English Project
English Project
ᴏʙᴊᴇᴄᴛɪᴠᴇ
ᴀᴄᴛɪᴏɴ ᴘʟᴀɴ
ᴍᴀᴛᴇʀɪᴀʟ - ꜱᴄʀɪᴘᴛ
ʀᴇᴘᴏʀᴛ
ꜱᴛᴜᴅᴇɴᴛ’ꜱ ʀᴇꜰʟᴇᴄᴛɪᴏɴ
ʙɪʙʟɪᴏɢʀᴀᴘʜʏ
𝐎𝐁𝐉𝐄𝐂𝐓𝐈𝐕𝐄
2
A. WHAT IS CYBERCRIME?
Cybercrime is criminal activity that
either targets or uses a computer, a
computer network or a networked
device. Most cybercrime is committed
by cybercriminals or hackers who want
5
CYBERCRIME?
Email and internet fraud.
Identity fraud (where personal
information is stolen and used)
Theft of financial or card payment
data.
Theft and sale of corporate data.
Cyberextortion (demanding money
to prevent a threatened attack).
Ransomware attacks (a type of
cyberextortion).
6
ABOUT CYBER-CRIME?
In this tech-savvy world of 21st
century every one is engaged with
internet through WhatsApp, twitter,
Facebook, net- banking & lots of
other platforms are there.
And some criminal mined persons
commit crimes here, which is
included under cybercrime.
7
WHAT IS CYBER-CRIME?
space.
SIMPLE THEORY:
When you purchase a home, it come
with a door and a lock. you always
ensure that the door\lock exist and
working properly. You may even
purchase security systems.
Well, why would you not secure your
investments?
Likewise, your system is your home
and security tools are your door/lock.
So, if someone breaches into your
home’s(system), accesses all your
personal accounts and tempers your
data, is the criminal who is
committed the crime.
And committed crime is known as
cyber-crime.
That means more precisely we can
say that – cyber crime is an illegal
activity committed on the internet.
8
Various categories of cyber-
9
crime.
Again persons
Against property
Against person:
Against government
Against property:
humanity can hardly be overstated.
against government:
information.
software updated:
4.
Software should be
from a sender you do not know .
updated:
7.
14
Impact of cybercrime:
flaws in the system.
B. WHAT IS CYBER
of trust and reputational dam
SECURITY?
Cyber security is a technique to protect
computers, networks, programs,
personal data, etc., from unauthorized
access and threats. It is an activity by
which information and other
communication systems are protected
and defended against the unauthorized
use or modification or exploitation of
the device. Cyber security is also called
information technology security. It
includes the techniques of protecting
computers, networks, programs and
data from unauthorized access or
attacks that can cause damage to them
or exploit them in any way. Basically,
cyber security is a technical approach to
secure systems from such attacks.
16
C. HISTORY
EVOLUTION OF
CYBERCRIME:
The history of cybercrime and security
spans several decades, beginning with
the emergence of computer technology
and the internet. Here's an overview of
the key milestones in this field:
20
Expansion of Cybercrime
(2000s):
The 2000s witnessed an increase in
sophisticated cybercrime operations,
often carried out by organized criminal
groups.
Malware attacks became more
prevalent, with viruses, worms, and
Trojans infecting systems and stealing
sensitive information.
Cybercriminals targeted financial
institutions, online payment systems,
and e-commerce platforms, leading to
significant financial losses.
23
Breaches (2010s):
Ransomware attacks became a
significant threat, where malicious
software encrypts victims' files,
demanding a ransom for their release.
High-profile data breaches affecting
major corporations and institutions
exposed vast amounts of personal
information, leading to increased
concerns about privacy and
cybersecurity.
Cybercriminals targeted critical
infrastructure, such as power grids and
healthcare systems, highlighting the
potential for widespread disruption.
Current Trends:
25
Real incidents:
cybersecurity practices.
Attack (2020):
The SolarWinds attack was a highly
sophisticated supply chain attack that
targeted the software provider
SolarWinds.
The attackers compromised SolarWinds'
software development process, leading
to the distribution of a malicious
software update to thousands of
organizations, including government
agencies and Fortune 500 companies.
30