SlideShare uma empresa Scribd logo
1 de 38
Cyber Crime
- Prime College
Presenter’s
Profile
Hem Sagar Pokhrel
MSP 2013
Prime College
Volunteer, Youth Action Nepal
Anamnagar, Kathmandu-Nepal
@NepaliSagar
www.facebook.com/geeksag
ar
WHAT IS CYBER CRIME ?
 Computer crime or cybercrime is a form
of crime where the Internet or computers
are used as a medium to commit crime.
National
Research
Council,
"Computers
at Risk",
1991.
"The modern thief can steal more with a
computer than with a gun. Tomorrow's
terrorist may be able to do more damage
with a keyboard than with a bomb".
TYPES OF
CYBER
CRIME
1. Cybercrimes against persons.
2. Cybercrimes against property.
3. Cybercrimes against
government.
1.AGAINST
PERSON
Includes various harassment of anyone with
the use of a computer such as e-mail.
E.g.:- The Melissa virus first appeared on the internet in
March of 1999. It spread rapidly throughout computer systems
in the United States and Europe. It is estimated that the virus
caused 80 million dollars in damages to computers worldwide.
AGAINST
PERSON
contd..
oCyber harassment is a distinct Cybercrime.
oHarassment can be sexual, racial, religious, or other.
Persons perpetuating such harassment are also guilty of
cybercrimes.
oCyber harassment as a crime also brings us to another
related area of violation of privacy of citizens.
oNo one likes any other person invading the invaluable and
extremely touchy area of his or her own privacy which the
medium of internet grants to the citizen.
2.AGAINST
PROPERTY
 Include computer vandalism (destruction of
others' property), transmission of harmful
programmes.
 E.g. : A Mumbai-based upstart engineering
company lost a say and much money in the
business when the rival company, an
industry major, stole the technical database
from their computers with the help of a
corporate cyber spy.
3.AGAINST
GOVERNMENT
 An individual "cracks" into a government or
military maintained website or systems.
 This crime manifests itself into terrorism .
 E.g. Group like
 LUZSEC
 Anonymous
Why learn
about CYBER
CRIME ?
 Everybody is using COMPUTERS.
 New generation is growing up with computers
 Terrorist targeted the teenagers.
 Conventional crimes like Forgery,, extortion,,
kidnapping are being committed with the help of
computers.
 MOST IMPORTANT - Monetary transactions are
moving on to the INTERNET
IN SHORT
 Cyber CRIME is any crime
where Computer is a target.
 Computer is a tool of crime
 Computer is incidental to
crime
VICTIMS
 Desperados and greedy
people
 Unskilled & Inexperienced
 Unlucky people
Hacker and
Cracker
 A Hacker is a person who just wants to know the
inner workings of computer systems, helping to
improve them if they detect flaws in their security.
 A Cracker is a person with high skills in computer
systems (the same way that hackers), these skills are
regularly used for personal benefit or for harm.
HACKING
 Illegal intrusion into a computer system without
the permission of the computer owner/user.
 Types
1. Ethical hacking &
2. Non- ethical hacking
VIRUS
DISSEMINATIO
N
Malicious software that attaches
itself to other software.
e.g.:-
1. Virus, worms,
2. Trojan Horse,
3. Time bomb,
4. Logic Bomb,
SOFTWARE
PRIVACY
 Theft of software through the illegal copying of
genuine programs or the counterfeiting and
distribution of products intended to pass for the
original.
 Retail revenue losses worldwide are ever increasing
due to this crime Can be done in various ways
 E.g.:-End user copying, Hard disk loading, Counterfeiting,
 Illegal downloads from the internet etc.
INTERNET
RELAY CHAT
 Internet Relay Chat (IRC) servers have chat rooms
in which people from anywhere the world can come
together and chat with each other.
 Criminals use it for meeting co-conspirators.
 Hackers use it for discussing their exploits / sharing
the techniques.
DDOS ATTACK
 malicious action typically taken against a
computer system such as a server or webpage
host.
 Server Flooding is achieved by causing a server
to attempt to respond to an excessive number of
users simultaneously
