SlideShare uma empresa Scribd logo
1 de 16
Computer Science & Engineering
(4th Semester)
Cyber crime
Presented by:-
Anchit Singh
Computer Science and Engineering
6th Semester
Contents
INTRODUCTION(What is cyber crime ?)
HISTORY OF CYBER CRIME
CATEGORIES OF CYBER CRIME
TYEPS OF CYBER CRIME
CYBER SECURITY
ADVANTAGES OF CYBER SECURITY
SAFETY TIPS TO CYBER CRIME
CYBER ATTACKS STATISTICS
CONCLUSION
What is Cyber Crime…???
Cybercrime is nothing but where
the
computer used as an object or
subject
of Crime
Example:- Hacking of Computer
HISTORY OF CYBER CRIME
 The first recorded cyber crime took place in 1820.
 That is not surprising considering the fact that the
abacus, which is thought to be the earliest from of a
computer, has been around since 3500 B.c.
 In India, Japan and China, the era of modern computer, however, began with the analytical engine
of Charles Babbage.
 The first spam email took place in 1976 when it was sent out over the ARPANT.
 The first virus was installed on an Apple computer in 1982 when a high school student, Rich
skrenta, developed the EIK Cloner.
Categories of cyber crime
The Computer as a target
Example:- Hacking, Dos attack and
Virus attacks etc.
The Computer as a weapon
Example:- Credit card fraud, Cyber
terrorism and Pornography etc.
TYPES OF CYBER CRIME
 HACKING
 CYBER TERRORISM
 DENIAL OF SERVICE ATTACKS
Hacking
Website Hacking
ATM Hacking
System Hacking
Mobile Hacking
Types of cyber crime
Cyber Terrorism
Terrorist attacks on the
internet is by distributed denial of
service attacks, hate websites and
hate E-mails, attacks on service
network etc.
DENIAL OF SERVICE ATTACKS
Types of cyber crime
DENIAL OF SERVICE ATTACKS : This is an act by the criminals who floods the
bandwidth of the victims network or fills his E-mail box with spam mail depriving
him of the service he is entitled to access or provide. Many DOS attacks, such as
the ping of death and Tear drop attacks.
VIRUS DISSMINITION : Malicious software that attaches itself to other software.
VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING etc.
COMPUTER VANDALISM : Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism. These are program that attach
themselves to a file and then circulate.
Cyber security
Cyber security preventing the
different online attack to
sensitive personal and business
information
Privacy Policy:-
Before submitting your
personal information, on
website look for the sites
privacy policy.
Keep Software Up to
Date ,
For better security
from Hackers
ADVANTAGES OF CYBER SECURITY
 The cyber security will defend us from
critical attacks.
 It helps us to browse the site, website.
 Internet Security process all the
incoming and outgoing data on your
computer.
 It will defend us from hacks and virus.
 Application of cyber security used in
our PC needs update every week
SAFETY TIPS TO CYBER CRIME
ANTIVIRUS
BACKUP
INSERT FIREWALL
CHECK SECURITY SETTINGS
Cyber attack statistics(2013)
Cyber Crime & Security
Cyber Crime & Security

Mais conteúdo relacionado

Mais procurados

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

Mais procurados (20)

Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Ppt
PptPpt
Ppt
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 

Destaque

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
june21harsh
 
The evolution of_android
The evolution of_androidThe evolution of_android
The evolution of_android
generalvee
 

Destaque (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 
Cybercrimeppt
Cybercrimeppt Cybercrimeppt
Cybercrimeppt
 
9 studi kasus-cyber-crime(1)
9 studi kasus-cyber-crime(1)9 studi kasus-cyber-crime(1)
9 studi kasus-cyber-crime(1)
 
The evolution of_android
The evolution of_androidThe evolution of_android
The evolution of_android
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
 

Semelhante a Cyber Crime & Security

cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
Kira Dess
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
JatinRajput67
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
 

Semelhante a Cyber Crime & Security (20)

Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 

Último

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 

Último (20)

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 

Cyber Crime & Security

  • 1. Computer Science & Engineering (4th Semester) Cyber crime Presented by:- Anchit Singh Computer Science and Engineering 6th Semester
  • 2. Contents INTRODUCTION(What is cyber crime ?) HISTORY OF CYBER CRIME CATEGORIES OF CYBER CRIME TYEPS OF CYBER CRIME CYBER SECURITY ADVANTAGES OF CYBER SECURITY SAFETY TIPS TO CYBER CRIME CYBER ATTACKS STATISTICS CONCLUSION
  • 3.
  • 4. What is Cyber Crime…??? Cybercrime is nothing but where the computer used as an object or subject of Crime Example:- Hacking of Computer
  • 5. HISTORY OF CYBER CRIME  The first recorded cyber crime took place in 1820.  That is not surprising considering the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c.  In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage.  The first spam email took place in 1976 when it was sent out over the ARPANT.  The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 6. Categories of cyber crime The Computer as a target Example:- Hacking, Dos attack and Virus attacks etc. The Computer as a weapon Example:- Credit card fraud, Cyber terrorism and Pornography etc.
  • 7. TYPES OF CYBER CRIME  HACKING  CYBER TERRORISM  DENIAL OF SERVICE ATTACKS
  • 8. Hacking Website Hacking ATM Hacking System Hacking Mobile Hacking Types of cyber crime
  • 9. Cyber Terrorism Terrorist attacks on the internet is by distributed denial of service attacks, hate websites and hate E-mails, attacks on service network etc.
  • 10. DENIAL OF SERVICE ATTACKS Types of cyber crime DENIAL OF SERVICE ATTACKS : This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many DOS attacks, such as the ping of death and Tear drop attacks. VIRUS DISSMINITION : Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING etc. COMPUTER VANDALISM : Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.
  • 11. Cyber security Cyber security preventing the different online attack to sensitive personal and business information Privacy Policy:- Before submitting your personal information, on website look for the sites privacy policy. Keep Software Up to Date , For better security from Hackers
  • 12. ADVANTAGES OF CYBER SECURITY  The cyber security will defend us from critical attacks.  It helps us to browse the site, website.  Internet Security process all the incoming and outgoing data on your computer.  It will defend us from hacks and virus.  Application of cyber security used in our PC needs update every week
  • 13. SAFETY TIPS TO CYBER CRIME ANTIVIRUS BACKUP INSERT FIREWALL CHECK SECURITY SETTINGS