Cybercrime is a criminal activity that involves using technology, such as computers or mobile devices, to commit illegal acts. These criminal activities can range from stealing sensitive information to disrupting critical infrastructure or even extortion. Cybercrime is a growing threat, as more and ...
Cybercrime is a criminal activity that involves using technology, such as computers or mobile devices, to commit illegal acts. These criminal activities can range from stealing sensitive information to disrupting critical infrastructure or even extortion. Cybercrime is a growing threat, as more and more aspects of our lives become connected to the internet.
To combat cybercrime, organizations need to prioritize cybersecurity. Cybersecurity involves implementing a range of security measures, such as network segmentation, access control, encryption, threat monitoring, and incident response planning. Security must be built into the design of systems and continuously monitored and updated to keep pace with emerging threats.
Effective cybersecurity also requires employee training and awareness programs to educate staff on the risks and best practices for securing systems. By taking a proactive approach to cybersecurity, organizations can protect their assets and reputation, and prevent financial losses and legal liabilities associated with cybercrime.
___साइबर अपराध एक अपराधिक गतिविधि है जो तकनीक का उपयोग करती है, जैसे कंप्यूटर या मोबाइल डिवाइस, अवैध कृत्य करने के लिए। इन अपराधिक गतिविधियों में संवेदनशील जानकारी चुराना से लेकर आवश्यक ढांचे को अवरुद्ध करने या उत्पादन बिगाड़ने तक की विस्तृत श्रृंखला शामिल हो सकती है। साइबर अपराध एक बढ़ती हुई खतरा है, क्योंकि हमारे जीवन के अधिकांश पहलुओं को इंटरनेट से जोड़ा जाता है।
साइबर अपराध से निपटने के लिए, संगठनों को साइबर सुरक्षा को प्राथमिकता देनी चाहिए। साइबर सुरक्षा में नेटवर्क विभाजन, पहुँच नियंत्रण, एन्क्रिप्शन, खतरा मॉनिटरिंग और घटना प्रतिक्रिया योजना जैसी विभिन्न सुरक्षा उपायों को लागू करना शामिल होता है। सुरक्षा को ढांचे के डिजाइन में बिल्ट करना आवश्यक होता है और नवीनतम खतरों के साथ कदम से कदम मिलाकर मॉनिटर और अपडेट किया जाना चाहिए।
अधिकृत साइबर सुरक्षा अभ्यास और जागरूकता कार्यक्रम भी आवश्यक हैं जो कर्मचारियों को सिस्टम सुरक्षा के जोखिम और सर्वोत्तम अभ्यासों के बारे में शिक्षित करने में मदद करते हैं। साइबर सुरक्षा के लिए एक सक्रिय दृष्टिकोण अपनाकर, संगठन अपनी संपत्ति और प्रतिष्ठा की रक्षा कर सकता है और साइबर अपराध से जुड़ी वित्तीय हानि और कानूनी दायित्वों से बच सकता है।
Size: 20.97 MB
Language: en
Added: Apr 24, 2023
Slides: 30 pages
Slide Content
CYBER
CRIME
HACKER
SECURITY
CODEINTERNET
OTP
COMPUTER
HACKER
CODE
MONEY
DATA
THIEF
PC
SAFETY
IDENTITY
PASSWORD
FRAUD
IDENTITY
MALWARE
CRIMINAL
TECHNOLOGY
ID
DATA
ONLINE
COMMUNICATION
LOSS
THIEF
PRIVACY
FISHING
FRAUD
BINARY
CRACKING
TOJAN VIRUS
MAIL
SPAM
INTERNET
HACKING
BLACKHAT
CRIMEHACKED
BINARY
STEAL
OTP
DIGITAL
COMMUNICATION
THIEF
WEB
LAPTOP
SAFETY
HACKER
SECURITY
CODEINTERNET
OTP
COMPUTER
HACKER
CODE
MONEY
DATA
THIEF
PC
SAFETY
IDENTITY
PASSWORD
FRAUD
IDENTITY
MALWARE
CRIMINAL
TECHNOLOGY
ID
DATA
ONLINE
COMMUNICATION
LOSS
THIEF
PRIVACY
FISHING
FRAUD
BINARY
CRACKING
TOJAN VIRUS
MAIL
SPAM
INTERNET
HACKING
BLACKHAT
CRIMEHACKED
BINARY
STEAL
OTP
DIGITAL
COMMUNICATION
THIEF
WEB
LAPTOP
SAFETY
CYBER
CRIME
Introduction
Hacker
A Black Hat hackersarecriminals
who break into computer networks
with malicious intent.
