SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Cyber Crime
and Security
Presented by
P.Harsha Vardhan
22501A05D9
What is Cyber Crime?
Types of Cyber Crime
Hacking Online
Fruad
Malware
Software
piracy
Identity
theft
Cyber
terrorism
Impact of Cyber Crime
Cybercrime has far-reaching consequences, including financial loss, reputational damage,
psychological distress, and compromised cybersecurity.
Financial Loss
Businesses and
individuals suffer
monetary damages due to
cybercrimes.
Reputational Damage
Trust and reputation can
be severely affected.
Psychological Distress
The victims may
experience anxiety and
emotional trauma.
The Millesa virus attack,
which occurred in 1999,
spread through infected
email attachments,
encrypting files and
demanding ransom
payments. It caused
widespread data loss and
financial damages to
businesses and
individuals worldwide.
Millesa virus
In 2014, Sony Pictures
faced a significant hack,
leading to the theft of
sensitive company data,
including unreleased films
and personal details of
numerous employees.
Sony Pictures
Hack (2014)
In 2017, the WannaCry
ransomware attack
emerged as one of the
most damaging in history,
impacting over 200,000
computers worldwide,
encrypting files, and
demanding bitcoin
ransoms for decryption.
WannaCry
Ransomware Attack
(2017): Yahoo faced significant
data breaches in 2013
and 2014, jeopardizing
the personal details of all
its 3 billion users,
including names, email
addresses, birthdates,
and passwords.
Yahoo Data Breaches
(2013-2014)
The Biggest Cyberattacks in
History
Cyber Security
cybersecurity protects devices, networks, and data
from digital threats such as hacking and malware,
ensuring their safety and integrity.
Cyber Security
Implementing strong passwords, updating software, conducting regular backups, and educating users
are essential cybersecurity practices for individuals and organizations.
Strong Passwords
Create complex and unique
passwords for enhanced
security.
Software Updates
Regularly update software
and applications to patch
vulnerabilities.
Data Backups
Backup critical data to ensure
recovery in case of cyber
incidents.
Cyber Security Tools and Technologies
Cybersecurity tools include firewalls, antivirus software, encryption, multi-factor authentication, and
intrusion detection systems, offering diverse layers of protection.
Firewalls
Prevent unauthorized access
to or from a private network.
Antivirus Software
Detect and remove malicious
software from devices.
Encryption
Securely transmit and store
sensitive information.
Thank You

Weitere ähnliche Inhalte

Ähnlich wie Power point presentation on Cyber Crime and Security

Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr. Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
EvonCanales257
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
varun4110
 
Identify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdfIdentify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdf
fatoryoutlets
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
ravikanthh
 

Ähnlich wie Power point presentation on Cyber Crime and Security (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Services.pptx
Cyber Security Services.pptxCyber Security Services.pptx
Cyber Security Services.pptx
 
Meeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptxMeeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptx
 
Unraveling the Latest Cybersecurity Trends in 2024
Unraveling the Latest Cybersecurity Trends in 2024Unraveling the Latest Cybersecurity Trends in 2024
Unraveling the Latest Cybersecurity Trends in 2024
 
Cyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk AdvisoryCyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk Advisory
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf
 
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr. Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Identify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdfIdentify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021Cybercrime's accelerated by covid 19 | 2021
Cybercrime's accelerated by covid 19 | 2021
 

Kürzlich hochgeladen

Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Kürzlich hochgeladen (20)

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Power point presentation on Cyber Crime and Security

  • 1. Cyber Crime and Security Presented by P.Harsha Vardhan 22501A05D9
  • 2. What is Cyber Crime?
  • 3. Types of Cyber Crime Hacking Online Fruad Malware Software piracy Identity theft Cyber terrorism
  • 4. Impact of Cyber Crime Cybercrime has far-reaching consequences, including financial loss, reputational damage, psychological distress, and compromised cybersecurity. Financial Loss Businesses and individuals suffer monetary damages due to cybercrimes. Reputational Damage Trust and reputation can be severely affected. Psychological Distress The victims may experience anxiety and emotional trauma.
  • 5. The Millesa virus attack, which occurred in 1999, spread through infected email attachments, encrypting files and demanding ransom payments. It caused widespread data loss and financial damages to businesses and individuals worldwide. Millesa virus In 2014, Sony Pictures faced a significant hack, leading to the theft of sensitive company data, including unreleased films and personal details of numerous employees. Sony Pictures Hack (2014) In 2017, the WannaCry ransomware attack emerged as one of the most damaging in history, impacting over 200,000 computers worldwide, encrypting files, and demanding bitcoin ransoms for decryption. WannaCry Ransomware Attack (2017): Yahoo faced significant data breaches in 2013 and 2014, jeopardizing the personal details of all its 3 billion users, including names, email addresses, birthdates, and passwords. Yahoo Data Breaches (2013-2014) The Biggest Cyberattacks in History
  • 6.
  • 7. Cyber Security cybersecurity protects devices, networks, and data from digital threats such as hacking and malware, ensuring their safety and integrity.
  • 8. Cyber Security Implementing strong passwords, updating software, conducting regular backups, and educating users are essential cybersecurity practices for individuals and organizations. Strong Passwords Create complex and unique passwords for enhanced security. Software Updates Regularly update software and applications to patch vulnerabilities. Data Backups Backup critical data to ensure recovery in case of cyber incidents.
  • 9. Cyber Security Tools and Technologies Cybersecurity tools include firewalls, antivirus software, encryption, multi-factor authentication, and intrusion detection systems, offering diverse layers of protection. Firewalls Prevent unauthorized access to or from a private network. Antivirus Software Detect and remove malicious software from devices. Encryption Securely transmit and store sensitive information.