SlideShare ist ein Scribd-Unternehmen logo
1 von 14
If we can defeat them sitting at
home……who needs to fight with
tanks and guns!!!!
• Introduction.
The internet in India is growing rapidly. It has given rise to
new opportunities in every field we can think of be it
entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own
advantages and disadvantages .
CYBER SECURITY
 Cybersecurity is the body of technologies, processes
and practices designed to protect networks, computers,
programs and data from attack, damage or unauthorized
access. In a computing context, the
term security implies cybersecurity
CYBER CRIME
 Crime committed using a computer and the internet to
steal data or information.
 Illegal imports.
 Malicious programs.
• Hacking in simple terms means an illegal intrusion into a
computer system and/or network.
SQL INJECTION
• SQL injection is a code injection technique, used to
attack data-driven applications, in which
malicious SQL statements are inserted into an entry field
for execution (e.g. to dump the database contents to the
attacker).With tools like Havij .
PHISHING
• Phishing is the attempt to acquire sensitive information
such as usernames, passwords, and credit card details
(and sometimes, indirectly, money), often for malicious
reasons, by masquerading as a trustworthy entity in an
electronic communication
Cross-site scripting (XSS)
• Cross-site scripting (XSS) is a type of computer
security vulnerability typically found in web
applications. XSS enables attackers to inject client-side
script into web pages viewed by other users.
DEEP WEB
• the part of the World Wide Web that is not discoverable
by means of standard search engines, including
password-protected or dynamic pages and encrypted
networks.
• “The biggest weakness of the Deep Web is also its
greatest strength: it's really hard to find anything"
• RAT’S(REMOTE ACCES TROJAN)
A remote access Trojan (RAT) is a malware program that
includes a back door for administrative control over the
target computer. RATs are usually downloaded invisibly
with a user-requested program -- such as a game -- or sent
as an email attachment. Once the host system is
compromised, the intruder may use it to distribute RATs to
other vulnerable computers and establish a botnet.
• The Tor software protects you by bouncing your
communications around a distributed network of relays
run by volunteers all around the world: it prevents
somebody watching your Internet connection from
learning what sites you visit, it prevents the sites you visit
from learning your physical location, and it lets you
access sites which are blocked.
2)FIREWALL
• Protect (a network or system) from unauthorized access.
3)ANTIVIRUS
• designed to detect and destroy computer viruses
FUNCTIONS
• Virus Detection
• System Analysis
• Malware Removal
• File Quarantine
• Threat Identification
• Online Security
• Data Protection
•
• I thank all of you for co-operating with me and for this
lovely opportunity to express my research and knowledge
regarding the topic “CYBER CRIME AND
SECURITY”
• I hope that I have enriched you all with at least some of
the facts and ideas that you haven't known on this topic
PAPER PRESENTED
BY,
SUBRAMANIAN.VE
aka(THALAIVAR
SUBU)

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: Hacking
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 

Andere mochten auch

Fer hipòtesis
Fer hipòtesisFer hipòtesis
Fer hipòtesiscarlesmb
 
Corporation Culture of International search-engine companies
Corporation Culture of International search-engine companiesCorporation Culture of International search-engine companies
Corporation Culture of International search-engine companiesRuhull
 
2. carlos martinez serrano
2. carlos martinez serrano2. carlos martinez serrano
2. carlos martinez serranooidp
 
Mahabbah atau hub
Mahabbah atau hubMahabbah atau hub
Mahabbah atau hub1620119596
 
Consells expressió oral
Consells expressió oralConsells expressió oral
Consells expressió oralcarlesmb
 
Relationship : in the Light of J Krishnamurti Teachings
Relationship : in the Light of J Krishnamurti TeachingsRelationship : in the Light of J Krishnamurti Teachings
Relationship : in the Light of J Krishnamurti TeachingsSaumitra Das
 
Perkembangan & pengasuhan anak berkebutuhan khusus
Perkembangan & pengasuhan anak berkebutuhan khususPerkembangan & pengasuhan anak berkebutuhan khusus
Perkembangan & pengasuhan anak berkebutuhan khususWiwin Hendriani
 
Mahalaxmi temple kolhapur, maharastra
Mahalaxmi temple kolhapur, maharastraMahalaxmi temple kolhapur, maharastra
Mahalaxmi temple kolhapur, maharastraSrinivasreddy Patil
 
Hotel Transylvania 2: Murray's Sandstorm
Hotel Transylvania 2: Murray's SandstormHotel Transylvania 2: Murray's Sandstorm
Hotel Transylvania 2: Murray's SandstormJuston Gordon-m
 
Distocia de hombros clase huespe
Distocia de hombros clase huespeDistocia de hombros clase huespe
Distocia de hombros clase huespecursadasantojanni
 
Topik Penelitian Keamanan Informasi
Topik Penelitian Keamanan InformasiTopik Penelitian Keamanan Informasi
Topik Penelitian Keamanan Informasibudi rahardjo
 
Presentació cmc
Presentació cmcPresentació cmc
Presentació cmccarlesmb
 

Andere mochten auch (20)

