CYBER CRIME AND
SECURITY
CONTENTS
Introduction
Definition
History
Cyber threat evolution
Categories of cyber crime
Types of cyber crime
Prevention
Security
Conclusion
INTRODUCTION
The internet in India is growing rapidly. It has given rise to new
opportunities in every field we can think of be it entertainment,
business, sports or education.
There’re two sides to a coin. Internet also has it’s own
disadvantages is Cyber crime – illegal activity committed on the
internet.
DEFINING CYBER CRIME
Crime committed using a computer and the internet to steal data
or information.
Illegal imports.
Malicious programs.
Cyber crime is nothing but where the computer used as an object
or subject of crime.
HISTORY
The first SPAM email took place in 1978 when it was sent out
over ARPANET.
ARPANET : Advanced Research Projects Agencies Network.
Like spam the first VIRUS was installed on an Apple Computer
in 1982.
A 16-year old student was arrested in UK in 1994 for doing
this crime.
CYBER THREAT EVOLUTION
Virus - 1977
Breaking websites - 1995
Malicious Code(Melissa) - 2000
Advanced Worm - 2003-04
Identity Theft - 2005-06
Organized Crime - 2007-08
CATEGORIZATION OF CYBER CRIME
• The computer as a Target :- Using a computer to attack other
computer, e.g. Hacking, virus/worms attacks etc.
• The computer as a Weapon :- Using a computer to commit real
world crime. E.g. cyber terrorism, credit card fraud and
pornography.
TYPES OF CYBER CRIME
Hacking
Denial of service attack
Virus Dissemination
Computer Vandalism
Cyber Terrorism
Software Piracy
HACKING
• Hacking in simple terms means an illegal intrusion into a computer system
and/or network.
DENIAL OF SERVICE ATTACK
Act by the criminal, who floods the bandwidth of the victims
network.
Is his e-mail box with spam mail depriving him of the services.
VIRUS DISSEMINATION
Malicious software that attaches itself to other software. (virus,
worms, Trojan Horse, web jacking, e-mail bombing etc.)
COMPUTER VANDALISM
• Damaging or destroying data rather than stealing.
• Transmitting virus.
CYBER TERRORISM
Use of Internet based attacks in terrorist activities.
Technology savvy terrorists are using 512-bit encryption,
which is impossible to decrypt.
SOFTWARE PIRACY
Theft of software through the illegal copying of genuine
programs.
Distribution of products intended to pass for the original.
SAFETY TIPS FOR CYBER CRIME
Use antivirus software’s.
Insert firewall’s.
Uninstall unnecessary software.
Maintain backup.
Check security settings.
Stay anonymous – choose a genderless screen name.
Never give full name or address to strangers.
Learn more about Internet privacy.
CYBER SECURITY
Internet security is a branch of computer security specifically
related to the internet.
It’s objective is to establish rules and measure to use against
attacks over the Internet.
This Photo by Unknown Author is licensed under CC BY-SA-NC
ADVANTAGES OF CYBER SECURITY
Defend us from critical attacks.
Browse the safe website.
Internet security process all the incoming and outgoing data
on our computer.
CONCLUSION
Technology is destructive only in the hands of people who do
not realize that they are one and the same process as the
universe.
THANK YOU FOR WATCHING
OUR PRESENTAION
PEACEFULLY
PRESENTED BY :
GOPIKA RAMYA JASWANTH
DIVYA CHANDU
GURU KRISHNA VINOD KARTHIK
TRINADH