+ All Categories
Home > Documents > Cybercrime and Security

Cybercrime and Security

Date post: 17-Dec-2015
Category:
Upload: mandeep-batra
View: 218 times
Download: 0 times
Share this document with a friend
Description:
powerpoint on Cybercrime and Security
Popular Tags:
22
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Harshdeep kaur. B.Sc IST, 3 rd Year. Roll-11DIS110. RAVENSHAW UNIVERSITY.
Transcript

Name of presentation

CYBER CRIME AND SECURITYIf we can defeat them sitting at homewho needs to fight with tanks and guns!!!!Presented ByHarshdeep kaur.B.Sc IST, 3rd Year.Roll-11DIS110.RAVENSHAW UNIVERSITY.1CONTENTSIntroduction.Definition.History.Cyber threat evolution.Categories of cyber crime.Types of cyber crime. Prevention.Security.Conclusion.

2INTRODUCTIONThe internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.

Therere two sides to a coin. Internet also has its own disadvantages is Cyber crime- illegal activity committed on the internet.

3DEFINING CYBER CRIMECrime committed using a computer and the internet to steal data or information.Illegal imports.Malicious programs.

4Cyber crime

Cybercrime is nothing but where the computer used as an object or subject of crime..

5HISTORYThe first recorded cyber crime took place in the year 1820.

6CYBER THREAT EVOLUTION

7CATEGORIZATION OF CYBER CRIMEThe Computer as a Target

The computer as a weapon8TYPES OF CYBER CRIMEHackingDenial of service attackVirus DisseminationComputer VandalismCyber TerrorismSoftware Piracy

9HACKINGHacking in simple terms means an illegal intrusion into a computer system and/or network.

10DENIAL OF SERVICE ATTACKAct by the criminal, who floods the bandwidth of the victims network.Is his e-mail box with spam mail depriving him of the services.11VIRUS DISSEMINATIONMalicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)

12COMPUTER VANDALISMDamaging or destroying data rather than stealing.Transmitting virus

13CYBER TERRORISMUse ofInternetbased attacks interroristactivities.Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.

14SOFTWARE PIRACYTheft of software through the illegal copying of genuine programs.Distribution of products intended to pass for the original.

15TYPES OF CYBER ATTACK BY PERCENTAGEFinancial fraud: 11%Sabotage of data/networks: 17%Theft of proprietary information: 20%System penetration from the outside: 25%Denial of service: 27%Unauthorized access by insiders: 71%Employee abuse of internet privileges 79%Viruses 85%

16SAFETY TIPS FOR CYBER CRIMEUse antivirus softwares.Insert firewalls. Uninstall unnecessary software Maintain backup.Check security settings.Stay anonymous - choose a genderless screen name.Never give your full name or address to strangers.Learn more about Internet privacy.

17Security

18CYBER SECURITYInternet securityis a branch ofcomputer security specifically related to theInternet.It's objective is to establish rules and measure to use against attacks over the Internet.

19ADVANTAGES OF CYBER SECURITYDefend us from critical attacks.Browse the safe website. Internet security process all the incoming and outgoing data on our computer.

20CONCLUSIONTechnology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.

21

22


Recommended