Curso posicionamiento web en buscadores seo
Curso posicionamiento web en buscadores seoCurso posicionamiento web en buscadores seo
Curso posicionamiento web en buscadores seo
 
Fer hipòtesis
Fer hipòtesisFer hipòtesis
Fer hipòtesis
 
Corporation Culture of International search-engine companies
Corporation Culture of International search-engine companiesCorporation Culture of International search-engine companies
Corporation Culture of International search-engine companies
 
Programa superior de gestor de riesgos financieros
Programa superior de gestor de riesgos financieros Programa superior de gestor de riesgos financieros
Programa superior de gestor de riesgos financieros
 
2. carlos martinez serrano
2. carlos martinez serrano2. carlos martinez serrano
2. carlos martinez serrano
 
Mahabbah atau hub
Mahabbah atau hubMahabbah atau hub
Mahabbah atau hub
 
Consells expressió oral
Consells expressió oralConsells expressió oral
Consells expressió oral
 
Curso técnicas seo (básico)
Curso técnicas seo (básico)Curso técnicas seo (básico)
Curso técnicas seo (básico)
 
Helen of Troy
Helen of TroyHelen of Troy
Helen of Troy
 
Curso socorrismo primeros auxilios centros educativos
Curso socorrismo primeros auxilios centros educativosCurso socorrismo primeros auxilios centros educativos
Curso socorrismo primeros auxilios centros educativos
 
Relationship : in the Light of J Krishnamurti Teachings
Relationship : in the Light of J Krishnamurti TeachingsRelationship : in the Light of J Krishnamurti Teachings
Relationship : in the Light of J Krishnamurti Teachings
 
Perkembangan & pengasuhan anak berkebutuhan khusus
Perkembangan & pengasuhan anak berkebutuhan khususPerkembangan & pengasuhan anak berkebutuhan khusus
Perkembangan & pengasuhan anak berkebutuhan khusus
 
Mahalaxmi temple kolhapur, maharastra
Mahalaxmi temple kolhapur, maharastraMahalaxmi temple kolhapur, maharastra
Mahalaxmi temple kolhapur, maharastra
 
Tragedy of Macbeth
Tragedy of MacbethTragedy of Macbeth
Tragedy of Macbeth
 
Hotel Transylvania 2: Murray's Sandstorm
Hotel Transylvania 2: Murray's SandstormHotel Transylvania 2: Murray's Sandstorm
Hotel Transylvania 2: Murray's Sandstorm
 
Distocia de hombros clase huespe
Distocia de hombros clase huespeDistocia de hombros clase huespe
Distocia de hombros clase huespe
 
Topik Penelitian Keamanan Informasi
Topik Penelitian Keamanan InformasiTopik Penelitian Keamanan Informasi
Topik Penelitian Keamanan Informasi
 
Materi umum 1.6 kemitraan sekolah dengan keluarga dan masyarakat
Materi umum   1.6 kemitraan sekolah dengan keluarga dan masyarakatMateri umum   1.6 kemitraan sekolah dengan keluarga dan masyarakat
Materi umum 1.6 kemitraan sekolah dengan keluarga dan masyarakat
 
Reino plantae 2016
Reino plantae 2016 Reino plantae 2016
Reino plantae 2016
 
Presentació cmc
Presentació cmcPresentació cmc
Presentació cmc
 

Ähnlich wie Cyber crime and security

CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptxAreeb60
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolschrizjohn896
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 

Ähnlich wie Cyber crime and security (20)

cyber security
cyber security cyber security
cyber security
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Computer security and
Computer security andComputer security and
Computer security and
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Cyber crime and security

  • 1. If we can defeat them sitting at home……who needs to fight with tanks and guns!!!!
  • 2. • Introduction. The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. There’re two sides to a coin. Internet also has it’s own advantages and disadvantages .
  • 3. CYBER SECURITY  Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cybersecurity CYBER CRIME  Crime committed using a computer and the internet to steal data or information.  Illegal imports.  Malicious programs.
  • 4. • Hacking in simple terms means an illegal intrusion into a computer system and/or network.
  • 5. SQL INJECTION • SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).With tools like Havij .
  • 6. PHISHING • Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication
  • 7. Cross-site scripting (XSS) • Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side script into web pages viewed by other users.
  • 8. DEEP WEB • the part of the World Wide Web that is not discoverable by means of standard search engines, including password-protected or dynamic pages and encrypted networks. • “The biggest weakness of the Deep Web is also its greatest strength: it's really hard to find anything"
  • 9. • RAT’S(REMOTE ACCES TROJAN) A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment. Once the host system is compromised, the intruder may use it to distribute RATs to other vulnerable computers and establish a botnet.
  • 10. • The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
  • 11. 2)FIREWALL • Protect (a network or system) from unauthorized access.
  • 12. 3)ANTIVIRUS • designed to detect and destroy computer viruses FUNCTIONS • Virus Detection • System Analysis • Malware Removal • File Quarantine • Threat Identification • Online Security • Data Protection •
  • 13. • I thank all of you for co-operating with me and for this lovely opportunity to express my research and knowledge regarding the topic “CYBER CRIME AND SECURITY” • I hope that I have enriched you all with at least some of the facts and ideas that you haven't known on this topic