 Server crashing is typically achieved through a
malicious piece of software that uses a flaw or
weakness in the server programming to cause the
server to crash and be inaccessible until restarted.
Email Bombing
 Form of denial of service attack that floods an
inbox and mail server with messages.
 This type of attack can be a nuisance on a low
level, but it can also become a serious problem.
 There are a variety of techniques that can be used
to address email bombing. Maintaining
-multiple email addresses for different activities can help.
NET
EXTORTION
Copying the company’s confidential
data in order to extort paid
company for huge amount.
CYBER
DEFAMATION
 The Criminal sends emails containing defamatory
matters to all concerned off the victim or post the
defamatory matters on a website..
 E.g.:-(disgruntled employee may do this against
boss,, ex-boys friend against girl,, divorced husband
against wife etc.)
PHISHING
It is technique of pulling out
confidential information from the
bank/financial institutional account
holders by deceptive means.
PHISHING
It is technique of pulling out confidential information
from the bank/financial institutional account holders by
deceptive means.
PHISHING
It is technique of pulling out confidential information
from the bank/financial institutional account holders by
deceptive means.
How to be secure
then .???
1. Enabled the “Always use HTTPS” setting for Facebook,
Twitter, Outlook, Gmail, Google and all the other online services.
2. Offers via an unknown person or offers that are too good to be
true should be suspect.
3. Don’t click the links in emails. Always go to the source or
manually type in the address in your web browser.
4. Don’t use a debit card online. If your debit card is
compromised that’s money out of your bank account. Credit
cards provide more protection and less liability.
How to be secure
then .???
5. Secure your PC. Update your critical security patches and anti-
virus and only shop from a secured Internet connection.
6. Change your password often and use combination of
Uppercase, Lowercase, Special characters and characters as
password.
 Do take advantage of privacy settings and encourage
your friends to do the same
 Do ask questions before clicking a link.
 Do accept friend requests with caution.D
 Don’t include too much identifying information.
 Don’t automatically trust everyone.
Facebook Security
 Stay Updated
 Secure Web Hosts
 Moderate the comment
 Backups
Twitter Security
 Never share personal information
 Don’t be too specific
 Link your twitter account
 Don’t spit excessive personal
information, this is about as
dangerous on any other social
network. if necessary.
Twitter Security
 Don’t tweet about moving servers,
changing passwords or any other
type of situation where your
security could be compromised
more easily.
 Review applications that use your
twitter account with other
networking sites like Facebook
only
•Stay Updated
•Secure Web Hosts
•Moderate the comment
•Backups
How To Secure
Your Blog
 Malware bytes' Anti-Malware
 True Crypt
 CCleaner
 Flash Cookie Remover
Offline Protection
Security Tips |
Smartphone Users
 Install anti-virus software, and keep it updated.
 Use a PIN code or pattern lock on your phone.
 Turn off geo-tagging, or turn off photo auto-uploads.
 Avoid location "check-ins.“
 Don't store passwords on the phone.
 Enable remote 'wiping' of data.
 Encrypt public Wi-Fi transmissions.
Our Expectation Now
Onwards
 Conscious about Electronic Transaction act 2064
 Don't edit images in unwanted manner and also do not like,
share ,tag and post such edited images in any Social
Networking sites.
 Do not keep multi accounts of same sites | delete if you
already have.
 Use privacy setting to avoid cyber theft.
 Hide your Geographical Location as far as practicable.
References
facebook.com/security
fass10012041.wordpress.com
forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-DNS
en.wikipedia.org/wiki/
f-secure.com/weblog/
totaldefense.com/securityblog.aspx
twitter.com/safety
THANK YOU

