SlideShare uma empresa Scribd logo
1 de 15
Cyber crime and
security
This Photo by Unknown author is licensed under CC BY-ND.
BY:- Parul Singla And Indra Mohan Khatri
Content
Introduction
History of cyber crime
Categories of cyber crime
Types of cyber crime
Advantage of cyber Security
Cyber law Of India
Conclusion
Bibiliography
Introducti
on
• Cybercrime is criminal activity
that either targets or uses a
computer, a computer network or
a networked device. Most
cybercrime is committed by
cybercriminals or hackers who
want to make money. However,
occasionally cybercrime aims to
damage computers or networks
for reasons other than profit.
History of cyber crime
1834 – A couple of robbers hack the
French Telegraph System and steal
information from the stock market,
essentially carrying out the first
cyberattack in the world.
1878 – Early Mobile Calls-The Bell
Telephone Company boots a group
of young boys off the telephone grid
in New York for repeatedly and
purposely misdirecting and
disconnecting customer calls two
years after Alexander Graham Bell
invented the machine.
1957– Joe Engressia, a blind, 7-year-
old boy with perfect pitch, hears a
high-pitched whistle on a phone line
and begins to whistle along to it at a
2600Hz speed, helping him
communicate with phone lines and
becoming the United States’ first
phone hacker.
Source : Wikip
Categori
es of
cyber
crime
There are three
major categories
that cybercrime
falls into:
Individual :-This is
similar to a real-life
instance of a
criminal illegally
possessing an
individual’s bank or
credit card details.
Property :-This
category of
cybercrime involves
one individual
distributing
malicious or illegal
information online.
Government :-This
is the least common
cybercrime, but is
the most serious
offense. A crime
against the
government is also
known as cyber
terrorism.
Types of cyber crime
DDoS Attacks Botnets Cyberstalking Phishing
Prohibited/Illegal
Content
Online Scams Exploit Kits
Ddos attack
A distributed denial-of-service
(DDoS) attack targets websites and
servers by disrupting network
services. A DDoS attack attempts to
exhaust an application’s resources.
The perpetrators behind these
attacks flood a site with errant
traffic, resulting in poor website
functionality or knocking it offline
altogether.
Recent Case - Over Watch 2
Online
scams
• Phishing email scams
• The Nigerian scam
• Phishing Websites
• Bank loan or credit card scam
• Scam Call Centers
Advantage of cyber
Security
Protection against external threats
Protection against internal threats
Regulation compliance
Improved productivity
Cost savings and value
How to prevent cyber
crime?
Keep your
computer current
with the latest
patches and
updates
Make sure your
computer is
configured securely
Choose strong
passwords and
keep them safe
Protect your
computer with
security software
Monitor your bank
details and credit
card statements
regularly
Use public Wi-Fi
Hotspots carefully
Cyber
law Of
India
• Cyberlaw in India is not a
separate legal framework.
Its a combination of
Contract, Intellectual
property, Data protection,
and privacy laws. With the
Computer and internet
taking over every aspect of
our life, there was a need for
strong cyber law. Cyber
laws supervise the digital
circulation of information,
Case study
• One of the leading cybercrime
cases is the Bank NSP case is the
one where a management trainee
of the bank was engaged to be
married. The couple exchanged
many emails using the company
computers. After some time the
two broke up and the girl created
fraudulent email ids such as
Conclusion
• Cybercrime is indeed
getting the
recognition it
deserves. However, it
is not going to
restricted that easily.
In fact, it is highly
likely that cyber crime
BIbliography
• www.google.com
• www.yahoo.in
• www.wikipedia.com
• www.quora.com
Thank you

Mais conteúdo relacionado

Semelhante a Presentation1 1.pptx

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxNitishChoudhary23
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfKira Dess
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Ambrish Mishra
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02raja jawahar
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxMayurSapkale7
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 

Semelhante a Presentation1 1.pptx (20)

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 

Último

Get inspired by SYMBA Project: promoting Industrial Symbiosis
Get inspired by SYMBA Project: promoting Industrial SymbiosisGet inspired by SYMBA Project: promoting Industrial Symbiosis
Get inspired by SYMBA Project: promoting Industrial Symbiosissymbaprojecteu
 
