08448380779 Call Girls In Civil Lines Women Seeking Men
Cyber crime and security
1. If we can defeat them sitting at
home……who needs to fight with
tanks and guns!!!!
2. • Introduction.
The internet in India is growing rapidly. It has given rise to
new opportunities in every field we can think of be it
entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own
advantages and disadvantages .
3. CYBER SECURITY
Cybersecurity is the body of technologies, processes
and practices designed to protect networks, computers,
programs and data from attack, damage or unauthorized
access. In a computing context, the
term security implies cybersecurity
CYBER CRIME
Crime committed using a computer and the internet to
steal data or information.
Illegal imports.
Malicious programs.
4. • Hacking in simple terms means an illegal intrusion into a
computer system and/or network.
5. SQL INJECTION
• SQL injection is a code injection technique, used to
attack data-driven applications, in which
malicious SQL statements are inserted into an entry field
for execution (e.g. to dump the database contents to the
attacker).With tools like Havij .
6. PHISHING
• Phishing is the attempt to acquire sensitive information
such as usernames, passwords, and credit card details
(and sometimes, indirectly, money), often for malicious
reasons, by masquerading as a trustworthy entity in an
electronic communication
7. Cross-site scripting (XSS)
• Cross-site scripting (XSS) is a type of computer
security vulnerability typically found in web
applications. XSS enables attackers to inject client-side
script into web pages viewed by other users.
8. DEEP WEB
• the part of the World Wide Web that is not discoverable
by means of standard search engines, including
password-protected or dynamic pages and encrypted
networks.
• “The biggest weakness of the Deep Web is also its
greatest strength: it's really hard to find anything"
9. • RAT’S(REMOTE ACCES TROJAN)
A remote access Trojan (RAT) is a malware program that
includes a back door for administrative control over the
target computer. RATs are usually downloaded invisibly
with a user-requested program -- such as a game -- or sent
as an email attachment. Once the host system is
compromised, the intruder may use it to distribute RATs to
other vulnerable computers and establish a botnet.
10. • The Tor software protects you by bouncing your
communications around a distributed network of relays
run by volunteers all around the world: it prevents
somebody watching your Internet connection from
learning what sites you visit, it prevents the sites you visit
from learning your physical location, and it lets you
access sites which are blocked.
12. 3)ANTIVIRUS
• designed to detect and destroy computer viruses
FUNCTIONS
• Virus Detection
• System Analysis
• Malware Removal
• File Quarantine
• Threat Identification
• Online Security
• Data Protection
•
13. • I thank all of you for co-operating with me and for this
lovely opportunity to express my research and knowledge
regarding the topic “CYBER CRIME AND
SECURITY”
• I hope that I have enriched you all with at least some of
the facts and ideas that you haven't known on this topic