ADVANCE CYBER SECURITY
&
HACKING
»What is Cyber Crime ?
Cyber Crime is a term used to broadly
describe criminal activity in which
computers or computer networks are a
tool, a target, or a place of Criminal
activity and include everything from
electronic cracking to the denial of
services attacks. It is also used to include
traditional crimes in which computer or
networks are used to enable the illicit
activity.
Computer crime mainly consist of
unauthorized access to computer system
data.
Cyber crime
 As per the reports yet India lost $8b in cyber-crime.
 India has suffered losses of approximately $8 billion due to
cyber-crime in 2011 and an estimated 14,392 websites in
the country were hacked in 2012.
 For the corporate sector, the news is alarming as nearly 80
per cent of Indian business enterprises have reported data
theft thro-ugh online hacking.
 According to McAfee report India has the lowest rate of
security measure adoption
Cyber crime
 After some of drawback Indian Government is stepping
head to fight against Cyber Crime.
 A new group was made name as “Cyber Cell” to prevent
the cyber Crime…
 There are many cyber cell department all over the India.
As like in Mumbai, Kerala, Hyderabad, Gujarat and some
other states also.
 Recently CID from Hyderabad have arrested the 4 Cyber
criminals on charges of online fraud.
Who are they ?
What they do?
How do they Harm you ?
0 20 40 60 80 100
Privacy Attack
E-mail Attacks
Sniffing Attacks
Input validiation
Social Engineering
Cyber crime
It is well says that teacher teach what on the book, but
students make the new version of that.
Today a well know IT Security and CEH providing firm "EC-
Council” have got hacked.
EC-Council is popular for its professional Certification on IT
security and Certified Ethical Hacker (CEH).
A Hacker name a Godzilla, who have breached the security of
the Pakistan Government website few months ago have once
again breached the security of EC-Council website.
Hackers claimed to gain access to admin portal of the site and
accessed all the course material of the
CEHv8,CHFIV4, ECSS,ECSA_LPT4 as per the ETH post.
This shows that no one is 100% secure in the cyber world.
Hackers mention to have multiple types of vulnerabilities on
the site, but he have not mention the specific vulnerabilities.
Best know for manufacturing Mother Board, a Taiwan based
computer hardware producing company Gigabyte
technology's website site has been hacked and defaced
today by The TurkishAjan hacker group.
There were totally four sub-domains of Gigabyte technology
that have been defaced. Hackers have not mention any
specific reason for attack. On the deface page they just
wrote "Hacked by Hacked by TurkishAjan. Bazen birseyleri
degistirmek gerekir. Sometimes must be something".
"Gigabyte Hacked !
zone: http://goo.gl/UAbkt file:http://goo.gl/PbcuI #hack
#news #gigabyte" as written on twitter account.
RAR file contains many of the employees details as like Full
name, Email id's and plain text of passwords. Rar file is of
size some thing 10.38 mb that was uploaded.
Cyber crime
Cyber crime
Cyber crime
Cyber crime
Cyber crime

More Related Content

PDF
Cyber security
PPTX
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
PPT
Cyber security for an organization
PDF
Cyber Security Threats and Data Breaches
PPTX
Cybersecurity
PPSX
Cyber security & Data Protection
PPTX
Cyber security 07
PPTX
Cyber security
Cyber security
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Cyber security for an organization
Cyber Security Threats and Data Breaches
Cybersecurity
Cyber security & Data Protection
Cyber security 07
Cyber security

What's hot (20)

PDF
Cyber Security India & Cyber Crime
PPTX
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
PDF
Norton Cyber Security Insights Report 2017
PPTX
Cybercrime trends in last five years
PDF
Cyber security; one banker s perspective
PPT
Cyber law and password protection
PPTX
Cyber Crime and a Case Study
PDF
2017 Cybersecurity Predictions
PPTX
Cyber security and Cyber Crime
PPTX
Cyber security basics
PPTX
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
PPTX
Cyber security presentation
PPTX
Cyber cure tech. pvt. ltd. copy
PDF
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
PPTX
Cybersecurity 2 cyber attacks
DOCX
Final report ethical hacking
PDF
Cyber Security in Manufacturing
PPTX
Hacking ppt
PDF
Cyber Security - Flier
PPTX
Cybercrime & Cybersecurity
Cyber Security India & Cyber Crime
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Norton Cyber Security Insights Report 2017
Cybercrime trends in last five years
Cyber security; one banker s perspective
Cyber law and password protection
Cyber Crime and a Case Study
2017 Cybersecurity Predictions
Cyber security and Cyber Crime
Cyber security basics
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Cyber security presentation
Cyber cure tech. pvt. ltd. copy
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Cybersecurity 2 cyber attacks
Final report ethical hacking
Cyber Security in Manufacturing
Hacking ppt
Cyber Security - Flier
Cybercrime & Cybersecurity
Ad

Similar to Cyber crime (20)

