SlideShare una empresa de Scribd logo
1 de 25
CYBER CRIME AND SECURITY
Name : MD NISHAD
Enrolment No : 12017001010006
MBA 1st Year, 2nd Semester
University of Engineering & Management,
Kolkata
What is cyber crime?
History of cyber crime
Types of cyber crime
Cyber crime in India statistics
Who are cyber criminals?
Types of hackers
Why computers vulnerable?
WannaCry Ransomware
Ways to protect yourself from cyber crime
Conclusion
WHAT IS CYBER
CRIME?
Cyber crime, or computer oriented crime, is a crime that involves a computer and a network. The computer
may have been used in the commission of a crime, or it may be the target. Cyber crime can be defined as:
"Offences that are committed against individuals or groups of individuals with a criminal motive to
intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly
or indirectly, using modern telecommunication networks such as Internet (networks including but not limited
to Chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)".
HISTORY OF CYBE
The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that
the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in
India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles
Babbage.
In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device
allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst
Jacquard's employees that their traditional employment and livelihood were being threatened. They
committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first
recorded cyber crime!
TYPES OF
CYBER CRIMEFinancial Crimes
Sale of Illegal Articles
Distributed Denial of Service Attack (DDoS)
Email Spoofing
Forgery
Hacking
FINANCIAL
CRIME
This would include cheating, credit card frauds, money laundering etc. To cite a recent case, a website offered to
sell Alphonso mangoes at a throwaway price. Distrusting such a transaction, very few people responded to or
supplied the website with their credit card numbers. These people were actually sent the Alphonso mangoes. The
word about this website now spread like wildfire. Thousands of people from all over the country responded and
ordered mangoes by providing their credit card numbers. The owners of what was later proven to be a bogus
website then fled taking the numerous credit card numbers and proceeded to spend huge amounts of money much
to the chagrin of the card owners.
This would include sale of narcotics, weapons and wildlife etc., by posting information on websites, auction
websites, and bulletin boards or simply by using email communication.
EMAIL
SPOOFING
A spoofed email is one that appears to originate from one source
but actually has been sent from another source. E.g. angel has an
e-mail address angel@angelspeaks.com. His enemy, Rex spoofs
his e-mail and sends obscene messages to all her acquaintances.
Since the e-mails appear to have originated from Angel, his
friends and business partners could take offence and relationships
could be spoiled for life.
Email spoofing can also cause monetary damage. In an American
case, a teenager made millions of dollars by spreading false
information about certain companies whose shares he had short
sold. This misinformation was spread by sending spoofed emails,
purportedly from news agencies like Reuters, to share brokers and
investors who were informed that the companies were doing very
badly. Even after the truth came out the values of the shares did
SPOOFIN
G
FORGERY
Counterfeit currency notes, postage and
revenue stamps, mark sheets etc can be
forged using sophisticated computers,
printers and scanners. These are made
using computers, and high quality
scanners and printers. In fact, this has
become a booming business involving
thousands of Pula being given to student
gangs in exchange for these bogus but
authentic looking certificates.
In simple words, hacking is an act committed by an intruder by
accessing your computer system without your permission. Hackers
(the people doing the ‘hacking’) are basically computer
programmers, who have an advanced understanding of computers
and commonly misuse this knowledge for devious reasons. They’re
usually technology buffs who have expert-level skills in one
particular software program or language. As for motives, there
