SlideShare a Scribd company logo
Cyber Crime &
Cyber Security
BY: SUDESHNA BISWAS
CST
II YEAR
CONTENT
– * INTRODUCTION
– *HISTORY OF CYBER CRIME
– *CATEGORIESOF CYBER CRIME
– *TYPESOF CYBER CRIME
– *CYBER SECURITY
– *ADVANTAGES AND DISADVANTAGESOF CYBER SECURITY
– *SAFETYTIPS OF CYBER CRIME
– *CONCLUSION
INTERODUCTION
CYBER CRIME is an activity done using
computers and Internet. We can say that
it is an unlawful acts wherein the computer
either a tool or target or both.
Cyber crime & cyber security 10
HYSTORY OF CYBER CRIME
 The first recorded cyber crime took place in
1820.
 That is not surprising considering the fact that
the abacus, which is through to be the earliest
from of a computer, has been around since
3500 B.c.
CATEGORIES OF CYBER
CRIME
We can categorize cyber crime in two ways.
 The computer as a target :- using a computer to attacks other
computer, e.g. Hacking,Virus/worms attacks, Dos attack etc.
 The computer as a weapon :- using a computer to commit real
word crime e.g. Cyber terrorism, Credit card fraud and
pornography etc.
TYPES OF CYBER CRIME
 HACKING :- Hacking is simple terms means an illegal intrusion info a computer system
and/or network.it is also known as ‘CRACKING’.Motive behind the crime called
‘HACKERS’.
 VIRUS DISSMINITION :- Software that attaches itself to other software. VIRUS, WORMS,
TROJAN HORSE, WEB JACKING, E-MAIL, BOMBING etc.
 COMPUTER VANDALISM :- Damaging or destroying data rather than stealing them is
called cyber vandalism. These are program that attach themselves to a file and then
circulate.
 DEMINAL OF SERVICE ATTACKES :- This is an act by the criminals who floods the
bandwidth of the victims network or files his E-mail box with spam mail depriving him of
the service he is entitled to access or provide. Many dos attacks, such as the ping of
death and tear drop attacks.
Cyber crime & cyber security 10
CYBER SECURITY
– CYBER SECURITY :- Cyber security involves protection of sensitive personal and
business information through prevention, detection and response to different
online attacks.
– PRIVACY POLICY :- Before submitting your name , e-mail, address, on a website
look for the sites privacy policy .
– DISABLE REMOTE CONNECTIVITY :- Some phones are equipped with wireless
technologies, such as Bluetooth, that can be used to connect to other devices or
computers . you should disable these features when they are not in use.
ADVANTAGES OF CYBER SECURITY
 The cyber security will defend us from critical
attacks.
 It helps us to browse the site, website.
 Internet security process all the incoming and
outgoing data on your computer.
 It will defend us from hacks and virus.
 Application of cyber security used in our PC needs update every week.
DISADVANTAGES OF CYBER
SECURITY
 It will be costly for average users.
 FIREWALLs can be difficult to configure correctly.
 Need to keep updating the new software in order to
keep security up to date.
 Make system sower than before.
SAFETY TIPS TO CYBER
CRIME
– Use antivirus software.
– Insert firewalls
– Uninstall unnecessary software
– Maintain backup
– Check security settings
CONCLUSION
– Cyber crime is indeed getting the recognition it deserves.
However, it is not going to restricted that easily . In fact ,
it is highly likely that cyber crime and its hackers will
continue developing and upgrading to stay ahead of the
law.
– So, to make us a safer we must need cyber security.
Cyber crime & cyber security 10

More Related Content

Cyber crime & cyber security 10

  • 1. Cyber Crime & Cyber Security BY: SUDESHNA BISWAS CST II YEAR
  • 2. CONTENT – * INTRODUCTION – *HISTORY OF CYBER CRIME – *CATEGORIESOF CYBER CRIME – *TYPESOF CYBER CRIME – *CYBER SECURITY – *ADVANTAGES AND DISADVANTAGESOF CYBER SECURITY – *SAFETYTIPS OF CYBER CRIME – *CONCLUSION
  • 3. INTERODUCTION CYBER CRIME is an activity done using computers and Internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 5. HYSTORY OF CYBER CRIME  The first recorded cyber crime took place in 1820.  That is not surprising considering the fact that the abacus, which is through to be the earliest from of a computer, has been around since 3500 B.c.
  • 6. CATEGORIES OF CYBER CRIME We can categorize cyber crime in two ways.  The computer as a target :- using a computer to attacks other computer, e.g. Hacking,Virus/worms attacks, Dos attack etc.  The computer as a weapon :- using a computer to commit real word crime e.g. Cyber terrorism, Credit card fraud and pornography etc.
  • 7. TYPES OF CYBER CRIME  HACKING :- Hacking is simple terms means an illegal intrusion info a computer system and/or network.it is also known as ‘CRACKING’.Motive behind the crime called ‘HACKERS’.  VIRUS DISSMINITION :- Software that attaches itself to other software. VIRUS, WORMS, TROJAN HORSE, WEB JACKING, E-MAIL, BOMBING etc.  COMPUTER VANDALISM :- Damaging or destroying data rather than stealing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.  DEMINAL OF SERVICE ATTACKES :- This is an act by the criminals who floods the bandwidth of the victims network or files his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many dos attacks, such as the ping of death and tear drop attacks.
  • 9. CYBER SECURITY – CYBER SECURITY :- Cyber security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks. – PRIVACY POLICY :- Before submitting your name , e-mail, address, on a website look for the sites privacy policy . – DISABLE REMOTE CONNECTIVITY :- Some phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers . you should disable these features when they are not in use.
  • 10. ADVANTAGES OF CYBER SECURITY  The cyber security will defend us from critical attacks.  It helps us to browse the site, website.  Internet security process all the incoming and outgoing data on your computer.  It will defend us from hacks and virus.  Application of cyber security used in our PC needs update every week.
  • 11. DISADVANTAGES OF CYBER SECURITY  It will be costly for average users.  FIREWALLs can be difficult to configure correctly.  Need to keep updating the new software in order to keep security up to date.  Make system sower than before.
  • 12. SAFETY TIPS TO CYBER CRIME – Use antivirus software. – Insert firewalls – Uninstall unnecessary software – Maintain backup – Check security settings
  • 13. CONCLUSION – Cyber crime is indeed getting the recognition it deserves. However, it is not going to restricted that easily . In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. – So, to make us a safer we must need cyber security.