SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Presentation On :
CYBER CRIME AND SECURITY
Presented By:
Ritik Shukla
Sarang Thakre
CONTENTS
1. What Is cybercrime?
2. History Of Cybercrime
3. Categories Of Cybercrime
4. Types Of Cybercrime
5. What Is Security?
6. Threats & Hacks
7. Prevention & Tips
8. Conclusion
What is Cyber crime?
Cybercrime is defined as a crime in which a computer is the object of the
crime (hacking, phishing, spamming) or is used as a tool to commit an
offense (child pornography, hate crimes). Cybercriminals may use
computer technology to access personal information, business trade
secrets or use the internet for exploitative or malicious purposes.
Criminals can also use computers for communication and document or
data storage.
So How It Started ?
• When hacking first started it was not thought of as that serious. The
hackers were not even known as hackers but as practical jokers. The very
first hack came in 1878 when the phone company, Bell Telephone, was
started. A group of teenage boys, hired to run the switchboards, would
disconnect or misdirect calls.
• Then hackers tried to break into computer networks. Some did it just for
the thrill of accessing high-level security networks, but others sought to
gain sensitive, classified material. Eventually, criminals started to infect
computer systems with computer viruses, which led to breakdowns on
personal and business computers.
HISTORY
Categories Of Cyber Crime
We can categorize Cyber crimes in two ways
The Computer as a Target :-using a computer to attack other computers.
e.g. Hacking, Virus/Worm attacks, DOS attack etc.
The computer as a weapon :-using a computer to commit real world crimes.
e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds,
Pornography etc.
Types Of Cyber Crime
1. Hacking
Hacking generally refers to unauthorized intrusion into a computer or a
network. The person engaged in hacking activities is known as a hacker.
This hacker may alter system or security features to accomplish a goal
that differs from the original purpose of the system.
Hacking can also refer to non-malicious activities, usually involving
unusual or improvised alterations to equipment or processes.
2.Spamming
Spamming is the use of electronic messaging systems like e-mails and
other digital delivery systems and broadcast media to send unwanted
bulk messages indiscriminately. The term spamming is also applied to
other media like in internet forums, instant messaging, and mobile text
messaging, social networking spam, junk fax transmissions, television
advertising and sharing network spam.
Types Of Cyber Crime
3. Phishing
Phishing is the fraudulent attempt to obtain sensitive information such
as usernames, passwords, and credit card details (and money), often for
malicious reasons, by disguising as a trustworthy entity in an electronic
communication.
What Is Cyber Security?
Cyber security is a branch of computer security specifically related to
the internet.
It’s objectives is to establish rules and measure to use against attacks
over the internet.
Cyber Security involves protection of sensitive personal and business
information through prevention, detection and response to different
online attacks.
Confidentiality
Only those authorized to view information
Integrity
Information is correct and hasn’t been altered by
unauthorized users or software
Availability
Data is accessible to authorized users
Computer Security – Threats & Hacks
Malware
Software that has a malicious purpose
•Viruses : A computer virus is malicious code that replicates by copying itself to
another program, computer boot sector or document and changes how a
computer works.
•Trojans : Trojans can be employed by cyber-thieves and hackers trying to gain
access to users' systems. Users are typically tricked by some form of social
engineering into loading and executing Trojans on their systems
•Spyware : It is designed to spy on the victim’s computer. If you are infected with it,
probably your daily activity or certain activity will be spied by the spyware and it
will find itself a way to contact the host of this malware.
The most common hacks known are:
Backdoors: Backdoor is an undocumented
way of gaining access to a program, online service
or an entire computer system.
A backdoor will bypass normal authentication
mechanisms. Also called a trapdoor.
Denial-Of-Service Attack = DOS Attack is a malicious attempt by a single person
or a group of people to cause the victim, site or node to deny service to it
customers.
• DoS = when a single host attacks
• DDoS = when multiple hosts attack simultaneously
Eavesdropping (Man in the Middle): This attack consists of listening to
private conversations between hosts in a network and compromising
sensitive information.
Spoofing: This technique consist of masquerading as another person (or
program) and falsify data.
SQL Injection : An SQL injection is a computer attack in which malicious code
is embedded in a poorly-designed application and then passed to the
backend database. The malicious data then produces database query results
or actions that should never have been executed.
Safety tips & prevention for cyber crime
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous & use VPN (virtual private network)
• Never give your full name or address to strangers.
• Learn more about Internet privacy.
• Make Sure your Computer is configured securely
• Choose Strong Passwords and Keep them Safe.
• Cybercrime prevention can be straight-forward - when armed with a little
technical advice and common sense, many attacks can be avoided.
• In general, online criminals are trying to make their money as quickly and
easily as possible. The more difficult you make their job, the more likely
they are to leave you alone and move on to an easier target.
The Beginner's Guide to Defending Against Wi-Fi Hacking
1. Password Cracking
Solution: Better Passwords
2. Social-Engineering Attacks
Solution: Always Be Suspicious
3. WPS PIN Attacks
Solution: Disable WPS & Verify with Testing
4. Remote-Access Attacks
Solution: Disable Remote Access & Port Forwarding
5. Rogue Access Points
Solution: Spot Signs of a Rogue AP
Statistical Report
Conclusion
I hope that our presentation will be helpful for my audience to improve
their knowledge about cyber security and to overcome several security
loopholes on their computer operation.
Also it helps to spread awareness among normal people about emerging
security threats.
Simple and practical prevention methods are explained in the Seminar to
prevent PCs from infection.
◦ As computer security gets tighter hackers are getting smarter!!!
◦ Computer and information security continue to grow in importance
◦ Know The Importance Of Cyber Security.
◦ Neglecting security is the worst thing you can do!!
Cyber Crime And Security

Weitere ähnliche Inhalte

Was ist angesagt?

CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIMEKunal Sinha
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingNaveen Sihag
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & SecurityShreeraj Nair
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
Cyber security
Cyber securityCyber security
Cyber securitySamsil Arefin
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityVivek Agarwal
 
Cyber security
Cyber securityCyber security
Cyber securityRishav Sadhu
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationRitik Kumar
 

Was ist angesagt? (20)

Cyber security
Cyber security Cyber security
Cyber security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ppt
PptPpt
Ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 

Ähnlich wie Cyber Crime And Security

Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?RONIKMEHRA
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxRavinderSingh172970
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crimezahid_ned
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeAlisha Jain
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptxJoselitoJMebolos
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxjonadhe mondeja
 

Ähnlich wie Cyber Crime And Security (20)

Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 

KĂźrzlich hochgeladen

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

KĂźrzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Cyber Crime And Security

  • 1. Presentation On : CYBER CRIME AND SECURITY Presented By: Ritik Shukla Sarang Thakre
  • 2. CONTENTS 1. What Is cybercrime? 2. History Of Cybercrime 3. Categories Of Cybercrime 4. Types Of Cybercrime 5. What Is Security? 6. Threats & Hacks 7. Prevention & Tips 8. Conclusion
  • 3. What is Cyber crime? Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes. Criminals can also use computers for communication and document or data storage.
  • 4. So How It Started ? • When hacking first started it was not thought of as that serious. The hackers were not even known as hackers but as practical jokers. The very first hack came in 1878 when the phone company, Bell Telephone, was started. A group of teenage boys, hired to run the switchboards, would disconnect or misdirect calls. • Then hackers tried to break into computer networks. Some did it just for the thrill of accessing high-level security networks, but others sought to gain sensitive, classified material. Eventually, criminals started to infect computer systems with computer viruses, which led to breakdowns on personal and business computers. HISTORY
  • 5. Categories Of Cyber Crime We can categorize Cyber crimes in two ways The Computer as a Target :-using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc. The computer as a weapon :-using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
  • 6. Types Of Cyber Crime 1. Hacking Hacking generally refers to unauthorized intrusion into a computer or a network. The person engaged in hacking activities is known as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose of the system. Hacking can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes. 2.Spamming Spamming is the use of electronic messaging systems like e-mails and other digital delivery systems and broadcast media to send unwanted bulk messages indiscriminately. The term spamming is also applied to other media like in internet forums, instant messaging, and mobile text messaging, social networking spam, junk fax transmissions, television advertising and sharing network spam.
  • 7. Types Of Cyber Crime 3. Phishing Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
  • 8. What Is Cyber Security? Cyber security is a branch of computer security specifically related to the internet. It’s objectives is to establish rules and measure to use against attacks over the internet. Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks.
  • 9. Confidentiality Only those authorized to view information Integrity Information is correct and hasn’t been altered by unauthorized users or software Availability Data is accessible to authorized users
  • 10. Computer Security – Threats & Hacks Malware Software that has a malicious purpose •Viruses : A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and changes how a computer works. •Trojans : Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems •Spyware : It is designed to spy on the victim’s computer. If you are infected with it, probably your daily activity or certain activity will be spied by the spyware and it will find itself a way to contact the host of this malware.
  • 11. The most common hacks known are: Backdoors: Backdoor is an undocumented way of gaining access to a program, online service or an entire computer system. A backdoor will bypass normal authentication mechanisms. Also called a trapdoor. Denial-Of-Service Attack = DOS Attack is a malicious attempt by a single person or a group of people to cause the victim, site or node to deny service to it customers. • DoS = when a single host attacks • DDoS = when multiple hosts attack simultaneously
  • 12. Eavesdropping (Man in the Middle): This attack consists of listening to private conversations between hosts in a network and compromising sensitive information. Spoofing: This technique consist of masquerading as another person (or program) and falsify data. SQL Injection : An SQL injection is a computer attack in which malicious code is embedded in a poorly-designed application and then passed to the backend database. The malicious data then produces database query results or actions that should never have been executed.
  • 13. Safety tips & prevention for cyber crime • Use antivirus software’s. • Insert firewalls. • Uninstall unnecessary software • Maintain backup. • Check security settings. • Stay anonymous & use VPN (virtual private network) • Never give your full name or address to strangers. • Learn more about Internet privacy. • Make Sure your Computer is configured securely • Choose Strong Passwords and Keep them Safe. • Cybercrime prevention can be straight-forward - when armed with a little technical advice and common sense, many attacks can be avoided. • In general, online criminals are trying to make their money as quickly and easily as possible. The more difficult you make their job, the more likely they are to leave you alone and move on to an easier target.
  • 14. The Beginner's Guide to Defending Against Wi-Fi Hacking 1. Password Cracking Solution: Better Passwords 2. Social-Engineering Attacks Solution: Always Be Suspicious 3. WPS PIN Attacks Solution: Disable WPS & Verify with Testing 4. Remote-Access Attacks Solution: Disable Remote Access & Port Forwarding 5. Rogue Access Points Solution: Spot Signs of a Rogue AP
  • 16. Conclusion I hope that our presentation will be helpful for my audience to improve their knowledge about cyber security and to overcome several security loopholes on their computer operation. Also it helps to spread awareness among normal people about emerging security threats. Simple and practical prevention methods are explained in the Seminar to prevent PCs from infection. ◦ As computer security gets tighter hackers are getting smarter!!! ◦ Computer and information security continue to grow in importance ◦ Know The Importance Of Cyber Security. ◦ Neglecting security is the worst thing you can do!!