SlideShare ist ein Scribd-Unternehmen logo
1 von 22
CYBER SECURITY AND THREATS
If we can defeat them sitting at
home……whoneeds to fight with tanks
and guns!!!!
Presented By
Himanshu Dangi
Aditi
Shivansh Jaiswal
(Red Rose School
Lambakheda Bhopal)
CONTENTS
 Introduction.
 Definition.
 History.
 Cyber threat evolution.
 Categories of cyber crime.
 Types of cyber crime.
 Prevention.
 Security.
 Conclusion.
INTRODUCTION
The internet in India is growing rapidly. It has given
rise to new opportunities in every field we can think of
be it entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s
own disadvantages is Cyber crime- illegal activity
committed on the internet.
DEFINING CYBER CRIME
 Crime committed using a computer and the
internet to steal data or information.
 Illegal imports.
 Malicious programs.
Cyber crime
is nothing but where
the computer used as an object
or subject of crime..
HISTORY
• The first recorded cyber crime took place
in the year 1820.
CYBER THREAT EVOLUTION
CATEGORIZATION OF CYBER CRIME
• The Computer as a Target
• The computer as a weapon
TYPES OF CYBER CRIME
• Hacking
• Denial of service attack
• Virus Dissemination
• Computer Vandalism
• Cyber Terrorism
• Software Piracy
HACKING
• Hacking in simple terms means an illegal
intrusion into a computer system and/or
network.
DENIAL OF SERVICE ATTACK
• Act by the criminal, who floods the
bandwidth of the victims network.
• Is his e-mail box with spam mail depriving
him of the services.
VIRUS DISSEMINATION
• Malicious software that attaches itself to
other software. (virus, worms, Trojan
Horse, web jacking, e-mail bombing etc.)
COMPUTER VANDALISM
• Damaging or destroying data rather than
stealing.
• Transmitting virus
CYBER TERRORISM
• Use of Internet based attacks in terrorist activities.
• Technology savvy terrorists are using 512-bit
encryption, which is impossible to decrypt.
SOFTWARE PIRACY
• Theft of software through the illegal copying of
genuine programs.
• Distribution of products intended to pass for the
original.
TYPES OF CYBER ATTACK BY PERCENTAGE
• Financial fraud:
• Sabotage of data/networks:
• Theft of proprietary information:
• System penetration from the outside:
• Denial of service:
• Unauthorized access by insiders:
• Employee abuse of internet privileges
• Viruses
11%
17%
20%
25%
27%
71%
79%
85%
SAFETY TIPS FOR CYBER CRIME
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a genderless screen
name.
• Never give your full name or address to strangers.
• Learn more about Internet privacy.
Security
CYBER SECURITY
• Internet security is a branch of computer security
specifically related to the Internet.
• It's objective is to establish rules and measure to
use against attacks over the Internet.
ADVANTAGES OF CYBER SECURITY
• Defend us from critical attacks.
• Browse the safe website.
• Internet security process all the incoming and
outgoing data on our computer.
CONCLUSION
Technology is destructive only in the hands of
people who do not realize that they are one
and the same process as the universe.
cybercrimeandsecurityppt-140210064917-phpapp02.pptx

Weitere ähnliche Inhalte

Was ist angesagt?

CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
Siddharth Anand
 
Cyber Threat Simulation Training
Cyber Threat Simulation TrainingCyber Threat Simulation Training
Cyber Threat Simulation Training
Bryan Len
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
Mehedi Hasan
 

Was ist angesagt? (15)

Nasilje na internetu
Nasilje na internetuNasilje na internetu
Nasilje na internetu
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Web Storage & Web Workers
Web Storage & Web WorkersWeb Storage & Web Workers
Web Storage & Web Workers
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Email Phishing Test Simulation, Educating the Users
Email Phishing Test Simulation, Educating the UsersEmail Phishing Test Simulation, Educating the Users
Email Phishing Test Simulation, Educating the Users
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber Threat Simulation Training
Cyber Threat Simulation TrainingCyber Threat Simulation Training
Cyber Threat Simulation Training
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 

Ähnlich wie cybercrimeandsecurityppt-140210064917-phpapp02.pptx

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
Arshad Khan
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
Alisha Korpal
 

Ähnlich wie cybercrimeandsecurityppt-140210064917-phpapp02.pptx (20)

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
cybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdfcybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdf
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
 
Cyber security
Cyber security        Cyber security
Cyber security
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Presentation(Cyber crime & security)
Presentation(Cyber crime & security)Presentation(Cyber crime & security)
Presentation(Cyber crime & security)
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

cybercrimeandsecurityppt-140210064917-phpapp02.pptx

  • 1. CYBER SECURITY AND THREATS If we can defeat them sitting at home……whoneeds to fight with tanks and guns!!!! Presented By Himanshu Dangi Aditi Shivansh Jaiswal (Red Rose School Lambakheda Bhopal)
  • 2. CONTENTS  Introduction.  Definition.  History.  Cyber threat evolution.  Categories of cyber crime.  Types of cyber crime.  Prevention.  Security.  Conclusion.
  • 3. INTRODUCTION The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet.
  • 4. DEFINING CYBER CRIME  Crime committed using a computer and the internet to steal data or information.  Illegal imports.  Malicious programs.
  • 5. Cyber crime is nothing but where the computer used as an object or subject of crime..
  • 6. HISTORY • The first recorded cyber crime took place in the year 1820.
  • 8. CATEGORIZATION OF CYBER CRIME • The Computer as a Target • The computer as a weapon
  • 9. TYPES OF CYBER CRIME • Hacking • Denial of service attack • Virus Dissemination • Computer Vandalism • Cyber Terrorism • Software Piracy
  • 10. HACKING • Hacking in simple terms means an illegal intrusion into a computer system and/or network.
  • 11. DENIAL OF SERVICE ATTACK • Act by the criminal, who floods the bandwidth of the victims network. • Is his e-mail box with spam mail depriving him of the services.
  • 12. VIRUS DISSEMINATION • Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)
  • 13. COMPUTER VANDALISM • Damaging or destroying data rather than stealing. • Transmitting virus
  • 14. CYBER TERRORISM • Use of Internet based attacks in terrorist activities. • Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 15. SOFTWARE PIRACY • Theft of software through the illegal copying of genuine programs. • Distribution of products intended to pass for the original.
  • 16. TYPES OF CYBER ATTACK BY PERCENTAGE • Financial fraud: • Sabotage of data/networks: • Theft of proprietary information: • System penetration from the outside: • Denial of service: • Unauthorized access by insiders: • Employee abuse of internet privileges • Viruses 11% 17% 20% 25% 27% 71% 79% 85%
  • 17. SAFETY TIPS FOR CYBER CRIME • Use antivirus software’s. • Insert firewalls. • Uninstall unnecessary software • Maintain backup. • Check security settings. • Stay anonymous - choose a genderless screen name. • Never give your full name or address to strangers. • Learn more about Internet privacy.
  • 19. CYBER SECURITY • Internet security is a branch of computer security specifically related to the Internet. • It's objective is to establish rules and measure to use against attacks over the Internet.
  • 20. ADVANTAGES OF CYBER SECURITY • Defend us from critical attacks. • Browse the safe website. • Internet security process all the incoming and outgoing data on our computer.
  • 21. CONCLUSION Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.