Mais conteúdo relacionado

Mais procurados

Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Cyber crime
Cyber crimeCyber crime
Cyber crimedixitas
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationRitik Kumar
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 

Mais procurados (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 

Destaque

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecurityBrian Honan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPTvarun0912
 
Social networking ppt
Social networking pptSocial networking ppt
Social networking pptpatricia
 
Social media ppt
Social media pptSocial media ppt
Social media pptRyan Parker
 
DDoS Attacks, Russia, 2011- 2012: Patterns and Trends
DDoS Attacks, Russia, 2011- 2012: Patterns and TrendsDDoS Attacks, Russia, 2011- 2012: Patterns and Trends
DDoS Attacks, Russia, 2011- 2012: Patterns and TrendsHLL
 
Current threats and trends
Current threats and trendsCurrent threats and trends
Current threats and trendsLive Tecnologies
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 
Sexual reproductive health rtights and mdg 5 in india
Sexual reproductive health rtights and mdg 5 in indiaSexual reproductive health rtights and mdg 5 in india
Sexual reproductive health rtights and mdg 5 in indiaDr Sayan Das
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSKenny Huang Ph.D.
 
Cyber safety & Social Media - Penguin 2012
Cyber safety & Social Media - Penguin 2012Cyber safety & Social Media - Penguin 2012
Cyber safety & Social Media - Penguin 2012Corrie Barclay
 
Introducing solved Question Papers of last 5 years for Anna University, 1st s...
Introducing solved Question Papers of last 5 years for Anna University, 1st s...Introducing solved Question Papers of last 5 years for Anna University, 1st s...
Introducing solved Question Papers of last 5 years for Anna University, 1st s...LearnEngg.com
 

Destaque (20)

Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPT
 
Social networking ppt
Social networking pptSocial networking ppt
Social networking ppt
 
Social media ppt
Social media pptSocial media ppt
Social media ppt
 
DDoS Attacks, Russia, 2011- 2012: Patterns and Trends
DDoS Attacks, Russia, 2011- 2012: Patterns and TrendsDDoS Attacks, Russia, 2011- 2012: Patterns and Trends
DDoS Attacks, Russia, 2011- 2012: Patterns and Trends
 
Current threats and trends
Current threats and trendsCurrent threats and trends
Current threats and trends
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
8th Semester Computer Science (2013-June) Question Papers
8th Semester Computer Science (2013-June) Question Papers8th Semester Computer Science (2013-June) Question Papers
8th Semester Computer Science (2013-June) Question Papers
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Sexual reproductive health rtights and mdg 5 in india
Sexual reproductive health rtights and mdg 5 in indiaSexual reproductive health rtights and mdg 5 in india
Sexual reproductive health rtights and mdg 5 in india
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
 
Cyber safety & Social Media - Penguin 2012
Cyber safety & Social Media - Penguin 2012Cyber safety & Social Media - Penguin 2012
Cyber safety & Social Media - Penguin 2012
 
Introducing solved Question Papers of last 5 years for Anna University, 1st s...
Introducing solved Question Papers of last 5 years for Anna University, 1st s...Introducing solved Question Papers of last 5 years for Anna University, 1st s...
Introducing solved Question Papers of last 5 years for Anna University, 1st s...
 
Kerberos
KerberosKerberos
Kerberos
 

Semelhante a Cyber Crime and Social Media Security

Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Name parul
Name parulName parul
Name parulParul231
 
Name parul
Name parulName parul
Name parulParul231
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of ITMahdiRahmani15
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Home cyber security
Home cyber securityHome cyber security
Home cyber securityMichael File
 

Semelhante a Cyber Crime and Social Media Security (20)

Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
 

Mais de Hem Pokhrel

Software/System Development Life Cycle
Software/System Development Life CycleSoftware/System Development Life Cycle
Software/System Development Life CycleHem Pokhrel
 
Network Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part INetwork Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part IHem Pokhrel
 
PrestaShop Kathmandu Ecommerce Meetup #2
PrestaShop Kathmandu Ecommerce Meetup #2PrestaShop Kathmandu Ecommerce Meetup #2
PrestaShop Kathmandu Ecommerce Meetup #2Hem Pokhrel
 
Marketing Information System (MkIS)
Marketing Information System (MkIS)Marketing Information System (MkIS)
Marketing Information System (MkIS)Hem Pokhrel
 
Primary Memory: RAM, ROM and their Types
Primary Memory: RAM, ROM and their TypesPrimary Memory: RAM, ROM and their Types
Primary Memory: RAM, ROM and their TypesHem Pokhrel
 
OUTPUT DEVICES: MONITORS (CRT, LCD, LED, PLASMA)
OUTPUT DEVICES: MONITORS (CRT, LCD, LED, PLASMA)OUTPUT DEVICES: MONITORS (CRT, LCD, LED, PLASMA)
OUTPUT DEVICES: MONITORS (CRT, LCD, LED, PLASMA)Hem Pokhrel
 
Introduction to Bus | Address, Data, Control Bus
Introduction to Bus | Address, Data, Control BusIntroduction to Bus | Address, Data, Control Bus
Introduction to Bus | Address, Data, Control BusHem Pokhrel
 
