+ All Categories
Home > Engineering > Cyber Crime & Security

Cyber Crime & Security

Date post: 21-Apr-2017
Category:
Upload: anchit-rajawat
View: 47 times
Download: 1 times
Share this document with a friend
16
Computer Science & Engineering (4 th Semester) Cyber crime Presented by:- Anchit Singh Computer Science and Engineering 6 th Semester
Transcript
Page 1: Cyber Crime & Security

Computer Science & Engineering (4th Semester)

Cyber crimePresented by:-

Anchit Singh

Computer Science and Engineering6th Semester

Page 2: Cyber Crime & Security

ContentsINTRODUCTION(What is cyber crime ?)HISTORY OF CYBER CRIMECATEGORIES OF CYBER CRIMETYEPS OF CYBER CRIMECYBER SECURITYADVANTAGES OF CYBER SECURITYSAFETY TIPS TO CYBER CRIMECYBER ATTACKS STATISTICSCONCLUSION

Page 3: Cyber Crime & Security
Page 4: Cyber Crime & Security

What is Cyber Crime…???

Cybercrime is nothing but where the computer used as an object or subject of Crime

Example:- Hacking of Computer

Page 5: Cyber Crime & Security

HISTORY OF CYBER CRIME

The first recorded cyber crime took place in 1820. That is not surprising considering the fact that the

abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c.

In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage.

The first spam email took place in 1976 when it was sent out over the ARPANT. The first virus was installed on an Apple computer in 1982 when a high school student, Rich

skrenta, developed the EIK Cloner.

Page 6: Cyber Crime & Security

Categories of cyber crime The Computer as a target Example:- Hacking, Dos attack and Virus attacks etc. The Computer as a

weapon

Example:- Credit card fraud, Cyber terrorism and Pornography etc.

Page 7: Cyber Crime & Security

TYPES OF CYBER CRIME

HACKING CYBER TERRORISM DENIAL OF SERVICE ATTACKS

Page 8: Cyber Crime & Security

HackingWebsite Hacking

ATM Hacking

System Hacking

Mobile Hacking

Types of cyber crime

Page 9: Cyber Crime & Security

Cyber Terrorism Terrorist attacks on the internet is by distributed denial of service attacks, hate websites and hate E-mails, attacks on service network etc.

Page 10: Cyber Crime & Security

DENIAL OF SERVICE ATTACKSTypes of cyber crime

DENIAL OF SERVICE ATTACKS : This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many DOS attacks, such as the ping of death and Tear drop attacks.

VIRUS DISSMINITION : Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING etc.

COMPUTER VANDALISM : Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.

Page 11: Cyber Crime & Security

Cyber security Cyber security preventing the different online attack to sensitive personal and business informationPrivacy Policy:-

Before submitting your personal information, on website look for the sites privacy policy.

Keep Software Up to Date ,For better security from Hackers

Page 12: Cyber Crime & Security

ADVANTAGES OF CYBER SECURITY The cyber security will defend us from

critical attacks. It helps us to browse the site, website. Internet Security process all the

incoming and outgoing data on your computer.

It will defend us from hacks and virus. Application of cyber security used in

our PC needs update every week

Page 13: Cyber Crime & Security

SAFETY TIPS TO CYBER CRIME

ANTIVIRUSBACKUP

INSERT FIREWALL

CHECK SECURITY SETTINGS

Page 14: Cyber Crime & Security

Cyber attack statistics(2013)

Page 15: Cyber Crime & Security
Page 16: Cyber Crime & Security

Thank you


Recommended