Slide deck for the IPCC Briefing to Latvian Parliamentarians
Slide deck for the IPCC Briefing to Latvian ParliamentariansSlide deck for the IPCC Briefing to Latvian Parliamentarians
Slide deck for the IPCC Briefing to Latvian Parliamentariansipcc-media
 
CCXG global forum, April 2024, Brian Motherway and Paolo Frankl
CCXG global forum, April 2024,  Brian Motherway and Paolo FranklCCXG global forum, April 2024,  Brian Motherway and Paolo Frankl
CCXG global forum, April 2024, Brian Motherway and Paolo FranklOECD Environment
 
CCXG global forum, April 2024, Tiza Mafira
CCXG global forum, April 2024,  Tiza MafiraCCXG global forum, April 2024,  Tiza Mafira
CCXG global forum, April 2024, Tiza MafiraOECD Environment
 
CCXG global forum, April 2024, XU Huaqing
CCXG global forum, April 2024,  XU HuaqingCCXG global forum, April 2024,  XU Huaqing
CCXG global forum, April 2024, XU HuaqingOECD Environment
 
Planning and Designing Green buildings-.issues, options and strategies
Planning and Designing Green buildings-.issues, options and strategiesPlanning and Designing Green buildings-.issues, options and strategies
Planning and Designing Green buildings-.issues, options and strategiesJIT KUMAR GUPTA
 
CCXG global forum, April 2024, Luca Lo Re
CCXG global forum, April 2024,  Luca Lo ReCCXG global forum, April 2024,  Luca Lo Re
CCXG global forum, April 2024, Luca Lo ReOECD Environment
 
human computer interaction of movie booking system project
human computer interaction of movie booking system projecthuman computer interaction of movie booking system project
human computer interaction of movie booking system project201roopikha
 
LCCXG global forum, April 2024, Lydie-Line Paroz
LCCXG global forum, April 2024,  Lydie-Line ParozLCCXG global forum, April 2024,  Lydie-Line Paroz
LCCXG global forum, April 2024, Lydie-Line ParozOECD Environment
 
Little Green Ranger ESG Sustainability Report
Little Green Ranger ESG Sustainability ReportLittle Green Ranger ESG Sustainability Report
Little Green Ranger ESG Sustainability ReportKennethOng48
 
Broiler SBA.docx for agricultural science csec
Broiler SBA.docx for agricultural science csecBroiler SBA.docx for agricultural science csec
Broiler SBA.docx for agricultural science csecLaceyannWilliams
 
CCXG global forum, April 2024, Sirini Jeudy-Hugo
CCXG global forum, April 2024,  Sirini Jeudy-HugoCCXG global forum, April 2024,  Sirini Jeudy-Hugo
CCXG global forum, April 2024, Sirini Jeudy-HugoOECD Environment
 
CCXG global forum, April 2024, Surabi Menon
CCXG global forum, April 2024, Surabi MenonCCXG global forum, April 2024, Surabi Menon
CCXG global forum, April 2024, Surabi MenonOECD Environment
 
CCXG global forum, April 2024, Julio Cordano
CCXG global forum, April 2024,  Julio CordanoCCXG global forum, April 2024,  Julio Cordano
CCXG global forum, April 2024, Julio CordanoOECD Environment
 
CCXG global forum, April 2024, Siddharth Singh
CCXG global forum, April 2024, Siddharth SinghCCXG global forum, April 2024, Siddharth Singh
CCXG global forum, April 2024, Siddharth SinghOECD Environment
 
CCXG global forum, April 2024, MJ Mace
CCXG global forum, April 2024,   MJ MaceCCXG global forum, April 2024,   MJ Mace
CCXG global forum, April 2024, MJ MaceOECD Environment
 
Uae-NO1 Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot, Sheik...
Uae-NO1 Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot, Sheik...Uae-NO1 Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot, Sheik...
Uae-NO1 Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot, Sheik...Amil baba
 
CCXG global forum, April 2024, David Mutisya
CCXG global forum, April 2024,  David MutisyaCCXG global forum, April 2024,  David Mutisya
CCXG global forum, April 2024, David MutisyaOECD Environment
 