Touch Screens and Scanner
Touch Screens and ScannerTouch Screens and Scanner
Touch Screens and ScannerHem Pokhrel
 
BBA First Semester | Course introduction
BBA First Semester | Course introductionBBA First Semester | Course introduction
BBA First Semester | Course introductionHem Pokhrel
 
Software Agents & Their Taxonomy | Ecommerce BBA Handout
Software Agents & Their Taxonomy | Ecommerce BBA HandoutSoftware Agents & Their Taxonomy | Ecommerce BBA Handout
Software Agents & Their Taxonomy | Ecommerce BBA HandoutHem Pokhrel
 
How to be THIN and SKINNY - 5 Simple Tips
How to be THIN and SKINNY - 5 Simple TipsHow to be THIN and SKINNY - 5 Simple Tips
How to be THIN and SKINNY - 5 Simple TipsHem Pokhrel
 
BBA 6th Orientation
BBA 6th OrientationBBA 6th Orientation
BBA 6th OrientationHem Pokhrel
 
Computer Network | BBA First Semester
Computer Network | BBA First SemesterComputer Network | BBA First Semester
Computer Network | BBA First SemesterHem Pokhrel
 
Short Questions Collections | BBA First Semester
Short Questions Collections | BBA First SemesterShort Questions Collections | BBA First Semester
Short Questions Collections | BBA First SemesterHem Pokhrel
 
Detailed format for E-commerce project report |BBA
Detailed format for E-commerce project report |BBADetailed format for E-commerce project report |BBA
Detailed format for E-commerce project report |BBAHem Pokhrel
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's TypesHem Pokhrel
 
PrestaShop - Kathmandu Ecommerce Meetup #1
PrestaShop - Kathmandu Ecommerce Meetup #1PrestaShop - Kathmandu Ecommerce Meetup #1
PrestaShop - Kathmandu Ecommerce Meetup #1Hem Pokhrel
 
Electronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-CommerceElectronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-CommerceHem Pokhrel
 
Internet Marketing Basics | E-Commerce
Internet Marketing Basics | E-CommerceInternet Marketing Basics | E-Commerce
Internet Marketing Basics | E-CommerceHem Pokhrel
 

Mais de Hem Pokhrel (20)

Software/System Development Life Cycle
Software/System Development Life CycleSoftware/System Development Life Cycle
Software/System Development Life Cycle
 
Network Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part INetwork Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part I
 
PrestaShop Kathmandu Ecommerce Meetup #2
PrestaShop Kathmandu Ecommerce Meetup #2PrestaShop Kathmandu Ecommerce Meetup #2
PrestaShop Kathmandu Ecommerce Meetup #2
 
Marketing Information System (MkIS)
Marketing Information System (MkIS)Marketing Information System (MkIS)
Marketing Information System (MkIS)
 
Primary Memory: RAM, ROM and their Types
Primary Memory: RAM, ROM and their TypesPrimary Memory: RAM, ROM and their Types
Primary Memory: RAM, ROM and their Types
 
OUTPUT DEVICES: MONITORS (CRT, LCD, LED, PLASMA)
OUTPUT DEVICES: MONITORS (CRT, LCD, LED, PLASMA)OUTPUT DEVICES: MONITORS (CRT, LCD, LED, PLASMA)
OUTPUT DEVICES: MONITORS (CRT, LCD, LED, PLASMA)
 
Introduction to Bus | Address, Data, Control Bus
Introduction to Bus | Address, Data, Control BusIntroduction to Bus | Address, Data, Control Bus
Introduction to Bus | Address, Data, Control Bus
 
Touch Screens and Scanner
Touch Screens and ScannerTouch Screens and Scanner
Touch Screens and Scanner
 
BBA First Semester | Course introduction
BBA First Semester | Course introductionBBA First Semester | Course introduction
BBA First Semester | Course introduction
 
Software Agents & Their Taxonomy | Ecommerce BBA Handout
Software Agents & Their Taxonomy | Ecommerce BBA HandoutSoftware Agents & Their Taxonomy | Ecommerce BBA Handout
Software Agents & Their Taxonomy | Ecommerce BBA Handout
 
How to be THIN and SKINNY - 5 Simple Tips
How to be THIN and SKINNY - 5 Simple TipsHow to be THIN and SKINNY - 5 Simple Tips
How to be THIN and SKINNY - 5 Simple Tips
 
