SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Shuaib Ibrahim Adam
ME. Telecommunication Engineering
Nanjing University of Posts & Telecommunications
Out Line
• Introduction
• Definition
• History
• Categories of Cyber crime
• Types of Cyber Crime
• Reason for Cyber crime
• Security of Cyber
• Advantages of Cyber Security
• Prevention tips for cyber security
• Conclusion
TO Understand
What is the
CYBER
CRIMES
Why we need cyber
security
What are the security
problems in Cyber
field
How to implement
and maintain
Security of a
Cyber field around
us.
introduction
The internet is growing rapidly. It has given rise to new
opportunities in every field we can think of be it
entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own
disadvantages is Cyber crime- illegal activity committed on
the internet.
Cyber crime is an activity done using computers and
internet. We can say that it is an unlawful acts wherein the
computer either a tool or target or both.
definition of cyber crime
• Cybercrime is nothing but where the computer used as an
object or subject of crime!
• Crime committed using a computer and the internet to steal
a person’s identity!!
• Illegal imports
• Malicious programs
History of cyber crime
• The first recorded cyber crime took place in 1920.
• India, Japan and China, the era of modern computer,
however, began with the analytical engine of Charles
Babbage.
• The first spam email took place in 1976 when it was sent
out over the ARPANT.
• The first virus was installed on an Apple computer in 1982
when a high school student, Rich skrenta, developed the
EIK Cloner.
Categorization of cyber crime
 The Computer as a Target:-using a computer to attack
other computers. E.g. Hacking, Virus/Worm attacks, DOS
attack etc.
The computer as a weapon:-using a computer to commit
real world crimes. E.g. Cyber Terrorism, IPR violations,
Credit card frauds, EFT frauds, Pornography etc. Cyber
Crime regulated by Cyber Laws or Internet Laws.
types of cyber crime
 The Hacking
 Denial of service attack
 Virus Dissemination
 Computer Vandalism
 Cyber Terrorism
 Software Piracy
types of cyber crime
Web
Jacking
Reason for cyber crime
1. Easy to Access: - The problem encountered in guarding a computer
system from unauthorized access is that there is every possibility of
breach not due to human error but due to the complex technology.
2. Complex: - The computers work on operating systems and these
operating systems in turn are composed of millions of codes. Human
mind is fallible and it is not possible that there might not be a lapse at
any stage.
3. Negligence: - Negligence is very closely connected with human
conduct. It is therefore very probable that while protecting the
computer system there might be any negligence, which in turn
provides a cyber-criminal to gain access and control over the computer
system.
4. Loss of Evidence: - Loss of evidence is a very common & obvious
problem as all the data are routinely destroyed.
security
What is cyber security
Cyber security is a branch of computer security
specifically related to the internet.
It’s objectives is to establish rules and measure to use
against attacks over the internet.
Advantages of Cyber security
The cyber security will defend us from critical attacks.
 It helps us to browse the site, website.
Internet Security process all the incoming and outgoing
data on your computer.
It will defend us from hacks and virus.
Application of cyber security used in our PC needs update
every week
Cybercrime prevention
• Cybercrime prevention can be straight-forward - when
armed with a little technical advice and common sense,
many attacks can be avoided.
• In general, online criminals are trying to make their money
as quickly and easily as possible. The more difficult you
make their job, the more likely they are to leave you alone
and move on to an easier target.
Safety tips for cyber crime
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a genderless screen name.
• Never give your full name or address to strangers.
• Learn more about Internet privacy.
• Make Sure your Computer is configured securely
• Choose Strong Passwords and Keep them Safe.
Conclusion
 The Computer Security is a continuous battle
◦ As computer security gets tighter hackers are
getting smarter!!!
◦ Computer and information security continue to
grow in importance
◦ Nobody ever said this was going to be easy!
◦ Neglecting security is the worst thing you can
do!!
Cyber security is everyone’s responsibility
Cyber crime and security
Cyber crime and security

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

Was ist angesagt? (20)

Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Andere mochten auch

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
Ajay Singh
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
Adam Heller
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
Fahad Abbasi
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
Robin Rafique
 

Andere mochten auch (20)

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Sweta kumari
Sweta kumariSweta kumari
Sweta kumari
 