7. PD 705 & RELEVANT FORESTRY LAWS PHILIPPINES
7. PD 705 & RELEVANT FORESTRY LAWS PHILIPPINES7. PD 705 & RELEVANT FORESTRY LAWS PHILIPPINES
7. PD 705 & RELEVANT FORESTRY LAWS PHILIPPINESMarlonJayBayag
 
ENVIRONMENTAL ISSUES AND AWARENESS - Presentation
ENVIRONMENTAL ISSUES AND AWARENESS - PresentationENVIRONMENTAL ISSUES AND AWARENESS - Presentation
ENVIRONMENTAL ISSUES AND AWARENESS - PresentationTaruna Deshwal
 

Último (20)

Get inspired by SYMBA Project: promoting Industrial Symbiosis
Get inspired by SYMBA Project: promoting Industrial SymbiosisGet inspired by SYMBA Project: promoting Industrial Symbiosis
Get inspired by SYMBA Project: promoting Industrial Symbiosis
 
Slide deck for the IPCC Briefing to Latvian Parliamentarians
Slide deck for the IPCC Briefing to Latvian ParliamentariansSlide deck for the IPCC Briefing to Latvian Parliamentarians
Slide deck for the IPCC Briefing to Latvian Parliamentarians
 
CCXG global forum, April 2024, Brian Motherway and Paolo Frankl
CCXG global forum, April 2024,  Brian Motherway and Paolo FranklCCXG global forum, April 2024,  Brian Motherway and Paolo Frankl
CCXG global forum, April 2024, Brian Motherway and Paolo Frankl
 
CCXG global forum, April 2024, Tiza Mafira
CCXG global forum, April 2024,  Tiza MafiraCCXG global forum, April 2024,  Tiza Mafira
CCXG global forum, April 2024, Tiza Mafira
 
CCXG global forum, April 2024, XU Huaqing
CCXG global forum, April 2024,  XU HuaqingCCXG global forum, April 2024,  XU Huaqing
CCXG global forum, April 2024, XU Huaqing
 
Planning and Designing Green buildings-.issues, options and strategies
Planning and Designing Green buildings-.issues, options and strategiesPlanning and Designing Green buildings-.issues, options and strategies
Planning and Designing Green buildings-.issues, options and strategies
 
CCXG global forum, April 2024, Luca Lo Re
CCXG global forum, April 2024,  Luca Lo ReCCXG global forum, April 2024,  Luca Lo Re
CCXG global forum, April 2024, Luca Lo Re
 
human computer interaction of movie booking system project
human computer interaction of movie booking system projecthuman computer interaction of movie booking system project
human computer interaction of movie booking system project
 
LCCXG global forum, April 2024, Lydie-Line Paroz
LCCXG global forum, April 2024,  Lydie-Line ParozLCCXG global forum, April 2024,  Lydie-Line Paroz
LCCXG global forum, April 2024, Lydie-Line Paroz
 
Little Green Ranger ESG Sustainability Report
Little Green Ranger ESG Sustainability ReportLittle Green Ranger ESG Sustainability Report
Little Green Ranger ESG Sustainability Report
 
Broiler SBA.docx for agricultural science csec
Broiler SBA.docx for agricultural science csecBroiler SBA.docx for agricultural science csec
Broiler SBA.docx for agricultural science csec
 
CCXG global forum, April 2024, Sirini Jeudy-Hugo
CCXG global forum, April 2024,  Sirini Jeudy-HugoCCXG global forum, April 2024,  Sirini Jeudy-Hugo
CCXG global forum, April 2024, Sirini Jeudy-Hugo
 
CCXG global forum, April 2024, Surabi Menon
CCXG global forum, April 2024, Surabi MenonCCXG global forum, April 2024, Surabi Menon
CCXG global forum, April 2024, Surabi Menon
 
CCXG global forum, April 2024, Julio Cordano
CCXG global forum, April 2024,  Julio CordanoCCXG global forum, April 2024,  Julio Cordano
CCXG global forum, April 2024, Julio Cordano
 
CCXG global forum, April 2024, Siddharth Singh
CCXG global forum, April 2024, Siddharth SinghCCXG global forum, April 2024, Siddharth Singh
CCXG global forum, April 2024, Siddharth Singh
 
CCXG global forum, April 2024, MJ Mace
CCXG global forum, April 2024,   MJ MaceCCXG global forum, April 2024,   MJ Mace
CCXG global forum, April 2024, MJ Mace
 
Uae-NO1 Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot, Sheik...
Uae-NO1 Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot, Sheik...Uae-NO1 Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot, Sheik...
Uae-NO1 Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot, Sheik...
 
