SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Computer crime, or cybercrime, is crime that involves
a computer and a network. The computer may have been
used in the commission of a crime, or it may be the target.
Cyber security is the body of technologies, processes and
practices designed to protect networks, computers
programs and data from attack, damage or unauthorized
access.
OR
Cyber Security is the protection of information
systems from theft or damage to the hardware, the
software, and to the information on them.
NEED FOR CYBER SECURITY
Cyber security is necessary since it helps in securing data from
threats such as data theft or misuse, also safeguards your
system from viruses.
A vulnerability is a system susceptibility or flaw. To secure a
computer system, it is important to understand the attacks that
can be made against it, and these threats can typically be
classified into one of the categories below:
Backdoors: It is a cryptosystem or an algorithm, is any
secret method of bypassing normal authentication or
security controls.
Denial-of-Service Attack: It is designed to make a machine
or network resource unavailable to its intended users.
Eavesdropping: It is the act of surreptitiously listening to a
private conversation, typically between hosts on a network.
Spoofing: It is a fraudulent or malicious practice in which
communication is sent from an unknown source disguised
as a source known to the receiver.
Phishing: It is the attempt to acquire sensitive information
 Financial Systems
 Utilities and Industrial
Equipment's
 Aviation
 Consumer Devices
 Large Corporations
 Automobiles
 Government
Serious Financial damage has been caused by security
breaches, The 2003 loss estimates by these firms range from
$13 billion(worms and viruses only) to $226 billion(For all
forms of covert attacks). The reliability of these estimates is
often challenged; the underlying methodology is basically
anecdotal.
Impact of Security breaches
As with physical security, the motivations for breaches of
computer security vary between attackers. Some are thrill-
seekers or vandals, others are activists or criminals looking
for financial gain.
Use different ID or Password combinations for different
account and avoid writing them down. Make the passwords
more complicated by combining letters, numbers, special
characters and change them on a regular basis.
Ex:
• Activate firewalls: Firewall are the first line of cyber
defense; they block connections to unknown or bogus
sites and will keep out some types of viruses and
hackers.
• Use Anti-virus/ malware Software: Prevent viruses
from infecting your computer by installing and regularly
updating anti-virus software.
• Block Spyware attacks: Prevent spyware from in
filtering your computer by installing and updating anti-
spyware software.
Make sure your social networking profiles (e.g. Facebook,
Twitter, YouTube, MSN, etc.) are set to private. Check your
security settings. Be careful what information you post
online. Once it is on the Internet, it is there forever!
Be aware that your mobile device is vulnerable to viruses
and hackers. Download applications from trusted sources.
Keep your applications and operating system (e.g.
Windows, Mac, Linux) current with the latest system
updates. Turn on automatic updates to prevent potential
attacks on older software.
Use encryption for your most sensitive files such as tax
returns or financial records, make regular back-ups of all
your important data, and store it in another location.
Wi-Fi (wireless) networks at home are vulnerable to
intrusion if they are not properly secured. Review and
modify default settings. Public Wi-Fi, “Hot Spots”, are also
vulnerable. Avoid conducting financial or corporate
transactions on these networks.
Be cautious when giving out personal information such as
your name, address, phone number or financial information
on the Internet. Make sure that websites are secure (e.g.
when making online purchases) or that you’ve enabled
privacy settings (e.g. when accessing/using social
networking sites).
Always think before you click on a link or file of unknown
origin. Don’t feel pressured by any emails. Check the
source of the message. When in doubt, verify the source.
Never reply to emails that ask you to verify your information
or confirm your user ID or password.
Don’t panic! If you are a victim, if you encounter illegal
Internet content (e.g. child exploitation) or if you suspect a
computer crime, identity theft or a commercial scam, report
this to your local police. If you need help with maintenance
or software installation on your computer, consult with your
service provider or a certified computer technician.
Cyber crime and security
Cyber crime and security

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPTAnandKaGe
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 

Was ist angesagt? (20)

Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Andere mochten auch

Strategies for reading comprehension
Strategies for reading comprehensionStrategies for reading comprehension
Strategies for reading comprehensionsaaaira
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Reading: Comprehension, Strategies and Activities
Reading: Comprehension, Strategies and ActivitiesReading: Comprehension, Strategies and Activities
Reading: Comprehension, Strategies and ActivitiesJoAnn MIller
 
Reading skills
Reading skillsReading skills
Reading skillsalkaala
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
Skimming and Scanning a key Reading Comprehension Skill
Skimming and Scanning a key Reading Comprehension SkillSkimming and Scanning a key Reading Comprehension Skill
Skimming and Scanning a key Reading Comprehension SkillCarrie Leggatt
 

Andere mochten auch (11)

Hardware theft
Hardware theftHardware theft
Hardware theft
 
Strategies for reading comprehension
Strategies for reading comprehensionStrategies for reading comprehension
Strategies for reading comprehension
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Reading: Comprehension, Strategies and Activities
Reading: Comprehension, Strategies and ActivitiesReading: Comprehension, Strategies and Activities
Reading: Comprehension, Strategies and Activities
 
Reading skills
Reading skillsReading skills
Reading skills
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Skimming & Scanning
Skimming & ScanningSkimming & Scanning
Skimming & Scanning
 
Software theft
Software theftSoftware theft
Software theft
 
Skimming and Scanning a key Reading Comprehension Skill
Skimming and Scanning a key Reading Comprehension SkillSkimming and Scanning a key Reading Comprehension Skill
Skimming and Scanning a key Reading Comprehension Skill
 

Ähnlich wie Cyber crime and security

SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfssusera0b94b
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptxKhristine Botin
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 

Ähnlich wie Cyber crime and security (20)

SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer security
Computer securityComputer security
Computer security
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer security and
Computer security andComputer security and
Computer security and
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 

Mehr von Sharath Raj

Eye Tracking Based Human - Computer Interaction
Eye Tracking Based Human - Computer InteractionEye Tracking Based Human - Computer Interaction
Eye Tracking Based Human - Computer InteractionSharath Raj
 
Computer Graphics Project Report on Sinking Ship using OpenGL
Computer Graphics Project Report on Sinking Ship using OpenGL Computer Graphics Project Report on Sinking Ship using OpenGL
Computer Graphics Project Report on Sinking Ship using OpenGL Sharath Raj
 
Computer Graphics Project on Sinking Ship using OpenGL
Computer Graphics Project on Sinking Ship using OpenGLComputer Graphics Project on Sinking Ship using OpenGL
Computer Graphics Project on Sinking Ship using OpenGLSharath Raj
 
Basic Computer Knowledge in Kannada
Basic Computer Knowledge in KannadaBasic Computer Knowledge in Kannada
Basic Computer Knowledge in KannadaSharath Raj
 
Substance abuse and addiction
Substance abuse and addictionSubstance abuse and addiction
Substance abuse and addictionSharath Raj
 
Digital data storage in DNA
Digital data storage in DNADigital data storage in DNA
Digital data storage in DNASharath Raj
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial IntelligenceSharath Raj
 
Final Year Project BCA Presentation on Pic-O-Stica
Final Year Project BCA Presentation on Pic-O-SticaFinal Year Project BCA Presentation on Pic-O-Stica
Final Year Project BCA Presentation on Pic-O-SticaSharath Raj
 
Artificial inteligence
Artificial inteligenceArtificial inteligence
Artificial inteligenceSharath Raj
 

Mehr von Sharath Raj (9)

Eye Tracking Based Human - Computer Interaction
Eye Tracking Based Human - Computer InteractionEye Tracking Based Human - Computer Interaction
Eye Tracking Based Human - Computer Interaction
 
Computer Graphics Project Report on Sinking Ship using OpenGL
Computer Graphics Project Report on Sinking Ship using OpenGL Computer Graphics Project Report on Sinking Ship using OpenGL
Computer Graphics Project Report on Sinking Ship using OpenGL
 
Computer Graphics Project on Sinking Ship using OpenGL
Computer Graphics Project on Sinking Ship using OpenGLComputer Graphics Project on Sinking Ship using OpenGL
Computer Graphics Project on Sinking Ship using OpenGL
 
