SlideShare una empresa de Scribd logo
1 de 16
Presentation on Cyber Crime 
By: Ratnesh Sharma {MCA 5th Semester}
• INTRODUCTION. 
• HISTORY OF CYBER CRIME. 
• CATEGORIES OF CYBER CRIME. 
• WORLDS TOP 10 CYBER CRIMES. 
• TYEPS OF CYBER CRIME. 
• CYBER SECURITY. 
• SAFETY TIPS TO CYBER CRIME. 
• CONCLUSION.
• Cyber crime is an activity done using 
computers and internet. We can say that it is an 
unlawful acts wherein the computer either a 
tool or target or both. 
• It Harms the reputation of the victim or cause 
physical or mental harm to the victim directly or 
indirectly , 
• Its don using modern telecommunication 
networks such as Internet (Chat rooms, 
emails, notice boards and groups) and 
mobile phones (SMS/MMS)
• The first recorded cyber crime took place in 1820. 
• The first spam email took place in 1976 when it was 
sent out over the ARPANT(Advanced Research 
Projects Agency Network ). 
• The first virus was installed on an Apple computer in 
1982 when a high school student, Rich skrenta, 
developed the EIK Cloner.
• We can categorize cyber crime in two ways. 
• The computer as a target :- 
using a computer to attacks other computer, e.g. 
Hacking, virus/worms attacks, Dos attack etc. 
• The computer as a weapon :- 
using a computer to commit real world crime e.g. 
cyber terrorism, credit card fraud and pornography etc.
World top 10 cyber crimes……….
TYPES OF CYBER CRIME
HACKING :- Hacking in simple terms means an illegal access of 
information from a computer system or network . 
• It is also known as CRACKING. 
• Government websites are the hot target of the hackers due to 
the press coverage, it receives. Hackers enjoy the media 
coverage. 
Motive behind the crime called HACKERS 
Motive behind the crime called hacking greed power, publicity, 
revenge etc.
Theft : 
This crime occurs when a person violates copyrights and 
downloads music, movies, games and software. 
Identity Theft: 
In this cyber crime, a criminal accesses data about a person’s 
bank account, credit cards, Social Security, debit card .etc
VIRUS attack : 
• Malicious software that attaches itself to other software. 
• VIRUS , 
• WORMS, 
• TROJAN HORSE , 
• WEB JACKING, 
• E-MAIL BOMBING etc. 
Computer Vandalism: 
• Damaging or destroying data rather than stealing or misusing 
them is called cyber vandalism. 
• These are program that attach themselves to a file and then 
circulate.
Cyber terrorism: 
• Terrorist attacks on the Internet is by distributed denial of service 
attacks, hate websites and hate E-mails , attacks on service 
network etc. 
• Software piracy: 
• Stilling of software through the illegal copying of genuine 
programs. 
• For exp: patch programs ,crack keys. Etc.
Cyber Security : 
Cyber Security involves protection of sensitive personal 
and business information through prevention, detection and 
response to different online attacks. 
Privacy Policy : 
Before submitting your name , e-mail , address, on a website 
look for the sites privacy policy. 
Keep Software Up to Date: 
. Use good password which will be difficult for thieves to 
guess. Do not choose option that allows your computer to 
remember your passwords.
• Use antivirus Software 
• Insert Firewalls 
• Uninstall unnecessary software 
• Maintain backup 
• Check security settings
• As we see that cyber crimes grows at high rate in the world so we 
have to strictly control the ability of unauthorized access of information 
on the wed . 
• In fact , it is highly likely that cyber crime and its hackers will continue 
developing and upgrading to stay ahead of the law. 
• So, to make us a safer we must need cyber security.
Cybercrime

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Internet security
Internet securityInternet security
Internet security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 

Destacado

Crime show
Crime showCrime show
Crime showA K Deep
 
Criminal justice major
Criminal justice major Criminal justice major
Criminal justice major Madhan Raj
 
Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrimeAryan Ajmer
 
The wonders of studying Italian.
The wonders of studying Italian.The wonders of studying Italian.
The wonders of studying Italian.ThirdYearAbroad.com
 
Some characteristics of educational system in municipality grude
Some characteristics of educational system in municipality grude Some characteristics of educational system in municipality grude
Some characteristics of educational system in municipality grude Livia Dobrescu
 
Sat act powerpoint
Sat act powerpointSat act powerpoint
Sat act powerpointlcg22
 
Exams, are they really necessary, final exam, assessments
Exams, are they really necessary, final exam, assessmentsExams, are they really necessary, final exam, assessments
Exams, are they really necessary, final exam, assessmentsgiselle_watts
 
Erwc period 2 bullying powerpoint melissa and ashly new conclusion
Erwc period 2 bullying powerpoint melissa and ashly new conclusionErwc period 2 bullying powerpoint melissa and ashly new conclusion
Erwc period 2 bullying powerpoint melissa and ashly new conclusionkcurranlitlover
 
The role of homework in education
The role of homework in educationThe role of homework in education
The role of homework in educationJiayi_Liu
 
Benefit of Homework
Benefit of HomeworkBenefit of Homework
Benefit of HomeworkMeiya Ma
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpointgmtango
 
School Organisation
School OrganisationSchool Organisation
School OrganisationSapphirexox
 