CCXG global forum, April 2024, David Mutisya
CCXG global forum, April 2024,  David MutisyaCCXG global forum, April 2024,  David Mutisya
CCXG global forum, April 2024, David Mutisya
 
7. PD 705 & RELEVANT FORESTRY LAWS PHILIPPINES
7. PD 705 & RELEVANT FORESTRY LAWS PHILIPPINES7. PD 705 & RELEVANT FORESTRY LAWS PHILIPPINES
7. PD 705 & RELEVANT FORESTRY LAWS PHILIPPINES
 
ENVIRONMENTAL ISSUES AND AWARENESS - Presentation
ENVIRONMENTAL ISSUES AND AWARENESS - PresentationENVIRONMENTAL ISSUES AND AWARENESS - Presentation
ENVIRONMENTAL ISSUES AND AWARENESS - Presentation
 

Presentation1 1.pptx

  • 1. Cyber crime and security This Photo by Unknown author is licensed under CC BY-ND. BY:- Parul Singla And Indra Mohan Khatri
  • 2. Content Introduction History of cyber crime Categories of cyber crime Types of cyber crime Advantage of cyber Security Cyber law Of India Conclusion Bibiliography
  • 3. Introducti on • Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most cybercrime is committed by cybercriminals or hackers who want to make money. However, occasionally cybercrime aims to damage computers or networks for reasons other than profit.
  • 4. History of cyber crime 1834 – A couple of robbers hack the French Telegraph System and steal information from the stock market, essentially carrying out the first cyberattack in the world. 1878 – Early Mobile Calls-The Bell Telephone Company boots a group of young boys off the telephone grid in New York for repeatedly and purposely misdirecting and disconnecting customer calls two years after Alexander Graham Bell invented the machine. 1957– Joe Engressia, a blind, 7-year- old boy with perfect pitch, hears a high-pitched whistle on a phone line and begins to whistle along to it at a 2600Hz speed, helping him communicate with phone lines and becoming the United States’ first phone hacker. Source : Wikip
  • 5. Categori es of cyber crime There are three major categories that cybercrime falls into: Individual :-This is similar to a real-life instance of a criminal illegally possessing an individual’s bank or credit card details. Property :-This category of cybercrime involves one individual distributing malicious or illegal information online. Government :-This is the least common cybercrime, but is the most serious offense. A crime against the government is also known as cyber terrorism.
  • 6. Types of cyber crime DDoS Attacks Botnets Cyberstalking Phishing Prohibited/Illegal Content Online Scams Exploit Kits
  • 7. Ddos attack A distributed denial-of-service (DDoS) attack targets websites and servers by disrupting network services. A DDoS attack attempts to exhaust an application’s resources. The perpetrators behind these attacks flood a site with errant traffic, resulting in poor website functionality or knocking it offline altogether. Recent Case - Over Watch 2
  • 8. Online scams • Phishing email scams • The Nigerian scam • Phishing Websites • Bank loan or credit card scam • Scam Call Centers
  • 9. Advantage of cyber Security Protection against external threats Protection against internal threats Regulation compliance Improved productivity Cost savings and value
  • 10. How to prevent cyber crime? Keep your computer current with the latest patches and updates Make sure your computer is configured securely Choose strong passwords and keep them safe Protect your computer with security software Monitor your bank details and credit card statements regularly Use public Wi-Fi Hotspots carefully
  • 11. Cyber law Of India • Cyberlaw in India is not a separate legal framework. Its a combination of Contract, Intellectual property, Data protection, and privacy laws. With the Computer and internet taking over every aspect of our life, there was a need for strong cyber law. Cyber laws supervise the digital circulation of information,
  • 12. Case study • One of the leading cybercrime cases is the Bank NSP case is the one where a management trainee of the bank was engaged to be married. The couple exchanged many emails using the company computers. After some time the two broke up and the girl created fraudulent email ids such as
  • 13. Conclusion • Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily. In fact, it is highly likely that cyber crime
  • 14. BIbliography • www.google.com • www.yahoo.in • www.wikipedia.com • www.quora.com