SlideShare una empresa de Scribd logo
1 de 26
CYBER CRIME & SECURITY Presented By: S UNNY  K UMAR  A DITYA 12080088 Seminar Guide: Mr. S UDEEP  E LAYIDOM “ Your computer is the crime scene”
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object]
HISTORY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction   ,[object Object],[object Object],[object Object],[object Object]
CLASSIFICATION OF CYBERCRIME ,[object Object],[object Object],[object Object],[object Object]
COMPUTER AS A TARGET OF A CRIME ,[object Object],[object Object],[object Object],[object Object]
Computer as an instrumentality .   ,[object Object],[object Object],[object Object]
Computer as Incidental  ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Crime with Prevalence of computers.
Types of cyber crime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of cyber crime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of cyber crime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Email Bombing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Denial of Service ,[object Object],[object Object],[object Object]
 
Data Diddling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Salami Attack ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
E-mail Spoofing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Logic Bomb ,[object Object],[object Object],[object Object],[object Object],[object Object]
H4CK1NG ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What can I do? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What can I do? ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
 

Más contenido relacionado

La actualidad más candente

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security Sanguine_Eva
 
Cyber security & Cyber Crime
Cyber security & Cyber CrimeCyber security & Cyber Crime
Cyber security & Cyber CrimeVISHNUVNAIR13
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuityAlisha Korpal
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Internet security
Internet securityInternet security
Internet securityat1211
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crimeshubhravrat Deshpande
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime'sMar Soriano
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protectionsajeena81
 

La actualidad más candente (20)

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
internet security
internet securityinternet security
internet security
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Cyber security & Cyber Crime
Cyber security & Cyber CrimeCyber security & Cyber Crime
Cyber security & Cyber Crime
 
Internet security
Internet securityInternet security
Internet security
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Internet security
Internet securityInternet security
Internet security
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
New internet security
New internet securityNew internet security
New internet security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Phishing
PhishingPhishing
Phishing
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 

Destacado

Maalem Imen Kairouan03
Maalem Imen Kairouan03Maalem Imen Kairouan03
Maalem Imen Kairouan03guest2c3715
 
VietRees_Newsletter_31_Tuan3_Thang05
VietRees_Newsletter_31_Tuan3_Thang05VietRees_Newsletter_31_Tuan3_Thang05
VietRees_Newsletter_31_Tuan3_Thang05internationalvr
 
VietRees_Newsletter_30_Week2_Month05_Year08
VietRees_Newsletter_30_Week2_Month05_Year08VietRees_Newsletter_30_Week2_Month05_Year08
VietRees_Newsletter_30_Week2_Month05_Year08internationalvr
 
Budding Culture Work Samples
Budding Culture Work SamplesBudding Culture Work Samples
Budding Culture Work SamplesBudding Culture
 
VietRees_Newsletter_30_Tuan2_Thang05
VietRees_Newsletter_30_Tuan2_Thang05VietRees_Newsletter_30_Tuan2_Thang05
VietRees_Newsletter_30_Tuan2_Thang05internationalvr
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensAndrew Kohl
 
VietRees_Newsletter_53_Tuan3_Thang10
VietRees_Newsletter_53_Tuan3_Thang10VietRees_Newsletter_53_Tuan3_Thang10
VietRees_Newsletter_53_Tuan3_Thang10internationalvr
 
VietRees_Newsletter_64_Tuan1_Thang1
VietRees_Newsletter_64_Tuan1_Thang1VietRees_Newsletter_64_Tuan1_Thang1
VietRees_Newsletter_64_Tuan1_Thang1internationalvr
 
Tech integration presentation
Tech integration presentationTech integration presentation
Tech integration presentationmplibrarylady
 
Krystalite Products PVT Limited
Krystalite Products PVT LimitedKrystalite Products PVT Limited
Krystalite Products PVT Limitedaleemb
 
Presentacion Nº1 Wakoo
Presentacion Nº1 WakooPresentacion Nº1 Wakoo
Presentacion Nº1 WakooBloom
 
VietRees_Newsletter_50_Tuan4_Thang09
VietRees_Newsletter_50_Tuan4_Thang09VietRees_Newsletter_50_Tuan4_Thang09
VietRees_Newsletter_50_Tuan4_Thang09internationalvr
 
Image Digitization with Digital Photography
Image Digitization with Digital PhotographyImage Digitization with Digital Photography
Image Digitization with Digital PhotographyRachabodin Suwannakanthi
 