could be several, but the most common are pretty simple and can
be explained by a human tendency such as greed, fame, power, etc.
Some people do it purely to show-off their expertise – ranging
from relatively harmless activities such as modifying software (and
even hardware) to carry out tasks that are outside the creator’s
intent, others just want to cause destruction.
A DDoS attack focuses on disrupting the service to a
network. Attackers send high volumes of data or
traffic through the network (i.e. making lots of
connection requests), until the network becomes
overloaded and can no longer function.
This involves the attacker using multiple computers
to send the traffic or data that will overload the
system. In many instances, a person may not even
realize that his or her computer has been hijacked
and is contributing to the DDoS attack.
The best way to prevent an additional breach is to
keep your system as secure as possible with regular
software updates, online security monitoring and
monitoring your data flow to identify any unusual or
threatening spikes in traffic before they become a
problem. DoS attacks can also be perpetrated by
simply cutting a cable or dislodging a plug that
connects your website’s server to the internet, so due
diligence in physically monitoring your connections
is recommended as well.
WHO ARE CYBER
CRIMINALS?
TYPES OF
HACKERS
Computers, despite being such high technology devices, are
extremely vulnerable. In fact it may be easier to steal
national secrets from military computers than to steal
"laddoos" from a "mithai" shop. Let us examine the
reasons for the vulnerability of computers.
 Computers store huge amounts of data in small
 Ease of access
 Complexity
 Human error
The WannaCry ransomware attack was a May 2017
worldwide cyberattack by the WannaCry ransomware
cryptoworm, which targeted computers running the
Microsoft Windows operating system by encrypting data
and demanding ransom payments in the Bitcoin crypto
currency.
The attack began on Friday, 12 May 2017, with evidence
pointing to an initial infection in Asia at 7:44am UTC.
The initial infection was likely through an exposed
vulnerable SMB port, rather than email phishing as
initially assumed. Within a day the code was reported to
have infected more than 230,000 computers in over 150
countries.
Linguistic analysis of the ransom notes indicated the
authors were likely fluent in Chinese and proficient in
English, as the versions of the notes in those languages
probably human-written while the rest seemed to be
machine-translated.
Organizations that had not installed Microsoft's
security update from April 2017 were affected by the
Experts quickly advised affected users against paying the
ransom due to no reports of people getting their data back
after payment and as high revenues would encourage more
 Encrypt your data (Important) .
 Reduce transfer of data .
 Protect your e-identity, look for https://
 Do NOT store your card details on websites .
 Got hacked??Call the right person/ lawyer /
LEA (Law Enforcement Agency) for help.
 Never Trust E-mails.
 Do not share a code received accidentally via 2 step
verification!
 Review your credit card statements.
 Crosscheck your Social-Media security settings.
 Instead of ‘Passwords’, Use ‘Passphrases’ for
Different websites.
 Secure your computer/laptop physically and by:
i. Activating your firewall.
ii. Using Anti-Virus/Anti-Malware software.
 Never upload your personal data ‘unencrypted’ to
drop box, google drive or any online file sharing
services. (Use Bitlocker)
 Restrict download.
 Do not procrastinate update installations (even the
“installing 127 of 1204” ones) !
 Wi-Fi-The most vulnerable network Ever!!
I would like to express my deepest appreciation to all those who have been a support
to me in completing this project. A special gratitude I would want to give to my ACS
(Mrs.Puja Guin) for her outstanding guidance, suggestions and all the assist in
carrying this out, nevertheless for which this project would not have been
accomplished.
I also want to thank my MD (Mr.Pinaki Prasad Roy) for his constant help and
support.
Cyber Crime and Security

