SlideShare uma empresa Scribd logo
1 de 10
Cyber Crime
• Any illegal or illegtimate activity that is done via computer or internet is called
cyber crime.
Some common cyber crimes and how we can resolve them:
1) Financial Frauds
2) Cyber Terrorism
3) Cyber Extortion
4) Cyber Warfare ( Hacking of nuclear plants,
5) energy resources, radio, TV channel, military websites etc.
6) Computer Hacking
7) Offensive adult content
8) Online Harassment
9) Drugs Selling
How to control cyber crime?
Financial frauds
• Any organization must have an
experienced IT team to control all the
development of codes and servers.
• There should be some extra security
codes which should be used while using
credit/debit card online such a
verification code.
• No mobile access should be given to
employees to access the website panel
or computer information from outside
the office premises.
Cyber Terrorism
• Make sure the computer are firewall
protected.
• Make sure the computers are always
using anti virus.
• The idea is not leaked by any
employee.
• Make sure there are multiple stages of
security while assessing data.
• Files are not publically open to all.
• The and their names should be
encrypted.
Cyber Extortion
• Never give your personal information to
stranger online.
• Try using anti virus and firewall in your PC.
• Make sure your PC has a strong password to
log in.
• The files should not be on desktop , as it is
easy to access.
• Do not blackmailed by anyone, just call your
police to register complain.
• Connect to cyber crime cell in FIA.
Cyber Warfare
• Hire a professional team for your
state network or sites.
• There should be only limited
people to access the main files.
• Never use any theme for making
website, they are dangerous.
• Downloading and uploading
should be done through single PC
which is highly protected.
Computer Hacking
• Do not Instal any pirated softwares.
• Do not install any .exe file if you are not aware of it.
• Do not install or download any file that you receive in an
email or from website that is not known worldwide.
• Always use brand original website to download software and
drivers.
• Make sure your PC has a high security password.
• Do not enter your personal information in public computers.
Offensive or adult content
• Do not click on links that appear on any site claiming you
have won a lottery or you have a message.
• Do not open any website that you feel unsafe.
• Do not click on nay link that is sent to you through email from
stranger.
• Make sure your PC is not used by anyone else except the
ones you trust.
• Always check the email source.
Online Harassment
• Do not add anyone in your social media profile who is
stranger.
• Do not accept messages request that you feel unsafe.
• Do not click on any link claiming or saying that you have won
something or someone is using your photo.
• Before making your profile on any social media channel,
always go through privacy policies or features.
Thanks

Mais conteúdo relacionado

Mais procurados

Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
Footprinting
FootprintingFootprinting
FootprintingDuah John
 
Phishing simulation exercises
Phishing simulation exercisesPhishing simulation exercises
Phishing simulation exercisesJisc
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
Social engineering
Social engineeringSocial engineering
Social engineeringMaulik Kotak
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threatzhihaochen
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 

Mais procurados (20)

Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Footprinting
FootprintingFootprinting
Footprinting
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Phishing simulation exercises
Phishing simulation exercisesPhishing simulation exercises
Phishing simulation exercises
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Phising
PhisingPhising
Phising
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threat
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 

Semelhante a Cyber Crime and how to prevent it?

The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the webJoel May
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfVarinder K
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation dhirujapla
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
Computer security risks
Computer security risksComputer security risks
Computer security risksdison gapor
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threatswardjo
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 

Semelhante a Cyber Crime and how to prevent it? (20)

The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Computer security
Computer securityComputer security
Computer security
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 

Mais de Mujeeb Riaz

World Order by Henry Kissinger_M.Mujeeb Riaz .pdf
World Order by Henry Kissinger_M.Mujeeb Riaz .pdfWorld Order by Henry Kissinger_M.Mujeeb Riaz .pdf
World Order by Henry Kissinger_M.Mujeeb Riaz .pdfMujeeb Riaz
 
Gestalat Theory of Visual Perception_Mujeeb Riaz .pdf
Gestalat Theory of Visual Perception_Mujeeb Riaz .pdfGestalat Theory of Visual Perception_Mujeeb Riaz .pdf
Gestalat Theory of Visual Perception_Mujeeb Riaz .pdfMujeeb Riaz
 
Book Review The Prince_ Niccolo Machiavelli.pdf
Book Review The Prince_ Niccolo Machiavelli.pdfBook Review The Prince_ Niccolo Machiavelli.pdf
Book Review The Prince_ Niccolo Machiavelli.pdfMujeeb Riaz
 