PPTX
Name parul
PPTX
Name parul
PPTX
Cyber Crime
PPT
CYBER CRIME PRESENTATION and awareness.ppt
PPT
liullwkjajjlkjsd892009jlaoijlajkjkdfCYBER-CRIME PRESENTATION.ppt
DOCX
87161911 selected-case-studies-on-cyber-crime
PPT
Introduction to CYBER-CRIME PRESENTATION.ppt
PPTX
Cybercrime and security.pptx
PPTX
Cyber security talks 2019 by theko moima
PPT
CYBER-CRIME PRESENTATION.ppt
PPT
Cybercrimes and legal enforcement in India.ppt
PPT
CYBER CRIME PRESENTATION for Law Students for Semester four
PPT
CYBER-CRIME PRESENTATION with real-time examples
PPT
cyber crimes ppt computer vulnerability softeware testing
PPTX
cybercrime.pptx
PPTX
Asis Verma cyber crime ppt
PPTX
Cybercrime
PPTX
Cybercrime
PPT
Cyber crime & security final tapan
PPTX
Cyber crime
Name parul
Name parul
Cyber Crime
CYBER CRIME PRESENTATION and awareness.ppt
liullwkjajjlkjsd892009jlaoijlajkjkdfCYBER-CRIME PRESENTATION.ppt
87161911 selected-case-studies-on-cyber-crime
Introduction to CYBER-CRIME PRESENTATION.ppt
Cybercrime and security.pptx
Cyber security talks 2019 by theko moima
CYBER-CRIME PRESENTATION.ppt
Cybercrimes and legal enforcement in India.ppt
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER-CRIME PRESENTATION with real-time examples
cyber crimes ppt computer vulnerability softeware testing
cybercrime.pptx
Asis Verma cyber crime ppt
Cybercrime
Cybercrime
Cyber crime & security final tapan
Cyber crime
Ad

More from Sourabh Badve (8)

PPTX
Ipsec 2
PPTX
Ip routing
PPTX
Basic ip traffic management with access control lists
PPT
Cryptography
PPTX
Basic router configuration
PDF
Corporate security
PPT
Cyber laws
PPT
Ethical hacking
Ipsec 2
Ip routing
Basic ip traffic management with access control lists
Cryptography
Basic router configuration
Corporate security
Cyber laws
Ethical hacking

Recently uploaded (20)

PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PPTX
MICROPARA INTRODUCTION XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
PDF
Farming Based Livelihood Systems English Notes
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
Civil Department's presentation Your score increases as you pick a category
PDF
IP : I ; Unit I : Preformulation Studies
PDF
Empowerment Technology for Senior High School Guide
PPTX
Module on health assessment of CHN. pptx
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PPTX
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
PDF
CRP102_SAGALASSOS_Final_Projects_2025.pdf
PDF
Everyday Spelling and Grammar by Kathi Wyldeck
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
INSTRUMENT AND INSTRUMENTATION PRESENTATION
PDF
My India Quiz Book_20210205121199924.pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
MICROPARA INTRODUCTION XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Farming Based Livelihood Systems English Notes
Core Concepts of Personalized Learning and Virtual Learning Environments
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Civil Department's presentation Your score increases as you pick a category
IP : I ; Unit I : Preformulation Studies
Empowerment Technology for Senior High School Guide
Module on health assessment of CHN. pptx
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
CRP102_SAGALASSOS_Final_Projects_2025.pdf
Everyday Spelling and Grammar by Kathi Wyldeck
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
INSTRUMENT AND INSTRUMENTATION PRESENTATION
My India Quiz Book_20210205121199924.pdf

Cyber crime

  • 2. »What is Cyber Crime ?
  • 3. Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of Criminal activity and include everything from electronic cracking to the denial of services attacks. It is also used to include traditional crimes in which computer or networks are used to enable the illicit activity. Computer crime mainly consist of unauthorized access to computer system data.
  • 5.  As per the reports yet India lost $8b in cyber-crime.  India has suffered losses of approximately $8 billion due to cyber-crime in 2011 and an estimated 14,392 websites in the country were hacked in 2012.  For the corporate sector, the news is alarming as nearly 80 per cent of Indian business enterprises have reported data theft thro-ugh online hacking.  According to McAfee report India has the lowest rate of security measure adoption
  • 7.  After some of drawback Indian Government is stepping head to fight against Cyber Crime.  A new group was made name as “Cyber Cell” to prevent the cyber Crime…  There are many cyber cell department all over the India. As like in Mumbai, Kerala, Hyderabad, Gujarat and some other states also.  Recently CID from Hyderabad have arrested the 4 Cyber criminals on charges of online fraud.
  • 8. Who are they ? What they do? How do they Harm you ?
  • 9. 0 20 40 60 80 100 Privacy Attack E-mail Attacks Sniffing Attacks Input validiation Social Engineering
  • 11. It is well says that teacher teach what on the book, but students make the new version of that. Today a well know IT Security and CEH providing firm "EC- Council” have got hacked. EC-Council is popular for its professional Certification on IT security and Certified Ethical Hacker (CEH). A Hacker name a Godzilla, who have breached the security of the Pakistan Government website few months ago have once again breached the security of EC-Council website. Hackers claimed to gain access to admin portal of the site and accessed all the course material of the CEHv8,CHFIV4, ECSS,ECSA_LPT4 as per the ETH post. This shows that no one is 100% secure in the cyber world. Hackers mention to have multiple types of vulnerabilities on the site, but he have not mention the specific vulnerabilities.
  • 12. Best know for manufacturing Mother Board, a Taiwan based computer hardware producing company Gigabyte technology's website site has been hacked and defaced today by The TurkishAjan hacker group. There were totally four sub-domains of Gigabyte technology that have been defaced. Hackers have not mention any specific reason for attack. On the deface page they just wrote "Hacked by Hacked by TurkishAjan. Bazen birseyleri degistirmek gerekir. Sometimes must be something". "Gigabyte Hacked ! zone: http://goo.gl/UAbkt file:http://goo.gl/PbcuI #hack #news #gigabyte" as written on twitter account. RAR file contains many of the employees details as like Full name, Email id's and plain text of passwords. Rar file is of size some thing 10.38 mb that was uploaded.