This document provides an outline on cyber crimes and cyber security. It begins with an introduction on the growth of the internet and the rise of cyber crimes. It then defines cyber crime as unlawful acts using computers as tools or targets. The document categorizes cyber crimes as those using computers as weapons or targets, and lists common types like hacking, viruses, and identity theft. It discusses the history of cyber crimes and reasons they occur like ease of access online and complex networks. The document also defines cyber security, provides advantages like protection from attacks, and offers tips for prevention such as using antivirus software and firewalls. It concludes that cyber security is an ongoing battle and everyone must play a role to be responsible online.
Standard vs Custom Battery Packs - Decoding the Power Play
Cyber crime and security
1. Shuaib Ibrahim Adam
ME. Telecommunication Engineering
Nanjing University of Posts & Telecommunications
2. Out Line
• Introduction
• Definition
• History
• Categories of Cyber crime
• Types of Cyber Crime
• Reason for Cyber crime
• Security of Cyber
• Advantages of Cyber Security
• Prevention tips for cyber security
• Conclusion
3. TO Understand
What is the
CYBER
CRIMES
Why we need cyber
security
What are the security
problems in Cyber
field
How to implement
and maintain
Security of a
Cyber field around
us.
4. introduction
The internet is growing rapidly. It has given rise to new
opportunities in every field we can think of be it
entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own
disadvantages is Cyber crime- illegal activity committed on
the internet.
Cyber crime is an activity done using computers and
internet. We can say that it is an unlawful acts wherein the
computer either a tool or target or both.
5. definition of cyber crime
• Cybercrime is nothing but where the computer used as an
object or subject of crime!
• Crime committed using a computer and the internet to steal
a person’s identity!!
• Illegal imports
• Malicious programs
6. History of cyber crime
• The first recorded cyber crime took place in 1920.
• India, Japan and China, the era of modern computer,
however, began with the analytical engine of Charles
Babbage.
• The first spam email took place in 1976 when it was sent
out over the ARPANT.
• The first virus was installed on an Apple computer in 1982
when a high school student, Rich skrenta, developed the
EIK Cloner.
7. Categorization of cyber crime
The Computer as a Target:-using a computer to attack
other computers. E.g. Hacking, Virus/Worm attacks, DOS
attack etc.
The computer as a weapon:-using a computer to commit
real world crimes. E.g. Cyber Terrorism, IPR violations,
Credit card frauds, EFT frauds, Pornography etc. Cyber
Crime regulated by Cyber Laws or Internet Laws.
8. types of cyber crime
The Hacking
Denial of service attack
Virus Dissemination
Computer Vandalism
Cyber Terrorism
Software Piracy
10. Reason for cyber crime
1. Easy to Access: - The problem encountered in guarding a computer
system from unauthorized access is that there is every possibility of
breach not due to human error but due to the complex technology.
2. Complex: - The computers work on operating systems and these
operating systems in turn are composed of millions of codes. Human
mind is fallible and it is not possible that there might not be a lapse at
any stage.
3. Negligence: - Negligence is very closely connected with human
conduct. It is therefore very probable that while protecting the
computer system there might be any negligence, which in turn
provides a cyber-criminal to gain access and control over the computer
system.
4. Loss of Evidence: - Loss of evidence is a very common & obvious
problem as all the data are routinely destroyed.
12. What is cyber security
Cyber security is a branch of computer security
specifically related to the internet.
It’s objectives is to establish rules and measure to use
against attacks over the internet.
13. Advantages of Cyber security
The cyber security will defend us from critical attacks.
It helps us to browse the site, website.
Internet Security process all the incoming and outgoing
data on your computer.
It will defend us from hacks and virus.
Application of cyber security used in our PC needs update
every week
14. Cybercrime prevention
• Cybercrime prevention can be straight-forward - when
armed with a little technical advice and common sense,
many attacks can be avoided.
• In general, online criminals are trying to make their money
as quickly and easily as possible. The more difficult you
make their job, the more likely they are to leave you alone
and move on to an easier target.
15. Safety tips for cyber crime
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a genderless screen name.
• Never give your full name or address to strangers.
• Learn more about Internet privacy.
• Make Sure your Computer is configured securely
• Choose Strong Passwords and Keep them Safe.
16. Conclusion
The Computer Security is a continuous battle
◦ As computer security gets tighter hackers are
getting smarter!!!
◦ Computer and information security continue to
grow in importance
◦ Nobody ever said this was going to be easy!
◦ Neglecting security is the worst thing you can
do!!