SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Mohammad Hussain
B.Tech CSE, 2nd year
Roll-150101116
SHARDA UNIVERSITY
$$ Ever since men began to modify their lives by
using technology they have found themselves in a
series of technological traps $$
 INTRODUCTION
 HISTORY OF CYBER CRIME
 CATEGORIES OF CYBER CRIME
 TYPES OF CYBER CRIME
 ADVANTAGES OF CYBER SECURITY
 PREVENTION TO CYBER CRIME
 CYBER LAW OF INDIA
 CONCLUSION
Cyber crimes are criminal offenses committed via
the internet or otherwise aided by various forms
of computer technology such as the use of online
social network to bully others or sending sexually
explicit digital photos with a smart phone.
Cybercrime first started with hackers trying to
break into computer networks. Some did it just
for the thrill of accessing high-level security
networks, but others sought to gain sensitive,
classified material. Eventually, criminals started
to infect computer systems with computer
viruses which led to breakdowns on personal and
business computers.
 The first recorded cyber crime took place in
1820.
The first spam email took place in 1976 when it was
sent out over the ARPANT.
 The first virus was instilled on an Apple computer
in 1982 when a high school student, Rich Skrenta,
developed the EIK Cloner.
1.The computer as a target:- Using a computer to
attacks other computer. Example- Hacking, virus
attacks.
2.The computer as a weapon:- Using a computer
to commit real world crime. Example- Cyber
terrorism, pornography.
 HACKING: Hacking is simple terms means an
illegal intrusion into a computer system and
network. It is also known as cracking.
 DENIAL OF SERVICE ATTACK: This is an act by
the criminals who floods the bandwith of the
victims network or fills his E-mail box with spam
mail depriving him of the service he is entitled to
access or provide.
 CHILD PORNOGRAPHY: The internet is being
highly used by its abusers to reach and abuse
children sexually, worldwide. As more homes have
access to internet, more children would be using
the internet and more are the chances of falling
victim to the aggression of Pedophiles.
VIRUS DISSMINITION :Malicious software that
attaches itself to other software. VIRUS,
WORMS,TROJAN HORSE.
 COMPUTER VANDALISM: Damaging or
destroying data rather than stealing or misusing
them is called cyber vandalism. These are program
that attach themselves to a file and them circulate.
 CYBER TERRORISM: Terrorist attacks on the
interest is by disturbed denial of service attacks,hate
websites and hate E-mails, attacks on service
network etc.
SOFTWARE PIRACY: Theft of software through the
illegal copying or genuine programs or the
counterfeiting and disturbed of products intended to
pass for the original.
CYBER SECURITY: Cyber Security involves
protection of sensitive personal and business
information through prevention, detection and
response to different online attacks, Cyber
security actually preventing the attacks, cyber
security.
PRIVACY POLICY: Before submitting your name,
e-mail, address, on a website look for the sites
privacy policy.
KEEP SOFTWARE UP TO DATE: If the seller
reduces patches for the software operating system
your device, instill them as soon as possible.
 The cyber security will defend us from critical
attacks.
 It helps us to browse the site, website.
 Internet security process all the incoming and
outgoing data on your computer.
 It will defend us from hacks and virus.
 Application of cyber security used in our PC
needs update every week.
 Use antivirus software’s.
 Insert firewalls.
 Unstill unnecessary software.
 Maintain backup.
 Check security setting.
 Stay anonymous choose a genderless screen
name.
 Never give your full name or address to
strangers.
 Learn more about internet privacy.
Cyber Crime can involve criminal activities that
are traditional in nature, such as theft, fraud,
deformation and mischief, all of which are
subjected to the India Penal Code. In simple way
we can say that Cyber Crime is unlawful acts
where in the computer is either a tool or both.
The abuse of computer has also given birth of new
age Crime that are addresses by the Information
Technology Act, 2000.
Cybercrime is indeed getting the recognition it
deserves. However, it is not going to restricted
that easily. Infact, it is highly likely that Cyber
Crime and its hackers will continue developing
and upgrading to stay ahead of the law.
So, to make and us a safer we must need Cyber
Security.
Cyber crime and Security

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 

Ähnlich wie Cyber crime and Security

Ähnlich wie Cyber crime and Security (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security
 

Kürzlich hochgeladen

Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 

Kürzlich hochgeladen (20)

Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 

Cyber crime and Security

  • 1. Mohammad Hussain B.Tech CSE, 2nd year Roll-150101116 SHARDA UNIVERSITY $$ Ever since men began to modify their lives by using technology they have found themselves in a series of technological traps $$
  • 2.  INTRODUCTION  HISTORY OF CYBER CRIME  CATEGORIES OF CYBER CRIME  TYPES OF CYBER CRIME  ADVANTAGES OF CYBER SECURITY  PREVENTION TO CYBER CRIME  CYBER LAW OF INDIA  CONCLUSION
  • 3. Cyber crimes are criminal offenses committed via the internet or otherwise aided by various forms of computer technology such as the use of online social network to bully others or sending sexually explicit digital photos with a smart phone.
  • 4. Cybercrime first started with hackers trying to break into computer networks. Some did it just for the thrill of accessing high-level security networks, but others sought to gain sensitive, classified material. Eventually, criminals started to infect computer systems with computer viruses which led to breakdowns on personal and business computers.  The first recorded cyber crime took place in 1820.
  • 5. The first spam email took place in 1976 when it was sent out over the ARPANT.  The first virus was instilled on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the EIK Cloner.
  • 6. 1.The computer as a target:- Using a computer to attacks other computer. Example- Hacking, virus attacks. 2.The computer as a weapon:- Using a computer to commit real world crime. Example- Cyber terrorism, pornography.
  • 7.  HACKING: Hacking is simple terms means an illegal intrusion into a computer system and network. It is also known as cracking.  DENIAL OF SERVICE ATTACK: This is an act by the criminals who floods the bandwith of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide.  CHILD PORNOGRAPHY: The internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of Pedophiles.
  • 8. VIRUS DISSMINITION :Malicious software that attaches itself to other software. VIRUS, WORMS,TROJAN HORSE.  COMPUTER VANDALISM: Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and them circulate.  CYBER TERRORISM: Terrorist attacks on the interest is by disturbed denial of service attacks,hate websites and hate E-mails, attacks on service network etc. SOFTWARE PIRACY: Theft of software through the illegal copying or genuine programs or the counterfeiting and disturbed of products intended to pass for the original.
  • 9. CYBER SECURITY: Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks, Cyber security actually preventing the attacks, cyber security. PRIVACY POLICY: Before submitting your name, e-mail, address, on a website look for the sites privacy policy. KEEP SOFTWARE UP TO DATE: If the seller reduces patches for the software operating system your device, instill them as soon as possible.
  • 10.  The cyber security will defend us from critical attacks.  It helps us to browse the site, website.  Internet security process all the incoming and outgoing data on your computer.  It will defend us from hacks and virus.  Application of cyber security used in our PC needs update every week.
  • 11.  Use antivirus software’s.  Insert firewalls.  Unstill unnecessary software.  Maintain backup.  Check security setting.  Stay anonymous choose a genderless screen name.  Never give your full name or address to strangers.  Learn more about internet privacy.
  • 12. Cyber Crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal Code. In simple way we can say that Cyber Crime is unlawful acts where in the computer is either a tool or both. The abuse of computer has also given birth of new age Crime that are addresses by the Information Technology Act, 2000.
  • 13. Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily. Infact, it is highly likely that Cyber Crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make and us a safer we must need Cyber Security.