BBA 6th Orientation
BBA 6th OrientationBBA 6th Orientation
BBA 6th Orientation
 
Computer Network | BBA First Semester
Computer Network | BBA First SemesterComputer Network | BBA First Semester
Computer Network | BBA First Semester
 
Short Questions Collections | BBA First Semester
Short Questions Collections | BBA First SemesterShort Questions Collections | BBA First Semester
Short Questions Collections | BBA First Semester
 
Detailed format for E-commerce project report |BBA
Detailed format for E-commerce project report |BBADetailed format for E-commerce project report |BBA
Detailed format for E-commerce project report |BBA
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
PrestaShop - Kathmandu Ecommerce Meetup #1
PrestaShop - Kathmandu Ecommerce Meetup #1PrestaShop - Kathmandu Ecommerce Meetup #1
PrestaShop - Kathmandu Ecommerce Meetup #1
 
E-environment
E-environmentE-environment
E-environment
 
Electronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-CommerceElectronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-Commerce
 
Internet Marketing Basics | E-Commerce
Internet Marketing Basics | E-CommerceInternet Marketing Basics | E-Commerce
Internet Marketing Basics | E-Commerce
 

Último

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Último (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Cyber Crime and Social Media Security

  • 2. Presenter’s Profile Hem Sagar Pokhrel MSP 2013 Prime College Volunteer, Youth Action Nepal Anamnagar, Kathmandu-Nepal @NepaliSagar www.facebook.com/geeksag ar
  • 3. WHAT IS CYBER CRIME ?  Computer crime or cybercrime is a form of crime where the Internet or computers are used as a medium to commit crime.
  • 4. National Research Council, "Computers at Risk", 1991. "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb".
  • 5. TYPES OF CYBER CRIME 1. Cybercrimes against persons. 2. Cybercrimes against property. 3. Cybercrimes against government.
  • 6. 1.AGAINST PERSON Includes various harassment of anyone with the use of a computer such as e-mail. E.g.:- The Melissa virus first appeared on the internet in March of 1999. It spread rapidly throughout computer systems in the United States and Europe. It is estimated that the virus caused 80 million dollars in damages to computers worldwide.
  • 7. AGAINST PERSON contd.. oCyber harassment is a distinct Cybercrime. oHarassment can be sexual, racial, religious, or other. Persons perpetuating such harassment are also guilty of cybercrimes. oCyber harassment as a crime also brings us to another related area of violation of privacy of citizens. oNo one likes any other person invading the invaluable and extremely touchy area of his or her own privacy which the medium of internet grants to the citizen.
  • 8. 2.AGAINST PROPERTY  Include computer vandalism (destruction of others' property), transmission of harmful programmes.  E.g. : A Mumbai-based upstart engineering company lost a say and much money in the business when the rival company, an industry major, stole the technical database from their computers with the help of a corporate cyber spy.
  • 9. 3.AGAINST GOVERNMENT  An individual "cracks" into a government or military maintained website or systems.  This crime manifests itself into terrorism .  E.g. Group like  LUZSEC  Anonymous
  • 10. Why learn about CYBER CRIME ?  Everybody is using COMPUTERS.  New generation is growing up with computers  Terrorist targeted the teenagers.  Conventional crimes like Forgery,, extortion,, kidnapping are being committed with the help of computers.  MOST IMPORTANT - Monetary transactions are moving on to the INTERNET
  • 11. IN SHORT  Cyber CRIME is any crime where Computer is a target.  Computer is a tool of crime  Computer is incidental to crime
  • 12. VICTIMS  Desperados and greedy people  Unskilled & Inexperienced  Unlucky people
  • 13. Hacker and Cracker  A Hacker is a person who just wants to know the inner workings of computer systems, helping to improve them if they detect flaws in their security.  A Cracker is a person with high skills in computer systems (the same way that hackers), these skills are regularly used for personal benefit or for harm.
  • 14. HACKING  Illegal intrusion into a computer system without the permission of the computer owner/user.  Types 1. Ethical hacking & 2. Non- ethical hacking
  • 15. VIRUS DISSEMINATIO N Malicious software that attaches itself to other software. e.g.:- 1. Virus, worms, 2. Trojan Horse, 3. Time bomb, 4. Logic Bomb,
  • 16. SOFTWARE PRIVACY  Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.  Retail revenue losses worldwide are ever increasing due to this crime Can be done in various ways  E.g.:-End user copying, Hard disk loading, Counterfeiting,  Illegal downloads from the internet etc.
  • 17. INTERNET RELAY CHAT  Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other.  Criminals use it for meeting co-conspirators.  Hackers use it for discussing their exploits / sharing the techniques.
  • 18. DDOS ATTACK  malicious action typically taken against a computer system such as a server or webpage host.  Server Flooding is achieved by causing a server to attempt to respond to an excessive number of users simultaneously  Server crashing is typically achieved through a malicious piece of software that uses a flaw or weakness in the server programming to cause the server to crash and be inaccessible until restarted.
