cyber crime and security presentation

26
CYBER CRIME AND SECURITY

Upload: preethi-kumaresh

Post on 09-Apr-2017

324 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Cyber Crime and Security Presentation

CYBER CRIME AND SECURITY

Page 2: Cyber Crime and Security Presentation
Page 3: Cyber Crime and Security Presentation

CONTENTS Introduction Definition History Categories of Cyber crime Types of Cyber crime Case Studies Statistical Report Prevention Security Conclusion

Page 4: Cyber Crime and Security Presentation

INTRODUCTION TO CYBER CRIME The Internet in India is growing rapidly. It has given rise to new opportunities in every field such as entertainment , business , education or sports.

There are two sides to a coin. INTERNET also has its disadvantages like CYBER CRIME – Illegal activity committed on the Internet.

Page 5: Cyber Crime and Security Presentation

What is a Cyber Crime?

DEFINITION :

Crime committed using a Computer and the Internet to steal Data or Information. Illegal imports Malicious programs

Page 6: Cyber Crime and Security Presentation

HISTORY The first SPAM email took place in 1978 when it was sent out over ARPANET. ARPANET : Advanced Research Projects Agency Network Like spam the first VIRUS was installed on an Apple Computer in 1982. A 16-year old student was arrested in UK in 1994 for doing this crime.

Page 7: Cyber Crime and Security Presentation
Page 8: Cyber Crime and Security Presentation

CATEGORIES OF CYBER CRIME

The computer as a target

The computer as a weapon

Page 9: Cyber Crime and Security Presentation

TYPES OF CYBER CRIME Hacking Identity theft Malicious software Computer vandalism Cyber terrorism Software piracy

Page 10: Cyber Crime and Security Presentation

HACKING• Hacking in simple terms means an illegal intrusion into a computer system or network.• In many organizations they have to check their Internet security protection. If not the hacking criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location.

Page 11: Cyber Crime and Security Presentation

IDENTITY THEFT• This has become a major problem with people using the Internet for cash transactions and banking services. • In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name.• It can result in major financial losses for the victim and even spoil the victim’s credit history.

Page 12: Cyber Crime and Security Presentation

VIRUS DISSEMINATION• Malicious software that attaches itself to other software. (Virus, worms, Trojan Horse , web-jacking, email bombing etc)• This type of software's employed for you to gain access to a system for you to take delicate information or even data or even triggering the destruction of software program contained in the machine.

Page 13: Cyber Crime and Security Presentation

COMPUTER VANDALISM Damaging or destroying the data rather than stealing or misusing. Transmitting virus.

Page 14: Cyber Crime and Security Presentation

CYBER TERRORISM• Use of internet based attacks in terrorists activities against computers/networks with the intension of causing harm.• Cyber terrorism can also include attacks on Internet business, but when this is done for economic motivations rather than ideological.

Page 15: Cyber Crime and Security Presentation

SOFTWARE PIRACYSoftware piracy is the unauthorized or illegal copying, distribution, or use of software. It is such a profitable “Business" that it has caught the attention of organized crime groups in a number of countries.

Page 16: Cyber Crime and Security Presentation

CASE STUDIE1. CREATING FAKE PROFILE : Fake Profiles use

is common in Students. Many cases have been registered against Fake Profiles in Cyber Cell.

2. PASSWORD HACKING : Students are taking cyber crimes just for fun or carrying out small acts such as password hacking to revenge on their teachers , friends in schools an also Morphing pictures and posting them on social networking sites to defame others.

Page 17: Cyber Crime and Security Presentation

3. PHISHING: Phishing is the act of attempting to acquire information such as username, passwords and credit card details. Phishing emails may contain links to the websites that are infected with malware.

4. Resent News where Government is taking Action Against Websites Spreading Hatred : Terrorist Originations like Al-Qaeeda, ISIS and Boko Haram have been making use of the Social Media creating hatred and divide.

Page 18: Cyber Crime and Security Presentation

STATISTICAL REPORT

Page 19: Cyber Crime and Security Presentation

PENDING CASES REGISTREDED IN CYBER CRIME REPORT

2011 2012 2013 2014 20151791 2879

5693

962211292

Pending cases across country

Page 20: Cyber Crime and Security Presentation

SAFETY TIPS FOR CYBER CRIMEo Use Anti-virus software.o Insert Firewalls.o Uninstall unnecessary softwareo Maintain Backupo Check security settingso Stay Anonymous - choose a genderless screen name.o Never give your full name or address to strangers.o Learn more about Internet Privacy.

Page 21: Cyber Crime and Security Presentation
Page 22: Cyber Crime and Security Presentation

CYBER SECURITY Internet security is a branch of computer security

specifically related to the internet. Its objective is to establish rules and measures to use

against attacks over the internet.

Page 23: Cyber Crime and Security Presentation

ADVANTAGES OF CYBER SECURITY Defend us from Critical Attacks. Browses the safe websites. Internet security process in all the incoming and

outgoing data on our computer.

Page 24: Cyber Crime and Security Presentation

CONCLUSION Technology is destructive only in the hands of people

who do not realize that they are the one and the same process as the universe.

Page 25: Cyber Crime and Security Presentation

Presented by,Sri VidhyaBhagya LakshmiSaranyaSoundaryaPoojaaKiruthikaPriyamahalakshmiPreethiValli ammaiSrinidhi

Page 26: Cyber Crime and Security Presentation

Thank you for watching our presentation peacefully