Threads Vs Twitter_ M.Mujeeb Riaz.pdf
Threads Vs Twitter_ M.Mujeeb Riaz.pdfThreads Vs Twitter_ M.Mujeeb Riaz.pdf
Threads Vs Twitter_ M.Mujeeb Riaz.pdfMujeeb Riaz
 
Difference between Business Intelligence and Business Analytics_Mujeeb Riaz.pdf
Difference between Business Intelligence and Business Analytics_Mujeeb Riaz.pdfDifference between Business Intelligence and Business Analytics_Mujeeb Riaz.pdf
Difference between Business Intelligence and Business Analytics_Mujeeb Riaz.pdfMujeeb Riaz
 
Email Marketing_M.Mujeeb Riaz .pdf
Email Marketing_M.Mujeeb Riaz .pdfEmail Marketing_M.Mujeeb Riaz .pdf
Email Marketing_M.Mujeeb Riaz .pdfMujeeb Riaz
 
How AI is going to change the world _M.Mujeeb Riaz.pdf
How AI is going to change the world _M.Mujeeb Riaz.pdfHow AI is going to change the world _M.Mujeeb Riaz.pdf
How AI is going to change the world _M.Mujeeb Riaz.pdfMujeeb Riaz
 
Photography tips for kids M.Mujeeb Riaz
Photography tips for kids  M.Mujeeb RiazPhotography tips for kids  M.Mujeeb Riaz
Photography tips for kids M.Mujeeb RiazMujeeb Riaz
 
How to launch successful advertising campaign _mujeeb riaz
How to launch successful advertising campaign _mujeeb riazHow to launch successful advertising campaign _mujeeb riaz
How to launch successful advertising campaign _mujeeb riazMujeeb Riaz
 
Adobe Premiere Pro: An Introduction to the Basics_Mujeeb Riaz
Adobe Premiere Pro: An Introduction to the Basics_Mujeeb RiazAdobe Premiere Pro: An Introduction to the Basics_Mujeeb Riaz
Adobe Premiere Pro: An Introduction to the Basics_Mujeeb RiazMujeeb Riaz
 
Lesson Plan Mujeeb Riaz
Lesson Plan Mujeeb Riaz Lesson Plan Mujeeb Riaz
Lesson Plan Mujeeb Riaz Mujeeb Riaz
 
How to earn on amazone
How to earn on amazoneHow to earn on amazone
How to earn on amazoneMujeeb Riaz
 
Logo Design _From Concept to Creation
Logo Design _From Concept to Creation Logo Design _From Concept to Creation
Logo Design _From Concept to Creation Mujeeb Riaz
 
Design Thinking _ M.Mujeeb Riaz
Design Thinking _ M.Mujeeb Riaz Design Thinking _ M.Mujeeb Riaz
Design Thinking _ M.Mujeeb Riaz Mujeeb Riaz
 
SEO Search Engine optimization M.Mujeeb Riaz
SEO Search Engine optimization  M.Mujeeb RiazSEO Search Engine optimization  M.Mujeeb Riaz
SEO Search Engine optimization M.Mujeeb RiazMujeeb Riaz
 
Photography Lighting Techniques_M.Mujeeb Riaz
Photography Lighting Techniques_M.Mujeeb RiazPhotography Lighting Techniques_M.Mujeeb Riaz
Photography Lighting Techniques_M.Mujeeb RiazMujeeb Riaz
 
Website design by using CMS _M.Mujeeb Riaz
Website design by using CMS _M.Mujeeb Riaz Website design by using CMS _M.Mujeeb Riaz
Website design by using CMS _M.Mujeeb Riaz Mujeeb Riaz
 
Camera Shots,Angles and Movements_M.Mujeeb Riaz
Camera Shots,Angles and Movements_M.Mujeeb RiazCamera Shots,Angles and Movements_M.Mujeeb Riaz
Camera Shots,Angles and Movements_M.Mujeeb RiazMujeeb Riaz
 
Types of Photography Genres _ M.Mujeeb Riaz
Types of Photography Genres _ M.Mujeeb RiazTypes of Photography Genres _ M.Mujeeb Riaz
Types of Photography Genres _ M.Mujeeb RiazMujeeb Riaz
 
