This document provides an overview of cyber crime and cyber security. It discusses the history and categories of cyber crime, including hacking, virus dissemination, and denial of service attacks. The document also covers cyber security measures like privacy policies and disabling remote connectivity. Advantages include protection from attacks, while disadvantages are costs, configuration difficulties, and slower systems. Safety tips include using antivirus software, firewalls, backups, and checking security settings. In conclusion, cyber crime will likely continue evolving, so cyber security is needed to help protect users.
3. INTERODUCTION
CYBER CRIME is an activity done using
computers and Internet. We can say that
it is an unlawful acts wherein the computer
either a tool or target or both.
5. HYSTORY OF CYBER CRIME
The first recorded cyber crime took place in
1820.
That is not surprising considering the fact that
the abacus, which is through to be the earliest
from of a computer, has been around since
3500 B.c.
6. CATEGORIES OF CYBER
CRIME
We can categorize cyber crime in two ways.
The computer as a target :- using a computer to attacks other
computer, e.g. Hacking,Virus/worms attacks, Dos attack etc.
The computer as a weapon :- using a computer to commit real
word crime e.g. Cyber terrorism, Credit card fraud and
pornography etc.
7. TYPES OF CYBER CRIME
HACKING :- Hacking is simple terms means an illegal intrusion info a computer system
and/or network.it is also known as ‘CRACKING’.Motive behind the crime called
‘HACKERS’.
VIRUS DISSMINITION :- Software that attaches itself to other software. VIRUS, WORMS,
TROJAN HORSE, WEB JACKING, E-MAIL, BOMBING etc.
COMPUTER VANDALISM :- Damaging or destroying data rather than stealing them is
called cyber vandalism. These are program that attach themselves to a file and then
circulate.
DEMINAL OF SERVICE ATTACKES :- This is an act by the criminals who floods the
bandwidth of the victims network or files his E-mail box with spam mail depriving him of
the service he is entitled to access or provide. Many dos attacks, such as the ping of
death and tear drop attacks.
9. CYBER SECURITY
– CYBER SECURITY :- Cyber security involves protection of sensitive personal and
business information through prevention, detection and response to different
online attacks.
– PRIVACY POLICY :- Before submitting your name , e-mail, address, on a website
look for the sites privacy policy .
– DISABLE REMOTE CONNECTIVITY :- Some phones are equipped with wireless
technologies, such as Bluetooth, that can be used to connect to other devices or
computers . you should disable these features when they are not in use.
10. ADVANTAGES OF CYBER SECURITY
The cyber security will defend us from critical
attacks.
It helps us to browse the site, website.
Internet security process all the incoming and
outgoing data on your computer.
It will defend us from hacks and virus.
Application of cyber security used in our PC needs update every week.
11. DISADVANTAGES OF CYBER
SECURITY
It will be costly for average users.
FIREWALLs can be difficult to configure correctly.
Need to keep updating the new software in order to
keep security up to date.
Make system sower than before.
13. CONCLUSION
– Cyber crime is indeed getting the recognition it deserves.
However, it is not going to restricted that easily . In fact ,
it is highly likely that cyber crime and its hackers will
continue developing and upgrading to stay ahead of the
law.
– So, to make us a safer we must need cyber security.