SlideShare a Scribd company logo
1 of 12
Nigel D’souza(C.C.I)
Cyber crime Invest.
What is Cyberspace And Cybercrime

Cyberspace
An electronic medium of computer system within which people
can communicate do research, or simply window shop.


Cybercrime

Crime committed using a computer and the internet i.e.
where the computer used as an object or subject of crime.
History

-The first recorded cyber crime took place in the year
1820.

-The first spam email took place in 1978 when it was
sent over the Arpanet

-The first VIRUS was installed on an Apple computer in
1982
Types of cyber crime

-Hacking
-Child pornography
-Computer vandalism
-DoS attack
-Virus Dissemination
-Software Piracy
-Net Extortion
-Phishing
-Spoofing
Hacking
-Illegal intrusion into a computer system and/or network. i.e.
Unauthorized access

Child pornography
-Abuse children/teens sexually
-More children would be using the internet and more are the
chances of falling victim to the aggression of pedophiles

Computer vandalism
-Damaging or destroying data rather than stealing or reusing
DoS attack
-Floods the bandwidth of the victims network or fills his e-
mail box with spam mail depriving him of the services he is
entitled to access


Virus Dissemination
-Malicious software that attaches itself to other software
(virus, worms, Trojan Horse)


Software piracy
-Theft of software through the illegal copying of genuine
programs
Net extortion
-Copying the companies confidential data in order to extort
said company for huge amount

Phishing
-Act of sending an e-mail to a user falsely claiming to be an
established legitimate enterprise in an attempt to scam the
user into surrendering private information that will be used
for identity theft

Spoofing
-Getting one computer on a network to pretend to have the
identity off another computer,, usually one with special
access privileges ,so as to obtain access to the other
computers on the network.
Cyber crime threatens national security
-Ex union home minister Shivraj Patil said that the rising level of
cyber crime is an indication of an enormous threat to national
security.
-Everything is being operated through computer and hence the risk
increases.
-India is at eleventh position , U.S. being the first
-Increase in number of cases reported
Cyber security
-Involves protection of sensitive personal & business information
through prevention, detection and response to different online
attacks

-Protects from attacks by detecting and preventing
Do’s
-Install a firewall , pop-up blocker
-Ensure your virus definitions are up to date
-Use strong passwords , don’t give personal information unless
required(not even phone number)
-Use secure connections
-Disable file sharing , turn off internet when not in use
-Use spam filters , delete spam immediately
-Use various passwords for various accounts
-Don’t believe in everything you read online
-Open attachments carefully
-Beware of promises to make fast profits
-Be smart , don’t act foolish and help in spreading spam
Conclusion
The only system which is truly secure is one which is switched
off and unplugged.

So , only way to be safe is Pay attention and
Act smart.

More Related Content

What's hot (20)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Ceh v5 module 09 social engineering
Ceh v5 module 09 social engineeringCeh v5 module 09 social engineering
Ceh v5 module 09 social engineering
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
INTERNATIONAL SECURITY MEASURES IN CYBERSPACE
INTERNATIONAL SECURITY MEASURES  IN CYBERSPACEINTERNATIONAL SECURITY MEASURES  IN CYBERSPACE
INTERNATIONAL SECURITY MEASURES IN CYBERSPACE
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Network security
Network securityNetwork security
Network security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 

Similar to Cyber crime (do's&dont's)

cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitySohailAkbar14
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ictcyb1337
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
L15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.pptL15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.pptraffy ursulum
 
L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxBenjieBarlaan
 

Similar to Cyber crime (do's&dont's) (20)

cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
L15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.pptL15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.ppt
 
L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptx
 

Recently uploaded

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Cyber crime (do's&dont's)

  • 2. What is Cyberspace And Cybercrime Cyberspace An electronic medium of computer system within which people can communicate do research, or simply window shop. Cybercrime Crime committed using a computer and the internet i.e. where the computer used as an object or subject of crime.
  • 3. History -The first recorded cyber crime took place in the year 1820. -The first spam email took place in 1978 when it was sent over the Arpanet -The first VIRUS was installed on an Apple computer in 1982
  • 4. Types of cyber crime -Hacking -Child pornography -Computer vandalism -DoS attack -Virus Dissemination -Software Piracy -Net Extortion -Phishing -Spoofing
  • 5. Hacking -Illegal intrusion into a computer system and/or network. i.e. Unauthorized access Child pornography -Abuse children/teens sexually -More children would be using the internet and more are the chances of falling victim to the aggression of pedophiles Computer vandalism -Damaging or destroying data rather than stealing or reusing
  • 6. DoS attack -Floods the bandwidth of the victims network or fills his e- mail box with spam mail depriving him of the services he is entitled to access Virus Dissemination -Malicious software that attaches itself to other software (virus, worms, Trojan Horse) Software piracy -Theft of software through the illegal copying of genuine programs
  • 7. Net extortion -Copying the companies confidential data in order to extort said company for huge amount Phishing -Act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft Spoofing -Getting one computer on a network to pretend to have the identity off another computer,, usually one with special access privileges ,so as to obtain access to the other computers on the network.
  • 8. Cyber crime threatens national security -Ex union home minister Shivraj Patil said that the rising level of cyber crime is an indication of an enormous threat to national security. -Everything is being operated through computer and hence the risk increases. -India is at eleventh position , U.S. being the first -Increase in number of cases reported
  • 9.
  • 10. Cyber security -Involves protection of sensitive personal & business information through prevention, detection and response to different online attacks -Protects from attacks by detecting and preventing
  • 11. Do’s -Install a firewall , pop-up blocker -Ensure your virus definitions are up to date -Use strong passwords , don’t give personal information unless required(not even phone number) -Use secure connections -Disable file sharing , turn off internet when not in use -Use spam filters , delete spam immediately -Use various passwords for various accounts -Don’t believe in everything you read online -Open attachments carefully -Beware of promises to make fast profits -Be smart , don’t act foolish and help in spreading spam
  • 12. Conclusion The only system which is truly secure is one which is switched off and unplugged. So , only way to be safe is Pay attention and Act smart.