Experiences from Digital Archive Development
Experiences from Digital Archive DevelopmentExperiences from Digital Archive Development
Experiences from Digital Archive DevelopmentRachabodin Suwannakanthi
 
Skills In A Global Economy Paper V1.8p
Skills In A Global Economy   Paper V1.8pSkills In A Global Economy   Paper V1.8p
Skills In A Global Economy Paper V1.8pJasravee
 

Destacado (20)

Maalem Imen Kairouan03
Maalem Imen Kairouan03Maalem Imen Kairouan03
Maalem Imen Kairouan03
 
VietRees_Newsletter_31_Tuan3_Thang05
VietRees_Newsletter_31_Tuan3_Thang05VietRees_Newsletter_31_Tuan3_Thang05
VietRees_Newsletter_31_Tuan3_Thang05
 
VietRees_Newsletter_30_Week2_Month05_Year08
VietRees_Newsletter_30_Week2_Month05_Year08VietRees_Newsletter_30_Week2_Month05_Year08
VietRees_Newsletter_30_Week2_Month05_Year08
 
Budding Culture Work Samples
Budding Culture Work SamplesBudding Culture Work Samples
Budding Culture Work Samples
 
Women
WomenWomen
Women
 
Proyectosolidario.pptx
Proyectosolidario.pptxProyectosolidario.pptx
Proyectosolidario.pptx
 
VietRees_Newsletter_30_Tuan2_Thang05
VietRees_Newsletter_30_Tuan2_Thang05VietRees_Newsletter_30_Tuan2_Thang05
VietRees_Newsletter_30_Tuan2_Thang05
 
Glenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital CitizensGlenview Values Presentation - Digital Citizens
Glenview Values Presentation - Digital Citizens
 
VietRees_Newsletter_53_Tuan3_Thang10
VietRees_Newsletter_53_Tuan3_Thang10VietRees_Newsletter_53_Tuan3_Thang10
VietRees_Newsletter_53_Tuan3_Thang10
 
VietRees_Newsletter_64_Tuan1_Thang1
VietRees_Newsletter_64_Tuan1_Thang1VietRees_Newsletter_64_Tuan1_Thang1
VietRees_Newsletter_64_Tuan1_Thang1
 
Tech integration presentation
Tech integration presentationTech integration presentation
Tech integration presentation
 
Krystalite Products PVT Limited
Krystalite Products PVT LimitedKrystalite Products PVT Limited
Krystalite Products PVT Limited
 
Presentacion Nº1 Wakoo
Presentacion Nº1 WakooPresentacion Nº1 Wakoo
Presentacion Nº1 Wakoo
 
VietRees_Newsletter_50_Tuan4_Thang09
VietRees_Newsletter_50_Tuan4_Thang09VietRees_Newsletter_50_Tuan4_Thang09
VietRees_Newsletter_50_Tuan4_Thang09
 
Image Digitization with Digital Photography
Image Digitization with Digital PhotographyImage Digitization with Digital Photography
Image Digitization with Digital Photography
 
Experiences from Digital Archive Development
Experiences from Digital Archive DevelopmentExperiences from Digital Archive Development
Experiences from Digital Archive Development
 
HTML5
HTML5HTML5
HTML5
 
Skills In A Global Economy Paper V1.8p
Skills In A Global Economy   Paper V1.8pSkills In A Global Economy   Paper V1.8p
Skills In A Global Economy Paper V1.8p
 
How IP address works
How IP address worksHow IP address works
How IP address works
 
General Digital Archive Package Tool
General Digital Archive Package ToolGeneral Digital Archive Package Tool
General Digital Archive Package Tool
 

Similar a CYBER CRIME & SECURITY HISTORY, TYPES, PREVENTION

Similar a CYBER CRIME & SECURITY HISTORY, TYPES, PREVENTION (20)

Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Computer crime.pptx
Computer crime.pptxComputer crime.pptx
Computer crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

CYBER CRIME & SECURITY HISTORY, TYPES, PREVENTION

  • 1. CYBER CRIME & SECURITY Presented By: S UNNY K UMAR A DITYA 12080088 Seminar Guide: Mr. S UDEEP E LAYIDOM “ Your computer is the crime scene”
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.  
  • 16.
  • 17.  
  • 18.
  • 19.
  • 20.  
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.  
  • 26.