Cyber Crime & Security.pdf

2,521 views 30 slides Apr 24, 2023
Slide 1
Slide 1 of 30
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30

About This Presentation

Cybercrime is a criminal activity that involves using technology, such as computers or mobile devices, to commit illegal acts. These criminal activities can range from stealing sensitive information to disrupting critical infrastructure or even extortion. Cybercrime is a growing threat, as more and ...


Slide Content

CYBER
CRIME
HACKER
SECURITY
CODEINTERNET
OTP
COMPUTER
HACKER
CODE
MONEY
DATA
THIEF
PC
SAFETY
IDENTITY
PASSWORD
FRAUD
IDENTITY
MALWARE
CRIMINAL
TECHNOLOGY
ID
DATA
ONLINE
COMMUNICATION
LOSS
THIEF
PRIVACY
FISHING
FRAUD
BINARY
CRACKING
TOJAN VIRUS
MAIL
SPAM
INTERNET
HACKING
BLACKHAT
CRIMEHACKED
BINARY
STEAL
OTP
DIGITAL
COMMUNICATION
THIEF
WEB
LAPTOP
SAFETY
HACKER
SECURITY
CODEINTERNET
OTP
COMPUTER
HACKER
CODE
MONEY
DATA
THIEF
PC
SAFETY
IDENTITY
PASSWORD
FRAUD
IDENTITY
MALWARE
CRIMINAL
TECHNOLOGY
ID
DATA
ONLINE
COMMUNICATION
LOSS
THIEF
PRIVACY
FISHING
FRAUD
BINARY
CRACKING
TOJAN VIRUS
MAIL
SPAM
INTERNET
HACKING
BLACKHAT
CRIMEHACKED
BINARY
STEAL
OTP
DIGITAL
COMMUNICATION
THIEF
WEB
LAPTOP
SAFETY
CYBER
CRIME

Introduction

Hacker
A Black Hat hackersarecriminals
who break into computer networks
with malicious intent.
AGrayhathackersoftenlookfor
vulnerabilities in a system without
the owner's permission or knowledge.
If issues are found, they report them
to the owner, sometimes requesting a
small fee to fix the problem.
A white hat hackeror Ethical
hacker isan individual who uses
hacking skills to identify security
vulnerabilities in hardware,
software or networks.

Trojan
Fraud
OTP
Virus
Fraud
Worms
Some common ways to reach you by the attackers Malware
Password
cracking
SQL
injection

Phishing is a type of social engineering attack that targets the user and tricks them by sending fake
messages and emails to get sensitive information about the user or trying to download malicious software
and exploit it on the target system.
Identity thefthappens when someone steals your personal or sensitive information to commit
fraud. This theft is committed in many ways by gathering personal information such as
transactional information of another person to make transactions.
This term refers to the crime of unauthorized access to private computers or networks and
misuse of it either by shutting it down or tampering with the data stored or other illegal
approaches.
A malware attack isa common cyberattack where malware (normally malicious software) executes
unauthorized actions on the victim's system.
Spam isany kind of unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is
sent via email, but it can also be distributed via text messages, phone calls, or social media.
Hacking
The Most Common Cyber Attacks
Phishing
Identity
Theft
Malware
Attacks
spam
mail

1 2 3 4 5 6
No. of cases registered12317 21796 27248 44546 50035 52974
year 2016 2017 2018 2019 2020 2021
SOURCES : National Crime Records Bureau (NCRB)
12317
21796 27248 44546 50035 52974

If you think an attacker is not interested me…
Wrong!!!You are exactly what an attacker wants!

Why is cyber Cybersecurity is important!

You have
to deploy a
soldier in your system.

Use a combination of at least eight letters, numbers, and symbols.
For example-M0l#eb9Qv
Never use personal information in such as your name, birthday,
user name, or mobile number in your password.
Don't write your password in any paper or note book.
Don't write your password in mobile or computer.
Always use Multi-Factor Authentication to secure your account.
Multi-factor Authentication (MFA) isan authentication method that
requires the user to provide two or more verification factors to
gain access to a resource such as an application, online
account.
You can use Google Authenticator app

Disconnect Your Device from internet
Thefirstthingyouneedtodois
immediatelydisconnectthecompromised
devicefromtheInternet.
Back Up Your Files
Youshouldbackupyourfiles.Because
datacanbedestroyedorerasedinthe
processofrecoveringfromaphishing
attack.
If you already made the mistake of Clicking a phishing link or downloading a
malicious attachment, follow these steps to minimize the consequences.
(i)
(ii)
Change Your Credentials Malwarecanbeusedtoobtainsensitive
informationincludingonlineusernamesand
passwords,creditcardnumbers,bank
accountnumbers,andotheridentifying
information.Ifyouthinkyouhavebeen
trickedintoactingonaphishingmessage,
changeyouronlinecredentialsimmediately.
(iii)

ScanYourSystem for Malware
After you have disconnected your device from the Internet,
run a complete scan with your anti-virus program.Or
(iv)
1
23
4 5
Scan your system by this process

USB Drive
&
More
USB is common way hackers install ransomware
and other types of malware.
Don’tconnectunknownorunauthorized
mediaorDevices.
IfmakethismistakethenMalwareorvirus
installedinyoursystemwithoutyoudoing
anything.
Don’t make This Mistake
LikePenDrive,CDsorDVDs,USB,FleshDrive,
ExternalHardDisketc.
If You Find a Random USB Drive

Souseyourownchargeroradaptortochargeyour
phoneordevices.
Youcouldbecomeavictimof"juicejacking,"anew
cyber-thefttactic.Cybersecurityexpertshave
warnedthatcriminalscanloadmalwareonto
publicUSBchargingstationstomaliciously
accesselectronicdeviceswhiletheyarebeing
charged.MalwareinstalledthroughadirtyUSB
portcanlockadeviceorexportpersonaldataand
passwords.
Juicejackingisacyberattackinwhicha
compromisedUniversalSerialBus(USB)charging
stationtransfersmalwareto,orstealspersonal
informationfrom,aconnecteddevice.

Make sure the website you are visiting is secure or not
Check the information
HypertextTransferProtocolSecure(HTTPS)isaprotocol
thatsecurescommunicationanddatatransferbetween
auser'swebbrowserandawebsite.
Make sure that the website has HTTPS

www.ncrb.gov.in
www.cybercrime.gov.in

If you have been defrauded financially
Do This Step Contact Your Bank.
Report to local Police.
Block your current account and move your
money to Your New Account or Card.
Dial toll free no.1930
www.cybercrime.gov.in

Created By:
Mohan Pandey