Más contenido relacionado

La actualidad más candente

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

La actualidad más candente (20)

CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
cyber security
cyber securitycyber security
cyber security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
cyber crime
cyber crimecyber crime
cyber crime
 

Similar a Cyber Crime and Security

Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
Mohammad Ahmed
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 

Similar a Cyber Crime and Security (20)

Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Último (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Cyber Crime and Security

  • 1. CYBER CRIME AND SECURITY Name : MD NISHAD Enrolment No : 12017001010006 MBA 1st Year, 2nd Semester University of Engineering & Management, Kolkata
  • 2. What is cyber crime? History of cyber crime Types of cyber crime Cyber crime in India statistics Who are cyber criminals? Types of hackers Why computers vulnerable? WannaCry Ransomware Ways to protect yourself from cyber crime Conclusion
  • 3. WHAT IS CYBER CRIME? Cyber crime, or computer oriented crime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cyber crime can be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including but not limited to Chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)".
  • 4. HISTORY OF CYBE The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
  • 5. TYPES OF CYBER CRIMEFinancial Crimes Sale of Illegal Articles Distributed Denial of Service Attack (DDoS) Email Spoofing Forgery Hacking
  • 6. FINANCIAL CRIME This would include cheating, credit card frauds, money laundering etc. To cite a recent case, a website offered to sell Alphonso mangoes at a throwaway price. Distrusting such a transaction, very few people responded to or supplied the website with their credit card numbers. These people were actually sent the Alphonso mangoes. The word about this website now spread like wildfire. Thousands of people from all over the country responded and ordered mangoes by providing their credit card numbers. The owners of what was later proven to be a bogus website then fled taking the numerous credit card numbers and proceeded to spend huge amounts of money much to the chagrin of the card owners.
  • 7. This would include sale of narcotics, weapons and wildlife etc., by posting information on websites, auction websites, and bulletin boards or simply by using email communication.
  • 8. EMAIL SPOOFING A spoofed email is one that appears to originate from one source but actually has been sent from another source. E.g. angel has an e-mail address angel@angelspeaks.com. His enemy, Rex spoofs his e-mail and sends obscene messages to all her acquaintances. Since the e-mails appear to have originated from Angel, his friends and business partners could take offence and relationships could be spoiled for life. Email spoofing can also cause monetary damage. In an American case, a teenager made millions of dollars by spreading false information about certain companies whose shares he had short sold. This misinformation was spread by sending spoofed emails, purportedly from news agencies like Reuters, to share brokers and investors who were informed that the companies were doing very badly. Even after the truth came out the values of the shares did SPOOFIN G
  • 9. FORGERY Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners. These are made using computers, and high quality scanners and printers. In fact, this has become a booming business involving thousands of Pula being given to student gangs in exchange for these bogus but authentic looking certificates.
  • 10. In simple words, hacking is an act committed by an intruder by accessing your computer system without your permission. Hackers (the people doing the ‘hacking’) are basically computer programmers, who have an advanced understanding of computers and commonly misuse this knowledge for devious reasons. They’re usually technology buffs who have expert-level skills in one particular software program or language. As for motives, there could be several, but the most common are pretty simple and can be explained by a human tendency such as greed, fame, power, etc. Some people do it purely to show-off their expertise – ranging from relatively harmless activities such as modifying software (and even hardware) to carry out tasks that are outside the creator’s intent, others just want to cause destruction.
  • 11. A DDoS attack focuses on disrupting the service to a network. Attackers send high volumes of data or traffic through the network (i.e. making lots of connection requests), until the network becomes overloaded and can no longer function. This involves the attacker using multiple computers to send the traffic or data that will overload the system. In many instances, a person may not even realize that his or her computer has been hijacked and is contributing to the DDoS attack. The best way to prevent an additional breach is to keep your system as secure as possible with regular software updates, online security monitoring and monitoring your data flow to identify any unusual or threatening spikes in traffic before they become a problem. DoS attacks can also be perpetrated by simply cutting a cable or dislodging a plug that connects your website’s server to the internet, so due diligence in physically monitoring your connections is recommended as well.
  • 12.
  • 15. Computers, despite being such high technology devices, are extremely vulnerable. In fact it may be easier to steal national secrets from military computers than to steal "laddoos" from a "mithai" shop. Let us examine the reasons for the vulnerability of computers.  Computers store huge amounts of data in small  Ease of access  Complexity  Human error
  • 16.
  • 17.
  • 18. The WannaCry ransomware attack was a May 2017 worldwide cyberattack by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin crypto currency. The attack began on Friday, 12 May 2017, with evidence pointing to an initial infection in Asia at 7:44am UTC. The initial infection was likely through an exposed vulnerable SMB port, rather than email phishing as initially assumed. Within a day the code was reported to have infected more than 230,000 computers in over 150 countries. Linguistic analysis of the ransom notes indicated the authors were likely fluent in Chinese and proficient in English, as the versions of the notes in those languages probably human-written while the rest seemed to be machine-translated. Organizations that had not installed Microsoft's security update from April 2017 were affected by the Experts quickly advised affected users against paying the ransom due to no reports of people getting their data back after payment and as high revenues would encourage more
  • 19.
  • 20.
  • 21.  Encrypt your data (Important) .  Reduce transfer of data .  Protect your e-identity, look for https://  Do NOT store your card details on websites .  Got hacked??Call the right person/ lawyer / LEA (Law Enforcement Agency) for help.  Never Trust E-mails.  Do not share a code received accidentally via 2 step verification!  Review your credit card statements.  Crosscheck your Social-Media security settings.  Instead of ‘Passwords’, Use ‘Passphrases’ for Different websites.  Secure your computer/laptop physically and by: i. Activating your firewall. ii. Using Anti-Virus/Anti-Malware software.  Never upload your personal data ‘unencrypted’ to drop box, google drive or any online file sharing services. (Use Bitlocker)  Restrict download.  Do not procrastinate update installations (even the “installing 127 of 1204” ones) !  Wi-Fi-The most vulnerable network Ever!!
  • 22.
  • 23.
  • 24. I would like to express my deepest appreciation to all those who have been a support to me in completing this project. A special gratitude I would want to give to my ACS (Mrs.Puja Guin) for her outstanding guidance, suggestions and all the assist in carrying this out, nevertheless for which this project would not have been accomplished. I also want to thank my MD (Mr.Pinaki Prasad Roy) for his constant help and support.