AGrayhathackersoftenlookfor
vulnerabilities in a system without
the owner's permission or knowledge.
If issues are found, they report them
to the owner, sometimes requesting a
small fee to fix the problem.
A white hat hackeror Ethical
hacker isan individual who uses
hacking skills to identify security
vulnerabilities in hardware,
software or networks.
Trojan
Fraud
OTP
Virus
Fraud
Worms
Some common ways to reach you by the attackers Malware
Password
cracking
SQL
injection
Phishing is a type of social engineering attack that targets the user and tricks them by sending fake
messages and emails to get sensitive information about the user or trying to download malicious software
and exploit it on the target system.
Identity thefthappens when someone steals your personal or sensitive information to commit
fraud. This theft is committed in many ways by gathering personal information such as
transactional information of another person to make transactions.
This term refers to the crime of unauthorized access to private computers or networks and
misuse of it either by shutting it down or tampering with the data stored or other illegal
approaches.
A malware attack isa common cyberattack where malware (normally malicious software) executes
unauthorized actions on the victim's system.
Spam isany kind of unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is
sent via email, but it can also be distributed via text messages, phone calls, or social media.
Hacking
The Most Common Cyber Attacks
Phishing
Identity
Theft
Malware
Attacks
spam
mail
1 2 3 4 5 6
No. of cases registered12317 21796 27248 44546 50035 52974
year 2016 2017 2018 2019 2020 2021
SOURCES : National Crime Records Bureau (NCRB)
12317
21796 27248 44546 50035 52974
If you think an attacker is not interested me…
Wrong!!!You are exactly what an attacker wants!
Why is cyber Cybersecurity is important!
You have
to deploy a
soldier in your system.
Use a combination of at least eight letters, numbers, and symbols.
For example-M0l#eb9Qv
Never use personal information in such as your name, birthday,
user name, or mobile number in your password.
Don't write your password in any paper or note book.
Don't write your password in mobile or computer.
Always use Multi-Factor Authentication to secure your account.
Multi-factor Authentication (MFA) isan authentication method that
requires the user to provide two or more verification factors to
gain access to a resource such as an application, online
account.
You can use Google Authenticator app
Disconnect Your Device from internet
Thefirstthingyouneedtodois
immediatelydisconnectthecompromised
devicefromtheInternet.
Back Up Your Files
Youshouldbackupyourfiles.Because
datacanbedestroyedorerasedinthe
processofrecoveringfromaphishing
attack.
If you already made the mistake of Clicking a phishing link or downloading a
malicious attachment, follow these steps to minimize the consequences.
(i)
(ii)
Change Your Credentials Malwarecanbeusedtoobtainsensitive
informationincludingonlineusernamesand
passwords,creditcardnumbers,bank
accountnumbers,andotheridentifying
information.Ifyouthinkyouhavebeen
trickedintoactingonaphishingmessage,
changeyouronlinecredentialsimmediately.
(iii)
ScanYourSystem for Malware
After you have disconnected your device from the Internet,
run a complete scan with your anti-virus program.Or
(iv)
1
23
4 5
Scan your system by this process
USB Drive
&
More
USB is common way hackers install ransomware
and other types of malware.
Don’tconnectunknownorunauthorized
mediaorDevices.
IfmakethismistakethenMalwareorvirus
installedinyoursystemwithoutyoudoing
anything.
Don’t make This Mistake
LikePenDrive,CDsorDVDs,USB,FleshDrive,
ExternalHardDisketc.
If You Find a Random USB Drive
Make sure the website you are visiting is secure or not
Check the information
HypertextTransferProtocolSecure(HTTPS)isaprotocol
thatsecurescommunicationanddatatransferbetween
auser'swebbrowserandawebsite.
Make sure that the website has HTTPS
www.ncrb.gov.in
www.cybercrime.gov.in
If you have been defrauded financially
Do This Step Contact Your Bank.
Report to local Police.
Block your current account and move your
money to Your New Account or Card.
Dial toll free no.1930
www.cybercrime.gov.in