  • 19. Email Bombing  Form of denial of service attack that floods an inbox and mail server with messages.  This type of attack can be a nuisance on a low level, but it can also become a serious problem.  There are a variety of techniques that can be used to address email bombing. Maintaining -multiple email addresses for different activities can help.
  • 20. NET EXTORTION Copying the company’s confidential data in order to extort paid company for huge amount.
  • 21. CYBER DEFAMATION  The Criminal sends emails containing defamatory matters to all concerned off the victim or post the defamatory matters on a website..  E.g.:-(disgruntled employee may do this against boss,, ex-boys friend against girl,, divorced husband against wife etc.)
  • 22. PHISHING It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means.
  • 23. PHISHING It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means.
  • 24. PHISHING It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means.
  • 25. How to be secure then .??? 1. Enabled the “Always use HTTPS” setting for Facebook, Twitter, Outlook, Gmail, Google and all the other online services. 2. Offers via an unknown person or offers that are too good to be true should be suspect. 3. Don’t click the links in emails. Always go to the source or manually type in the address in your web browser. 4. Don’t use a debit card online. If your debit card is compromised that’s money out of your bank account. Credit cards provide more protection and less liability.
  • 26. How to be secure then .??? 5. Secure your PC. Update your critical security patches and anti- virus and only shop from a secured Internet connection. 6. Change your password often and use combination of Uppercase, Lowercase, Special characters and characters as password.
  • 27.
  • 28.  Do take advantage of privacy settings and encourage your friends to do the same  Do ask questions before clicking a link.  Do accept friend requests with caution.D  Don’t include too much identifying information.  Don’t automatically trust everyone. Facebook Security
  • 29.  Stay Updated  Secure Web Hosts  Moderate the comment  Backups Twitter Security
  • 30.  Never share personal information  Don’t be too specific  Link your twitter account  Don’t spit excessive personal information, this is about as dangerous on any other social network. if necessary. Twitter Security  Don’t tweet about moving servers, changing passwords or any other type of situation where your security could be compromised more easily.  Review applications that use your twitter account with other networking sites like Facebook only
  • 31. •Stay Updated •Secure Web Hosts •Moderate the comment •Backups How To Secure Your Blog
  • 32.  Malware bytes' Anti-Malware  True Crypt  CCleaner  Flash Cookie Remover Offline Protection
  • 33. Security Tips | Smartphone Users  Install anti-virus software, and keep it updated.  Use a PIN code or pattern lock on your phone.  Turn off geo-tagging, or turn off photo auto-uploads.  Avoid location "check-ins.“  Don't store passwords on the phone.  Enable remote 'wiping' of data.  Encrypt public Wi-Fi transmissions.
  • 34. Our Expectation Now Onwards  Conscious about Electronic Transaction act 2064  Don't edit images in unwanted manner and also do not like, share ,tag and post such edited images in any Social Networking sites.  Do not keep multi accounts of same sites | delete if you already have.  Use privacy setting to avoid cyber theft.  Hide your Geographical Location as far as practicable.
  • 35.
  • 36.

Notas do Editor

  1. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  2. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  3. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  4. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  5. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  6. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  7. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  8. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  9. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  10. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  11. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  12. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  13. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  14. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  15. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  16. co-conspirators: members of secret agreements
  17. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  18. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  19. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  20. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  21. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  22. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  23. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  24. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  25. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  26. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  27. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  28. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  29. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  30. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  31. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  32. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  33. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  34. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  35. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  36. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.
  37. In Slide Show mode, click the arrow to enter the PowerPoint Getting Started Center.