Internet, Database, Cyber Crime
Internet, Database,  Cyber CrimeInternet, Database,  Cyber Crime
Internet, Database, Cyber Crime
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04
 
Developing An Effective e-Learning Platform From Ready-Made Script
Developing An Effective e-Learning Platform From Ready-Made ScriptDeveloping An Effective e-Learning Platform From Ready-Made Script
Developing An Effective e-Learning Platform From Ready-Made Script
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
MIS Presentation about SalesForce.com
MIS Presentation about SalesForce.comMIS Presentation about SalesForce.com
MIS Presentation about SalesForce.com
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 

Ähnlich wie Cyber crime and security

Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
Arshad Khan
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
Alisha Korpal
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 

Ähnlich wie Cyber crime and security (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
CYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptxCYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security (1)
Cyber crime and security (1)Cyber crime and security (1)
Cyber crime and security (1)
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
E secuity
E secuityE secuity
E secuity
 

Kürzlich hochgeladen

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Kürzlich hochgeladen (20)

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 

Cyber crime and security

  • 1. Shuaib Ibrahim Adam ME. Telecommunication Engineering Nanjing University of Posts & Telecommunications
  • 2. Out Line • Introduction • Definition • History • Categories of Cyber crime • Types of Cyber Crime • Reason for Cyber crime • Security of Cyber • Advantages of Cyber Security • Prevention tips for cyber security • Conclusion
  • 3. TO Understand What is the CYBER CRIMES Why we need cyber security What are the security problems in Cyber field How to implement and maintain Security of a Cyber field around us.
  • 4. introduction The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet. Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 5. definition of cyber crime • Cybercrime is nothing but where the computer used as an object or subject of crime! • Crime committed using a computer and the internet to steal a person’s identity!! • Illegal imports • Malicious programs
  • 6. History of cyber crime • The first recorded cyber crime took place in 1920. • India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. • The first spam email took place in 1976 when it was sent out over the ARPANT. • The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 7. Categorization of cyber crime  The Computer as a Target:-using a computer to attack other computers. E.g. Hacking, Virus/Worm attacks, DOS attack etc. The computer as a weapon:-using a computer to commit real world crimes. E.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc. Cyber Crime regulated by Cyber Laws or Internet Laws.
  • 8. types of cyber crime  The Hacking  Denial of service attack  Virus Dissemination  Computer Vandalism  Cyber Terrorism  Software Piracy
  • 9. types of cyber crime Web Jacking
  • 10. Reason for cyber crime 1. Easy to Access: - The problem encountered in guarding a computer system from unauthorized access is that there is every possibility of breach not due to human error but due to the complex technology. 2. Complex: - The computers work on operating systems and these operating systems in turn are composed of millions of codes. Human mind is fallible and it is not possible that there might not be a lapse at any stage. 3. Negligence: - Negligence is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber-criminal to gain access and control over the computer system. 4. Loss of Evidence: - Loss of evidence is a very common & obvious problem as all the data are routinely destroyed.
  • 12. What is cyber security Cyber security is a branch of computer security specifically related to the internet. It’s objectives is to establish rules and measure to use against attacks over the internet.
  • 13. Advantages of Cyber security The cyber security will defend us from critical attacks.  It helps us to browse the site, website. Internet Security process all the incoming and outgoing data on your computer. It will defend us from hacks and virus. Application of cyber security used in our PC needs update every week
  • 14. Cybercrime prevention • Cybercrime prevention can be straight-forward - when armed with a little technical advice and common sense, many attacks can be avoided. • In general, online criminals are trying to make their money as quickly and easily as possible. The more difficult you make their job, the more likely they are to leave you alone and move on to an easier target.
  • 15. Safety tips for cyber crime • Use antivirus software’s. • Insert firewalls. • Uninstall unnecessary software • Maintain backup. • Check security settings. • Stay anonymous - choose a genderless screen name. • Never give your full name or address to strangers. • Learn more about Internet privacy. • Make Sure your Computer is configured securely • Choose Strong Passwords and Keep them Safe.
  • 16. Conclusion  The Computer Security is a continuous battle ◦ As computer security gets tighter hackers are getting smarter!!! ◦ Computer and information security continue to grow in importance ◦ Nobody ever said this was going to be easy! ◦ Neglecting security is the worst thing you can do!!
  • 17. Cyber security is everyone’s responsibility