SlideShare a Scribd company logo
1 of 17
Name : Aman
Class : 11
Subject : Computer Science
Topic : Cyber Crime And Cyber Safety
Roll Number : 38
School : Kendriya Vidyalaya No. 1(Army)
Jodhpur, Rajasthan
Cyber Crime
Hacking, Eavesdropping, Phishing and Fraud Emails,
Ransomware, Preventing cyber crime
Cyber Crime
• A cybercrime is a crime that involves a computer or a computer network.
The computer may have been used in committing the crime, or it may be the
target. Cybercrime may harm someone's security or finances.
• Most Common Cyber Crime :- The most common cyber crime are email
frauds, social media frauds, banking frauds, ransomware attacks, cyber
espionage, identity theft, clickjacking, spyware, etc.
Hacking
• Hacking is the unauthorized use of or access into computers or networks by
using security vulnerabilities or bypassing usual security steps to gain access.
Criminals may hack systems or networks to steal money or information, or
simply to disrupt businesses.
• Types of Hacking :-
• Black hat hackers
• White hat hackers
• Gray hat hackers
Black Hat Hackers
• Black hat hackers are malicious hackers, sometimes called crackers. Black hats
lack ethics, sometimes violate laws, and break into computer systems with
malicious intent, and they may violate the confidentiality, integrity, or
availability of an organization's systems and data.
• Black hat hackers use phishing, malware, or other forms of attacks to steal
data or penetrate systems with malicious intent. Their motives can vary from
financial to political, or they can simply be showing off their own skills.
White Hat Hackers
• A white hat hacker or ethical hacker is an individual who uses hacking skills
to identify security vulnerabilities in hardware, software or networks.
However, unlike black hat hackers or malicious hackers white hat hackers
respect the rule of law as it applies to hacking.
• A White Hat hacker tests systems and networks by trying to break into them.
They are hackers, but their talents are being used to improve Cyber Security.
Gray Hat Hacker
• Gray hat hackers enact a blend of both black hat and white hat activities.
Gray hat hackers often look for vulnerabilities in a system without the
owner's permission or knowledge. If issues are found, they report them to
the owner, sometimes requesting a small fee to fix the problem.
• White-Hat Hackers works for the organizations and government. Black -Hat
Hackers are criminals who violate computer security for their owner's
personal gain. Gray-Hat Hackers find issues in a system without the owner's
permission.
Eavesdropping
• An eavesdropping attack, also known as a sniffing or snooping attack, is a theft of
information as it is transmitted over a network by a computer, smartphone, or another
connected device. The attack takes advantage of unsecured network communications to
access data as it is being sent or received by its user.
• Phishing attacks, weak password security, application-layer loopholes, etc., are all ways for a
hacker to gain access to sensitive information inconspicuously. At this point, the hacker can
listen in on various communication channels, steal data, and much more.
• There are two types of eavesdropping attacks; passive eavesdropping and active
eavesdropping. With passive eavesdropping, the hacker simply “listens” to data that is
passing through the network. With active eavesdropping, hackers disguise themselves.
Phishing And Fraud Emails
• Phishing attacks are the practice of sending fraudulent communications that
appear to come from a reputable source. It is usually done through email.
The goal is to steal sensitive data like credit card and login information, or to
install malware on the victim's machine.
• Example :- An email from PayPal arrives telling the victim that their account
has been compromised and will be deactivated unless they confirm their
credit card details. The link in the phishing email takes the victim to a fake
PayPal website and the stolen credit card information is used to commit
further crimes.
Ransomware
• Ransomware is a form of malware that encrypts a victim's files. The attacker
then demands a ransom from the victim to restore access to the data upon
payment. Users are shown instructions for how to pay a fee to get the
decryption key.
• Although there are countless strains of ransomware, they mainly fall into two
main types of ransomware. These are crypto-ransomware and locker
ransomware.
Preventing Cyber Crime
• Using anti-virus or a comprehensive internet security solution is a smart way
to protect your system from attacks. Anti-virus software allows you to scan,
detect and remove threats before they become a problem.
• Prevention is the key to reducing the risk of a data breach. By investing in
cybersecurity software, using a VPN, and being aware of common attack
methods, individuals and organizations can deter hackers and keep their data
private.
Cyber Safety
Safely browsing the web, Identity protection, Confidentiality,
Cyber Trolls and Bullying.
Cyber Safety
• Cyber security is the practice of defending computers, servers, mobile
devices, electronic systems, networks, and data from malicious attacks. It's
also known as information technology security or electronic information
security.
• The 3 major types of cyber security are network security, cloud security, and
physical security. Your operating systems and network architecture make up
your network security. It can include network protocols, firewalls, wireless
access points, hosts, and servers.
Safely Browsing The Web
Secure browsing involves the use of special security architecture to allow for
Web browsing that is more protected from various kinds of cyberattacks.
Secure browsing is a phenomenon supported by different types of tools
offered by the makers of Web browsers and other technology companies.
Identity Protection
Never share your password or account numbers over an e-mail or instant
message. Do not follow links from e-mails when conducting financial
transactions; instead, enter the URL yourself. Be wary of callers, pop-ups,
websites, or e-mails asking for personal information.
Confidentiality
Confidentiality means respecting someone's privacy, and abstaining from
sharing personal or potentially sensitive information about an individual,
especially if that information has been shared in confidence.
Cyber Trolls And Bullying
An internet troll, or online bully, deliberately tries to offend, cause trouble or
directly attack people by posting derogatory comments on Facebook posts,
blogs, under YouTube videos, on forums and other social media, such as
Twitter and Instagram.

