You are on page 1of 24

CYBER

CRIME
Presented by,
Shreyash patel
CONTENTS
o INTRODUCTION.
o DEFINITION.
o HISTORY.
o CYBER THREAT EVOLUTION.
o CATEGORIES OF CYBER CRIME.
o TYPES OF CYBER CRIME.
o PREVENTION.
o SECURITY.
o CONCLUSION.
1
INTRODUCTION
The internet in India is growing rapidly. It has given rise to
new opportunities in every field we can think of be it
entertainment, business, sports or education and
technology.

There’re two sides to a coin. Internet also has it’s own


disadvantages is Cyber crime- illegal activity committed
on the internet.

2
DEFINING CYBERCRIME
Crime committed using a computer and the
internet to steal data or information.

There’re two sides to a coin. Internet also


has it’s own disadvantages is Cyber crime-
illegal activity committed on the internet.

3
DEFINING CYBERCRIME
 Cybercrime is nothing but where the computer
used as an object or subject of crime…
Whatever it is Online or Offline

 Crime on the web such as distribution of


pornography, including theft, and online
gambling, Hacking and such as
commandeering one computer to launch
attacks on other computers, are new.
4
HISTORY
 The first recorded cyber crime took place
in the year 1820 That is not surprising
considering the fact that the ABACUS,
which is thought to be the earliest form of
a computer, has been around many years
ago In India, Japan and China…but not
officially declare…

5
CYBER THREAT EVOLUTION

6
CATEGORIZE OF CYBERCRIME
The Computer as a Target : using a computer to
attack other computers.
The computer as a
weapon : using a
computer to commit real
world crimes.

7
TYPES OF CYBER CRIME
Hacking
Denial of service attack
Virus Dissemination
Computer Vandalism
Cyber Terrorism
Software Piracy

8
HACKING
Hacking in simple terms means an illegal
intrusion into a computer system and/or network.

It is also known as CRACKING.


Government websites are the
hot targets of the hackers due
to the press/media coverage, it
receives. Hackers enjoy the
media coverage.

9
DENIAL OF SERVICE ATTACK
 Act by the criminal, who floods the bandwidth of
the victims network.
 Is his e-mail box with spam mail depriving him of
the services.

10
DEFINING CYBERCRIME
 Malicious software that attaches itself to other
software. (virus, worms, Trojan Horse, web jacking,
e-mail bombing etc.)

11
COMPUTER VANDALISM
Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism.

Transmitting virus: These are programs that attach


themselves to a file and then circulate .

12
CYBER TERRORISM
Terrorist attacks on the Internet is by distributed denial
of service attacks, hate websites and hate emails, attacks
on sensitive computer networks, etc.
Technology savvy terrorists are using 512-bit encryption,
which is impossible to decrypt…

13
SOFTWARE PIRACY
 Theft of software through the illegal copying of
genuine programs.

 Distribution of products intended to pass for the


original.

14
TYPES OF CYBER ATTACK BY
PERCENTAGE
Financial fraud: 11%
Sabotage of data/networks: 17%
Theft of proprietary information: 20%
System penetration from the outside: 25%
Denial of service: 27%
Unauthorized access by insiders: 71%
Employee abuse of internet privileges 79%
Viruses 85%
15
SAFETY TIPS FOR CYBER CRIME
 Use antivirus software’s.
 Insert firewalls.
 Uninstall unnecessary software
 Maintain backup.
 Check security settings.
 Stay anonymous - choose a genderless screen
name.
 Never give your full name or address to strangers.
 Learn more about Internet privacy.
16
CYBER SECURITY
 Internet security is a branch of computer
security specifically related to the Internet.

 It's objective is to establish rules and measure to


use against attacks over the Internet.

17
ADVANTAGES OF CYBER SECURITY
Defend us from critical attacks.
Browse the safe website.
Internet security process all the incoming and
outgoing data on our computer.

18
ADVANTAGES OF CYBER SECURITY
Security will defend from hacks and virus.
 The application of cyber security used in our PC
needs update every week.
The security developers will update their database
every week once. Hence the new virus also
deleted…

19
CONCLUSION
Technology is destructive only in the hands of
people who do not realize that they are one
and the same process as the universe.

20
ANY
QUESTION
THANK
YOU

From,

Shreyash patel
If You Want to PPT of this Subject you
can Contact me on my E-mail

pshreyash50@gmail.com

From,

Shreyash patel

You might also like