Basic Computer Knowledge in Kannada
Basic Computer Knowledge in KannadaBasic Computer Knowledge in Kannada
Basic Computer Knowledge in Kannada
 
Substance abuse and addiction
Substance abuse and addictionSubstance abuse and addiction
Substance abuse and addiction
 
Digital data storage in DNA
Digital data storage in DNADigital data storage in DNA
Digital data storage in DNA
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Final Year Project BCA Presentation on Pic-O-Stica
Final Year Project BCA Presentation on Pic-O-SticaFinal Year Project BCA Presentation on Pic-O-Stica
Final Year Project BCA Presentation on Pic-O-Stica
 
Artificial inteligence
Artificial inteligenceArtificial inteligence
Artificial inteligence
 

Kürzlich hochgeladen

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Kürzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Cyber crime and security

  • 1.
  • 2. Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
  • 3. Cyber security is the body of technologies, processes and practices designed to protect networks, computers programs and data from attack, damage or unauthorized access. OR Cyber Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them.
  • 4. NEED FOR CYBER SECURITY Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 5. A vulnerability is a system susceptibility or flaw. To secure a computer system, it is important to understand the attacks that can be made against it, and these threats can typically be classified into one of the categories below: Backdoors: It is a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls. Denial-of-Service Attack: It is designed to make a machine or network resource unavailable to its intended users. Eavesdropping: It is the act of surreptitiously listening to a private conversation, typically between hosts on a network. Spoofing: It is a fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver. Phishing: It is the attempt to acquire sensitive information
  • 6.  Financial Systems  Utilities and Industrial Equipment's  Aviation  Consumer Devices  Large Corporations  Automobiles  Government
  • 7. Serious Financial damage has been caused by security breaches, The 2003 loss estimates by these firms range from $13 billion(worms and viruses only) to $226 billion(For all forms of covert attacks). The reliability of these estimates is often challenged; the underlying methodology is basically anecdotal. Impact of Security breaches
  • 8.
  • 9. As with physical security, the motivations for breaches of computer security vary between attackers. Some are thrill- seekers or vandals, others are activists or criminals looking for financial gain.
  • 10.
  • 11. Use different ID or Password combinations for different account and avoid writing them down. Make the passwords more complicated by combining letters, numbers, special characters and change them on a regular basis. Ex:
  • 12. • Activate firewalls: Firewall are the first line of cyber defense; they block connections to unknown or bogus sites and will keep out some types of viruses and hackers. • Use Anti-virus/ malware Software: Prevent viruses from infecting your computer by installing and regularly updating anti-virus software. • Block Spyware attacks: Prevent spyware from in filtering your computer by installing and updating anti- spyware software.
  • 13. Make sure your social networking profiles (e.g. Facebook, Twitter, YouTube, MSN, etc.) are set to private. Check your security settings. Be careful what information you post online. Once it is on the Internet, it is there forever!
  • 14. Be aware that your mobile device is vulnerable to viruses and hackers. Download applications from trusted sources.
  • 15. Keep your applications and operating system (e.g. Windows, Mac, Linux) current with the latest system updates. Turn on automatic updates to prevent potential attacks on older software.
  • 16. Use encryption for your most sensitive files such as tax returns or financial records, make regular back-ups of all your important data, and store it in another location.
  • 17. Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not properly secured. Review and modify default settings. Public Wi-Fi, “Hot Spots”, are also vulnerable. Avoid conducting financial or corporate transactions on these networks.
  • 18. Be cautious when giving out personal information such as your name, address, phone number or financial information on the Internet. Make sure that websites are secure (e.g. when making online purchases) or that you’ve enabled privacy settings (e.g. when accessing/using social networking sites).
  • 19. Always think before you click on a link or file of unknown origin. Don’t feel pressured by any emails. Check the source of the message. When in doubt, verify the source. Never reply to emails that ask you to verify your information or confirm your user ID or password.
  • 20. Don’t panic! If you are a victim, if you encounter illegal Internet content (e.g. child exploitation) or if you suspect a computer crime, identity theft or a commercial scam, report this to your local police. If you need help with maintenance or software installation on your computer, consult with your service provider or a certified computer technician.