Emotional intelligence _ M.Mujeeb Riaz
Emotional intelligence _ M.Mujeeb RiazEmotional intelligence _ M.Mujeeb Riaz
Emotional intelligence _ M.Mujeeb RiazMujeeb Riaz
 

Mais de Mujeeb Riaz (20)

World Order by Henry Kissinger_M.Mujeeb Riaz .pdf
World Order by Henry Kissinger_M.Mujeeb Riaz .pdfWorld Order by Henry Kissinger_M.Mujeeb Riaz .pdf
World Order by Henry Kissinger_M.Mujeeb Riaz .pdf
 
Gestalat Theory of Visual Perception_Mujeeb Riaz .pdf
Gestalat Theory of Visual Perception_Mujeeb Riaz .pdfGestalat Theory of Visual Perception_Mujeeb Riaz .pdf
Gestalat Theory of Visual Perception_Mujeeb Riaz .pdf
 
Book Review The Prince_ Niccolo Machiavelli.pdf
Book Review The Prince_ Niccolo Machiavelli.pdfBook Review The Prince_ Niccolo Machiavelli.pdf
Book Review The Prince_ Niccolo Machiavelli.pdf
 
Threads Vs Twitter_ M.Mujeeb Riaz.pdf
Threads Vs Twitter_ M.Mujeeb Riaz.pdfThreads Vs Twitter_ M.Mujeeb Riaz.pdf
Threads Vs Twitter_ M.Mujeeb Riaz.pdf
 
Difference between Business Intelligence and Business Analytics_Mujeeb Riaz.pdf
Difference between Business Intelligence and Business Analytics_Mujeeb Riaz.pdfDifference between Business Intelligence and Business Analytics_Mujeeb Riaz.pdf
Difference between Business Intelligence and Business Analytics_Mujeeb Riaz.pdf
 
Email Marketing_M.Mujeeb Riaz .pdf
Email Marketing_M.Mujeeb Riaz .pdfEmail Marketing_M.Mujeeb Riaz .pdf
Email Marketing_M.Mujeeb Riaz .pdf
 
How AI is going to change the world _M.Mujeeb Riaz.pdf
How AI is going to change the world _M.Mujeeb Riaz.pdfHow AI is going to change the world _M.Mujeeb Riaz.pdf
How AI is going to change the world _M.Mujeeb Riaz.pdf
 
Photography tips for kids M.Mujeeb Riaz
Photography tips for kids  M.Mujeeb RiazPhotography tips for kids  M.Mujeeb Riaz
Photography tips for kids M.Mujeeb Riaz
 
How to launch successful advertising campaign _mujeeb riaz
How to launch successful advertising campaign _mujeeb riazHow to launch successful advertising campaign _mujeeb riaz
How to launch successful advertising campaign _mujeeb riaz
 
Adobe Premiere Pro: An Introduction to the Basics_Mujeeb Riaz
Adobe Premiere Pro: An Introduction to the Basics_Mujeeb RiazAdobe Premiere Pro: An Introduction to the Basics_Mujeeb Riaz
Adobe Premiere Pro: An Introduction to the Basics_Mujeeb Riaz
 
Lesson Plan Mujeeb Riaz
Lesson Plan Mujeeb Riaz Lesson Plan Mujeeb Riaz
Lesson Plan Mujeeb Riaz
 
How to earn on amazone
How to earn on amazoneHow to earn on amazone
How to earn on amazone
 
Logo Design _From Concept to Creation
Logo Design _From Concept to Creation Logo Design _From Concept to Creation
Logo Design _From Concept to Creation
 
Design Thinking _ M.Mujeeb Riaz
Design Thinking _ M.Mujeeb Riaz Design Thinking _ M.Mujeeb Riaz
Design Thinking _ M.Mujeeb Riaz
 
SEO Search Engine optimization M.Mujeeb Riaz
SEO Search Engine optimization  M.Mujeeb RiazSEO Search Engine optimization  M.Mujeeb Riaz
SEO Search Engine optimization M.Mujeeb Riaz
 
Photography Lighting Techniques_M.Mujeeb Riaz
Photography Lighting Techniques_M.Mujeeb RiazPhotography Lighting Techniques_M.Mujeeb Riaz
Photography Lighting Techniques_M.Mujeeb Riaz
 