More Related Content

What's hot

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Phishing
PhishingPhishing
Phishing
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Hacking
Hacking Hacking
Hacking
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 

Similar to Cyber Crime And Cyber Safety Project.pptx

Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 

Similar to Cyber Crime And Cyber Safety Project.pptx (20)

CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
HACKING
HACKINGHACKING
HACKING
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Hacking
HackingHacking
Hacking
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 

Recently uploaded

Recently uploaded (20)

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Cyber Crime And Cyber Safety Project.pptx

  • 1. Name : Aman Class : 11 Subject : Computer Science Topic : Cyber Crime And Cyber Safety Roll Number : 38 School : Kendriya Vidyalaya No. 1(Army) Jodhpur, Rajasthan
  • 2. Cyber Crime Hacking, Eavesdropping, Phishing and Fraud Emails, Ransomware, Preventing cyber crime
  • 3. Cyber Crime • A cybercrime is a crime that involves a computer or a computer network. The computer may have been used in committing the crime, or it may be the target. Cybercrime may harm someone's security or finances. • Most Common Cyber Crime :- The most common cyber crime are email frauds, social media frauds, banking frauds, ransomware attacks, cyber espionage, identity theft, clickjacking, spyware, etc.
  • 4. Hacking • Hacking is the unauthorized use of or access into computers or networks by using security vulnerabilities or bypassing usual security steps to gain access. Criminals may hack systems or networks to steal money or information, or simply to disrupt businesses. • Types of Hacking :- • Black hat hackers • White hat hackers • Gray hat hackers
  • 5. Black Hat Hackers • Black hat hackers are malicious hackers, sometimes called crackers. Black hats lack ethics, sometimes violate laws, and break into computer systems with malicious intent, and they may violate the confidentiality, integrity, or availability of an organization's systems and data. • Black hat hackers use phishing, malware, or other forms of attacks to steal data or penetrate systems with malicious intent. Their motives can vary from financial to political, or they can simply be showing off their own skills.
  • 6. White Hat Hackers • A white hat hacker or ethical hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks. However, unlike black hat hackers or malicious hackers white hat hackers respect the rule of law as it applies to hacking. • A White Hat hacker tests systems and networks by trying to break into them. They are hackers, but their talents are being used to improve Cyber Security.
  • 7. Gray Hat Hacker • Gray hat hackers enact a blend of both black hat and white hat activities. Gray hat hackers often look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem. • White-Hat Hackers works for the organizations and government. Black -Hat Hackers are criminals who violate computer security for their owner's personal gain. Gray-Hat Hackers find issues in a system without the owner's permission.
  • 8. Eavesdropping • An eavesdropping attack, also known as a sniffing or snooping attack, is a theft of information as it is transmitted over a network by a computer, smartphone, or another connected device. The attack takes advantage of unsecured network communications to access data as it is being sent or received by its user. • Phishing attacks, weak password security, application-layer loopholes, etc., are all ways for a hacker to gain access to sensitive information inconspicuously. At this point, the hacker can listen in on various communication channels, steal data, and much more. • There are two types of eavesdropping attacks; passive eavesdropping and active eavesdropping. With passive eavesdropping, the hacker simply “listens” to data that is passing through the network. With active eavesdropping, hackers disguise themselves.
  • 9. Phishing And Fraud Emails • Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victim's machine. • Example :- An email from PayPal arrives telling the victim that their account has been compromised and will be deactivated unless they confirm their credit card details. The link in the phishing email takes the victim to a fake PayPal website and the stolen credit card information is used to commit further crimes.
  • 10. Ransomware • Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment. Users are shown instructions for how to pay a fee to get the decryption key. • Although there are countless strains of ransomware, they mainly fall into two main types of ransomware. These are crypto-ransomware and locker ransomware.
  • 11. Preventing Cyber Crime • Using anti-virus or a comprehensive internet security solution is a smart way to protect your system from attacks. Anti-virus software allows you to scan, detect and remove threats before they become a problem. • Prevention is the key to reducing the risk of a data breach. By investing in cybersecurity software, using a VPN, and being aware of common attack methods, individuals and organizations can deter hackers and keep their data private.
  • 12. Cyber Safety Safely browsing the web, Identity protection, Confidentiality, Cyber Trolls and Bullying.
  • 13. Cyber Safety • Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. • The 3 major types of cyber security are network security, cloud security, and physical security. Your operating systems and network architecture make up your network security. It can include network protocols, firewalls, wireless access points, hosts, and servers.
  • 14. Safely Browsing The Web Secure browsing involves the use of special security architecture to allow for Web browsing that is more protected from various kinds of cyberattacks. Secure browsing is a phenomenon supported by different types of tools offered by the makers of Web browsers and other technology companies.
  • 15. Identity Protection Never share your password or account numbers over an e-mail or instant message. Do not follow links from e-mails when conducting financial transactions; instead, enter the URL yourself. Be wary of callers, pop-ups, websites, or e-mails asking for personal information.
  • 16. Confidentiality Confidentiality means respecting someone's privacy, and abstaining from sharing personal or potentially sensitive information about an individual, especially if that information has been shared in confidence.
  • 17. Cyber Trolls And Bullying An internet troll, or online bully, deliberately tries to offend, cause trouble or directly attack people by posting derogatory comments on Facebook posts, blogs, under YouTube videos, on forums and other social media, such as Twitter and Instagram.