Cyber Security, cyber crime and cyber safety all .pptx

sri223n 60 views 10 slides Oct 10, 2024
Slide 1
Slide 1 of 10
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10

About This Presentation

awsome


Slide Content

Cyber Security Presented By: Srishti Yadav

Cyber Security Cyber security is the capability of a system to protect information and system resources which are confidentiality and integrity form cybercrimes. The main advantages include the protection of sensitive data and smooth functioning of the system. However, the disadvantages are that it may be difficult to understand and it can be costly.

Need of Cyber Security Cyber Security plays a major role to protect us and our computer form different cyber criminals. In India, around 5,693 cyber crimes cases were reported in 2013. And the number of cyber crimes cases has grown 28 times and crossed 50 thousand in 2021. So, now it is necessary to know about cyber security to secure ourself.

Cyber Threat Cyber Crime Cybercrime is a type of crime involving a computer or a computer network such as hacking, phishing, identity theft, online fraud, and the distribution of malware. Cyber Attack A cyber-attack is a digital attack where individuals or group of individuals use networks or the internet to harm or gain unauthorized access to data or stealing sensitive data.

Types of Cyber Threat Cyber Bullying It involves insulting, threatening, harassing, someone online causing psychological effects. It may lead to depression, commit crimes even suicide. Prevention Tell an adult if you are being bullied. Don’t respond to unknown messages. If things seem to go out of hand, file a complaint. Always log out if you are using a public computer. Cyber Stalking: It means repeated insults or threats to terrorize someone and make fearful environment to an extent that one may lose his self-confidence and can also get depressed.

Identity Theft It involves using someone's personal information without their permission. Prevention Avoid messages which were sent by unknown source. Use a strong password and keep changing it. Keep constant check on bank account and credit card . Do not share extra personal information on internet. Social Engineering: Attack that manipulates or trick users to break security procedures to gain confidential information. Phishing: Sending fraud messages that appear to be from reputable sources to trick user into revealing information. Third Party Fraud: Fraud in which criminals may use ones identity without their consent to gain credit.

Intellectual Property Theft It refers to the unauthorized use or distribution of someone else's data, idea or intellectual property without proper permission or legal rights. Prevention Obtain patent or copyrights provides legal protection, established ownership rights and implement contract and licensing agreement helps to protect intellectual property. Ensures cybersecurity measures to protect data from unauthorized access. Software Piracy: It refers to illegal copying of licensed software and selling the copies as new software without permission at relatively cheaper price.

Malware Malicious software that is written to damage a computer or its contents is called malware. Viruses: Viruses attach themselves to the files and replicate itself. Ransomware: Stops some services on a device and threatens the user to pay a ransom. Worms: Self-replicating independent programs that spread across systems which takes up a lot of memory space and slows down the computer. Adware: Displays unwanted advertisements to users, often disrupting their online experience. Trojan Horse: Look like authentic software but when user executes it, the computer gets infected. Spyware: It is used to track of the browsing activity and sends it to third party without user knowledge . Prevention Use anti-malware and antivirus software. Use firewall that is a network security software. Always update operating system and software that you use. Always keep back-up of important files. Time to time scan the computer and external files. Avoid to use free and pirated software.

Hacking It involves manipulating or exploiting systems, networks, or software to gain unauthorized access, gather information, or disrupt normal functioning. Types of hacking – White Hat Hacking: Ethical hacking conducted by professionals to identify security vulnerabilities which protect companies and institutions against cyber threats. Black Hat Hacking: Malicious hacking activities performed with the intent to steal data or cause harm. They engage in illegal and unauthorized actions. Privacy on Internet It refers to the amount of information we share to others and the information we keep its own. By using cookies, supercookies, our IP address, HTTP referrer, user agent, etc. websites can track our browsing activity. Prevention While sharing information carefully read the privacy policy of the websites. Use anonymous or incognito browser so that your browsing history didn’t save. A VPN (Virtual Private Network) allows secured the data transfer on public network in encrypted form.

Cyber Law To deal with cyber-crimes, the Internet Technology Act 2000 was framed to punish the cyber criminals. To increase the rate of complaint against these crimes, cyber cell keeps the identity of the person secret who files the complaint. Conclusion In the end, we can say that the increase in the use of the internet also leads to an increase in crimes on the internet. So, this project helps individuals to learn about cybercrimes and prevention. It assists us in legally combating cybercrimes by understanding cyber law.
Tags