Más contenido relacionado


Cyber Crime And Cyber Safety Project.pptx

  1. Name : Aman Class : 11 Subject : Computer Science Topic : Cyber Crime And Cyber Safety Roll Number : 38 School : Kendriya Vidyalaya No. 1(Army) Jodhpur, Rajasthan
  2. Cyber Crime Hacking, Eavesdropping, Phishing and Fraud Emails, Ransomware, Preventing cyber crime
  3. Cyber Crime • A cybercrime is a crime that involves a computer or a computer network. The computer may have been used in committing the crime, or it may be the target. Cybercrime may harm someone's security or finances. • Most Common Cyber Crime :- The most common cyber crime are email frauds, social media frauds, banking frauds, ransomware attacks, cyber espionage, identity theft, clickjacking, spyware, etc.
  4. Hacking • Hacking is the unauthorized use of or access into computers or networks by using security vulnerabilities or bypassing usual security steps to gain access. Criminals may hack systems or networks to steal money or information, or simply to disrupt businesses. • Types of Hacking :- • Black hat hackers • White hat hackers • Gray hat hackers
  5. Black Hat Hackers • Black hat hackers are malicious hackers, sometimes called crackers. Black hats lack ethics, sometimes violate laws, and break into computer systems with malicious intent, and they may violate the confidentiality, integrity, or availability of an organization's systems and data. • Black hat hackers use phishing, malware, or other forms of attacks to steal data or penetrate systems with malicious intent. Their motives can vary from financial to political, or they can simply be showing off their own skills.
  6. White Hat Hackers • A white hat hacker or ethical hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks. However, unlike black hat hackers or malicious hackers white hat hackers respect the rule of law as it applies to hacking. • A White Hat hacker tests systems and networks by trying to break into them. They are hackers, but their talents are being used to improve Cyber Security.
  7. Gray Hat Hacker • Gray hat hackers enact a blend of both black hat and white hat activities. Gray hat hackers often look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem. • White-Hat Hackers works for the organizations and government. Black -Hat Hackers are criminals who violate computer security for their owner's personal gain. Gray-Hat Hackers find issues in a system without the owner's permission.
  8. Eavesdropping • An eavesdropping attack, also known as a sniffing or snooping attack, is a theft of information as it is transmitted over a network by a computer, smartphone, or another connected device. The attack takes advantage of unsecured network communications to access data as it is being sent or received by its user. • Phishing attacks, weak password security, application-layer loopholes, etc., are all ways for a hacker to gain access to sensitive information inconspicuously. At this point, the hacker can listen in on various communication channels, steal data, and much more. • There are two types of eavesdropping attacks; passive eavesdropping and active eavesdropping. With passive eavesdropping, the hacker simply “listens” to data that is passing through the network. With active eavesdropping, hackers disguise themselves.
  9. Phishing And Fraud Emails • Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victim's machine. • Example :- An email from PayPal arrives telling the victim that their account has been compromised and will be deactivated unless they confirm their credit card details. The link in the phishing email takes the victim to a fake PayPal website and the stolen credit card information is used to commit further crimes.
  10. Ransomware • Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment. Users are shown instructions for how to pay a fee to get the decryption key. • Although there are countless strains of ransomware, they mainly fall into two main types of ransomware. These are crypto-ransomware and locker ransomware.
  11. Preventing Cyber Crime • Using anti-virus or a comprehensive internet security solution is a smart way to protect your system from attacks. Anti-virus software allows you to scan, detect and remove threats before they become a problem. • Prevention is the key to reducing the risk of a data breach. By investing in cybersecurity software, using a VPN, and being aware of common attack methods, individuals and organizations can deter hackers and keep their data private.
  12. Cyber Safety Safely browsing the web, Identity protection, Confidentiality, Cyber Trolls and Bullying.
  13. Cyber Safety • Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. • The 3 major types of cyber security are network security, cloud security, and physical security. Your operating systems and network architecture make up your network security. It can include network protocols, firewalls, wireless access points, hosts, and servers.
  14. Safely Browsing The Web Secure browsing involves the use of special security architecture to allow for Web browsing that is more protected from various kinds of cyberattacks. Secure browsing is a phenomenon supported by different types of tools offered by the makers of Web browsers and other technology companies.
  15. Identity Protection Never share your password or account numbers over an e-mail or instant message. Do not follow links from e-mails when conducting financial transactions; instead, enter the URL yourself. Be wary of callers, pop-ups, websites, or e-mails asking for personal information.
  16. Confidentiality Confidentiality means respecting someone's privacy, and abstaining from sharing personal or potentially sensitive information about an individual, especially if that information has been shared in confidence.
  17. Cyber Trolls And Bullying An internet troll, or online bully, deliberately tries to offend, cause trouble or directly attack people by posting derogatory comments on Facebook posts, blogs, under YouTube videos, on forums and other social media, such as Twitter and Instagram.