Examination and Evaluation
Examination and EvaluationExamination and Evaluation
Examination and Evaluationjagannath Dange
 
The Importance Of Getting A Good Night's Sleep
The Importance Of Getting A Good Night's SleepThe Importance Of Getting A Good Night's Sleep
The Importance Of Getting A Good Night's SleepNathan Young
 
Everything You Need to Know About the NEW SAT
Everything You Need to Know About the NEW SATEverything You Need to Know About the NEW SAT
Everything You Need to Know About the NEW SATLA Tutors 123
 

Destacado (20)

Crime show
Crime showCrime show
Crime show
 
Crime Shows Genre
Crime Shows GenreCrime Shows Genre
Crime Shows Genre
 
Criminal justice major
Criminal justice major Criminal justice major
Criminal justice major
 
Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrime
 
The wonders of studying Italian.
The wonders of studying Italian.The wonders of studying Italian.
The wonders of studying Italian.
 
Ppt Italian
Ppt ItalianPpt Italian
Ppt Italian
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Some characteristics of educational system in municipality grude
Some characteristics of educational system in municipality grude Some characteristics of educational system in municipality grude
Some characteristics of educational system in municipality grude
 
Sat act powerpoint
Sat act powerpointSat act powerpoint
Sat act powerpoint
 
Keep Walking Never Give-up!!!!
Keep Walking Never Give-up!!!!Keep Walking Never Give-up!!!!
Keep Walking Never Give-up!!!!
 
Exams, are they really necessary, final exam, assessments
Exams, are they really necessary, final exam, assessmentsExams, are they really necessary, final exam, assessments
Exams, are they really necessary, final exam, assessments
 
Erwc period 2 bullying powerpoint melissa and ashly new conclusion
Erwc period 2 bullying powerpoint melissa and ashly new conclusionErwc period 2 bullying powerpoint melissa and ashly new conclusion
Erwc period 2 bullying powerpoint melissa and ashly new conclusion
 
The role of homework in education
The role of homework in educationThe role of homework in education
The role of homework in education
 
Benefit of Homework
Benefit of HomeworkBenefit of Homework
Benefit of Homework
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpoint
 
School Organisation
School OrganisationSchool Organisation
School Organisation
 
Examination and Evaluation
Examination and EvaluationExamination and Evaluation
Examination and Evaluation
 
Stalking PowerPoint
Stalking PowerPointStalking PowerPoint
Stalking PowerPoint
 
The Importance Of Getting A Good Night's Sleep
The Importance Of Getting A Good Night's SleepThe Importance Of Getting A Good Night's Sleep
The Importance Of Getting A Good Night's Sleep
 
Everything You Need to Know About the NEW SAT
Everything You Need to Know About the NEW SATEverything You Need to Know About the NEW SAT
Everything You Need to Know About the NEW SAT
 

Similar a Cybercrime

Similar a Cybercrime (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 

Último

Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 

Último (20)

young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 

Cybercrime

  • 1. Presentation on Cyber Crime By: Ratnesh Sharma {MCA 5th Semester}
  • 2. • INTRODUCTION. • HISTORY OF CYBER CRIME. • CATEGORIES OF CYBER CRIME. • WORLDS TOP 10 CYBER CRIMES. • TYEPS OF CYBER CRIME. • CYBER SECURITY. • SAFETY TIPS TO CYBER CRIME. • CONCLUSION.
  • 3. • Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both. • It Harms the reputation of the victim or cause physical or mental harm to the victim directly or indirectly , • Its don using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)
  • 4. • The first recorded cyber crime took place in 1820. • The first spam email took place in 1976 when it was sent out over the ARPANT(Advanced Research Projects Agency Network ). • The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 5. • We can categorize cyber crime in two ways. • The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. • The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
  • 6. World top 10 cyber crimes……….
  • 8. HACKING :- Hacking in simple terms means an illegal access of information from a computer system or network . • It is also known as CRACKING. • Government websites are the hot target of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motive behind the crime called HACKERS Motive behind the crime called hacking greed power, publicity, revenge etc.
  • 9. Theft : This crime occurs when a person violates copyrights and downloads music, movies, games and software. Identity Theft: In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card .etc
  • 10. VIRUS attack : • Malicious software that attaches itself to other software. • VIRUS , • WORMS, • TROJAN HORSE , • WEB JACKING, • E-MAIL BOMBING etc. Computer Vandalism: • Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. • These are program that attach themselves to a file and then circulate.
  • 11. Cyber terrorism: • Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails , attacks on service network etc. • Software piracy: • Stilling of software through the illegal copying of genuine programs. • For exp: patch programs ,crack keys. Etc.
  • 12.
  • 13. Cyber Security : Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks. Privacy Policy : Before submitting your name , e-mail , address, on a website look for the sites privacy policy. Keep Software Up to Date: . Use good password which will be difficult for thieves to guess. Do not choose option that allows your computer to remember your passwords.
  • 14. • Use antivirus Software • Insert Firewalls • Uninstall unnecessary software • Maintain backup • Check security settings
  • 15. • As we see that cyber crimes grows at high rate in the world so we have to strictly control the ability of unauthorized access of information on the wed . • In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. • So, to make us a safer we must need cyber security.