to safeguard computers, networks, and data from unlawful admittance, weaknesses, and attacks transported through the Internet  Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks.
  • 43.  Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security.
  • 44.  ISO 27001 is the international Cybersecurity Standard that delivers a model for creating, applying, functioning, monitoring, reviewing, preserving, and improving an Information Security Management System.  The Ministry of Communication and Information Technology under the government of India provides a strategy outline called the National Cybersecurity Policy. The purpose of this government body is to protect the public and private infrastructure from cyber-attacks.
  • 45. Mission:- To safeguard information and information infrastructure in cyberspace.  To build capabilities to prevent and respond to cyber threats.  To reduce vulnerabilities and minimize damage from cyber incidents through a combination of institutional structures, people, processes, technology, and cooperation  Vision:- To build a secure and resilient cyberspace for citizens, businesses, and Government.
  • 46.  Protects system against viruses, worms, spyware and other unwanted programs.  Protection against data from theft.  Protects the computer from being hacked.  Protect it from criminal attack.  Application of cyber security used in our computer need to be update every week.
  • 47.  National Cyber Security Awareness Month is designed to engage and educate public and private sector partners through events and initiatives with the goal of raising awareness about cyber security and increasing the resiliency of the nation in the event of a cyber incident. October 2014 marks the 11th Annual National Cyber Security Awareness Month
  • 48.  CERT-In(Computer Emergency Response Team India)  NCIIPC(National Critical Information Infrastructure Protection Center)  CS&C(Office Of Cyber Security & Communication)  NCCIC(National Cyber Security & Communication Integration Center)  NCCC(National Cyber Coordination Center)
  • 49.  Be vigilant and follow the tips given below while you participate in online activities:  Filter the visibility of personal information in social sites.  Do not keep the "remember password" button active for any email address and passwords  Make sure your online banking platform is secure.  Keep a watchful eye while shopping online.  Do not save passwords on mobile devices.  Secure the login details for mobile devices and computers, etc.
  • 50.  To tackle the issue of cybercrimes, CIDs (Criminal Investigation Departments) of various cities opened up Cyber Crime Cells in different cities.  Process--  Step 1- For Cyber Crime Complaint First of all write an application in the name head of cyber crime cell.  Step 2- Provide the following things with the application-  Name  Address  Email address  Telephone no.  Step 3- For required documents there are two cases.  a) In case of vulgar emails, abusive email etc the following details is required cyber crime compliant-  The header of email which is offending you.  The email address of offending sender.
  • 51.  b) In case of Hacking the following details is required for cyber crime complaint-  Logs of the server.  A hard copy and soft copy of the defected page.  If the data of the defected site is compromised then you will need a soft copy of original data as well as compromised data.  Control mechanism details of access in which you have to tell who has access the computer.  If you have any doubt or your feeling suspicious about anyone then you have to provide the list of these suspicions.  Step 4- You can file the complaint from any cyber cell of any of the cities and also send direct email on below given email of Cyber Cell Police Station.
  • 52.  Technology is destructive only in the hands of people who do not realize that they are one And the same process as the universe.