cyber security -180512131139_Edited (1).pdf

EktaBajaj16 16 views 11 slides May 23, 2024
Slide 1
Slide 1 of 11
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11

About This Presentation

Its a presentation on cyber crime.


Slide Content

CYBER CRIME

BY: Siddhartha Chauhan
Type your text

Flow Of Presentation
Whatiscybercrime
CategoriesOfCyberCrime
Weaponsofcybercrime
CyberAttacksStatistics2014
SafetyTips

What is cyber crime
Criminalactivitycarriedoutbyusingcomputers
andtheInternettosteal
Apersonalinformationor
Illegalimportsor
Maliciousprograms

Categories Of Cyber Crime
1-Cybercrimesagainstpersons.
Harassment via E-Mails
Cyber stalking
2-Cyber crimes against property.
Theft of person’s details
misuse of credit card details
3-Cyber crimes against government.
Hacking government website, military
website

Weapons of cyber crime
HACKING
DENIAL OF SERVICE ATTACK
WEB JACKING
PHISHING

Hacking
Unauthorized access to any computer
systems or networks is known as ‘HACKING’.
That is accessing the information of others
without proper authorization.
DENIAL OF SERVICE ATTACK (DoS)
An attempt to make a machine or network
resource unavailable to its intended users.
It temporarily or indefinitely interrupt or
suspend services of a host connected to the
 Internet

Web jacking
Thistermisderivedfromthetermhijacking.
Thehackergainsaccessandcontroloverthe
websiteofanother.
Hemayevenmanipulateorchangetheinformation
ofthewebsite.
Thismaybedoneforfulfillingpoliticalobjectivesor
formoney.
PHISHING
The attempt to acquire sensitive information
such as usernames, passwords, and credit card
details (and sometimes, indirectly, money) by
masquerading as a trustworthy entity in
an electronic communication.

Cyber Attacks Statistics 2014

Safety Tips
Use antivirussoftware
Insert firewalls
Uninstall unnecessary software
Make online Payment with secure connection
Check security settings
Never give your full name or address to strangers
Don’t open emailsor attachments from unknown
sources.
Read Privacy policy carefully when you submit the
data through internet.
Turn off your Wi-Fiwhen you are not
using internet.