Website design by using CMS _M.Mujeeb Riaz
Website design by using CMS _M.Mujeeb Riaz Website design by using CMS _M.Mujeeb Riaz
Website design by using CMS _M.Mujeeb Riaz
 
Camera Shots,Angles and Movements_M.Mujeeb Riaz
Camera Shots,Angles and Movements_M.Mujeeb RiazCamera Shots,Angles and Movements_M.Mujeeb Riaz
Camera Shots,Angles and Movements_M.Mujeeb Riaz
 
Types of Photography Genres _ M.Mujeeb Riaz
Types of Photography Genres _ M.Mujeeb RiazTypes of Photography Genres _ M.Mujeeb Riaz
Types of Photography Genres _ M.Mujeeb Riaz
 
Emotional intelligence _ M.Mujeeb Riaz
Emotional intelligence _ M.Mujeeb RiazEmotional intelligence _ M.Mujeeb Riaz
Emotional intelligence _ M.Mujeeb Riaz
 

Último

办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书saphesg8
 
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...jicagig173
 
When-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptxWhen-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptxReaper61
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...SocioCosmos
 
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfYouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfAlexander Sirach
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosSocioCosmos
 
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In DubaiDubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In Dubaihf8803863
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfTirupati Social Media
 
Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!andrekr997
 
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECTTHE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT17mos052
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comSagar Sinha
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer MarketingCut-the-SaaS
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenSapana Sha
 
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsUnveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsSocioCosmos
 
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar DelhiCall Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhidelhiescort
 
Amplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesAmplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesNetqom Solutions
 

Último (20)

办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书
 
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
 
When-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptxWhen-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptx
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...
 
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfYouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio Cosmos
 
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In DubaiDubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdf
 
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
 
Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!
 
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECTTHE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
 
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In  Vinod Nagarlooking for escort 9953056974 Low Rate Call Girls In  Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
 
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer Marketing
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking Men
 
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsUnveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
 
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar DelhiCall Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
 
Amplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesAmplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing Services
 
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
 

Cyber Crime and how to prevent it?

  • 1.
  • 2. Cyber Crime • Any illegal or illegtimate activity that is done via computer or internet is called cyber crime. Some common cyber crimes and how we can resolve them: 1) Financial Frauds 2) Cyber Terrorism 3) Cyber Extortion 4) Cyber Warfare ( Hacking of nuclear plants, 5) energy resources, radio, TV channel, military websites etc. 6) Computer Hacking 7) Offensive adult content 8) Online Harassment 9) Drugs Selling
  • 3. How to control cyber crime? Financial frauds • Any organization must have an experienced IT team to control all the development of codes and servers. • There should be some extra security codes which should be used while using credit/debit card online such a verification code. • No mobile access should be given to employees to access the website panel or computer information from outside the office premises.
  • 4. Cyber Terrorism • Make sure the computer are firewall protected. • Make sure the computers are always using anti virus. • The idea is not leaked by any employee. • Make sure there are multiple stages of security while assessing data. • Files are not publically open to all. • The and their names should be encrypted.
  • 5. Cyber Extortion • Never give your personal information to stranger online. • Try using anti virus and firewall in your PC. • Make sure your PC has a strong password to log in. • The files should not be on desktop , as it is easy to access. • Do not blackmailed by anyone, just call your police to register complain. • Connect to cyber crime cell in FIA.
  • 6. Cyber Warfare • Hire a professional team for your state network or sites. • There should be only limited people to access the main files. • Never use any theme for making website, they are dangerous. • Downloading and uploading should be done through single PC which is highly protected.
  • 7. Computer Hacking • Do not Instal any pirated softwares. • Do not install any .exe file if you are not aware of it. • Do not install or download any file that you receive in an email or from website that is not known worldwide. • Always use brand original website to download software and drivers. • Make sure your PC has a high security password. • Do not enter your personal information in public computers.
  • 8. Offensive or adult content • Do not click on links that appear on any site claiming you have won a lottery or you have a message. • Do not open any website that you feel unsafe. • Do not click on nay link that is sent to you through email from stranger. • Make sure your PC is not used by anyone else except the ones you trust. • Always check the email source.
  • 9. Online Harassment • Do not add anyone in your social media profile who is stranger. • Do not accept messages request that you feel unsafe. • Do not click on any link claiming or saying that you have won something or someone is using your photo. • Before making your profile on any social media channel, always go through privacy policies or features.