0% found this document useful (0 votes)
199 views20 pages

Overview of Cyber Crime and Security

This document discusses cyber crime and security. It defines cyber crime as illegal activity committed using computers and the internet, and traces the history and evolution of cyber threats from early viruses and hacking to modern issues like identity theft and organized crime. The document categorizes cyber crimes as those using computers as targets or weapons, and lists common types such as hacking, denial of service attacks, virus dissemination, computer vandalism, cyber terrorism, and software piracy. It provides tips for prevention including using antivirus software and firewalls. The document concludes that while technology enables crime, it is not inherently destructive and security measures can help defend against critical attacks.

Uploaded by

isha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Topics covered

  • History of Cyber Crime,
  • Malicious Programs,
  • Cyber Crime Prevention,
  • Internet Risks,
  • Online Fraud,
  • Prevention Strategies,
  • Phishing Attacks,
  • Computer Vandalism,
  • Types of Cyber Crime,
  • Cyber Safety Education
0% found this document useful (0 votes)
199 views20 pages

Overview of Cyber Crime and Security

This document discusses cyber crime and security. It defines cyber crime as illegal activity committed using computers and the internet, and traces the history and evolution of cyber threats from early viruses and hacking to modern issues like identity theft and organized crime. The document categorizes cyber crimes as those using computers as targets or weapons, and lists common types such as hacking, denial of service attacks, virus dissemination, computer vandalism, cyber terrorism, and software piracy. It provides tips for prevention including using antivirus software and firewalls. The document concludes that while technology enables crime, it is not inherently destructive and security measures can help defend against critical attacks.

Uploaded by

isha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Topics covered

  • History of Cyber Crime,
  • Malicious Programs,
  • Cyber Crime Prevention,
  • Internet Risks,
  • Online Fraud,
  • Prevention Strategies,
  • Phishing Attacks,
  • Computer Vandalism,
  • Types of Cyber Crime,
  • Cyber Safety Education

CYBER CRIME AND

SECURITY
CONTENTS
Introduction
Definition
History
Cyber threat evolution
Categories of cyber crime
Types of cyber crime
Prevention
Security
Conclusion
INTRODUCTION

The internet in India is growing rapidly. It has given rise to new


opportunities in every field we can think of be it entertainment,
business, sports or education.
There’re two sides to a coin. Internet also has it’s own
disadvantages is Cyber crime – illegal activity committed on the
internet.
DEFINING CYBER CRIME
 Crime committed using a computer and the internet to steal data
or information.
 Illegal imports.
 Malicious programs.
Cyber crime is nothing but where the computer used as an object
or subject of crime.
HISTORY

The first SPAM email took place in 1978 when it was sent out
over ARPANET.
ARPANET : Advanced Research Projects Agencies Network.
Like spam the first VIRUS was installed on an Apple Computer
in 1982.
A 16-year old student was arrested in UK in 1994 for doing
this crime.
CYBER THREAT EVOLUTION

Virus - 1977
Breaking websites - 1995
Malicious Code(Melissa) - 2000
Advanced Worm - 2003-04
Identity Theft - 2005-06
Organized Crime - 2007-08
CATEGORIZATION OF CYBER CRIME

• The computer as a Target :- Using a computer to attack other


computer, e.g. Hacking, virus/worms attacks etc.
• The computer as a Weapon :- Using a computer to commit real
world crime. E.g. cyber terrorism, credit card fraud and
pornography.
TYPES OF CYBER CRIME

 Hacking
 Denial of service attack
 Virus Dissemination
 Computer Vandalism
 Cyber Terrorism
 Software Piracy
HACKING

• Hacking in simple terms means an illegal intrusion into a computer system


and/or network.
DENIAL OF SERVICE ATTACK

 Act by the criminal, who floods the bandwidth of the victims


network.
 Is his e-mail box with spam mail depriving him of the services.
VIRUS DISSEMINATION
 Malicious software that attaches itself to other software. (virus,
worms, Trojan Horse, web jacking, e-mail bombing etc.)
COMPUTER VANDALISM
• Damaging or destroying data rather than stealing.
• Transmitting virus.
CYBER TERRORISM
 Use of Internet based attacks in terrorist activities.
 Technology savvy terrorists are using 512-bit encryption,
which is impossible to decrypt.
SOFTWARE PIRACY
 Theft of software through the illegal copying of genuine
programs.
 Distribution of products intended to pass for the original.
SAFETY TIPS FOR CYBER CRIME
 Use antivirus software’s.
 Insert firewall’s.
 Uninstall unnecessary software.
 Maintain backup.
 Check security settings.
 Stay anonymous – choose a genderless screen name.
 Never give full name or address to strangers.
 Learn more about Internet privacy.
CYBER SECURITY

Internet security is a branch of computer security specifically


related to the internet.
It’s objective is to establish rules and measure to use against
attacks over the Internet.
This Photo by Unknown Author is licensed under CC BY-SA-NC
ADVANTAGES OF CYBER SECURITY
Defend us from critical attacks.
Browse the safe website.
Internet security process all the incoming and outgoing data
on our computer.
CONCLUSION

Technology is destructive only in the hands of people who do


not realize that they are one and the same process as the
universe.
THANK YOU FOR WATCHING
OUR PRESENTAION
PEACEFULLY
PRESENTED BY :
GOPIKA RAMYA JASWANTH
DIVYA CHANDU
GURU KRISHNA VINOD KARTHIK
TRINADH

You might also like