SlideShare a Scribd company logo
AJAY SINGH
B.TECH EC 3RD YEAR
1006331007
What is Cyberspace And
Cybercrime
Cyberspace
An electronic medium of computer system within which people
can communicate do research, or simply window shop.
Cybercrime
Crime committed using a computer and the internet i.e.
where the computer used as an object or subject of crime.
History
-The first recorded cyber crime took place in the year
1820.
-The first spam email took place in 1978 when it was
sent over the Arpanet
-The first VIRUS was installed on an Apple computer in
1982
Types of cyber crime
-Hacking
-Child pornography
-Computer vandalism
-DoS attack
-Virus Dissemination
-Software Piracy
-Net Extortion
-Phishing
-Spoofing

Hacking
-Illegal intrusion into a computer system and/or network.
i.e. Unauthorized access
Hacking Tools
• Keyloggers
• Sniffers
 Key loggers are provide
logging which you press on
the keyboard buttons.
 Hackers can steal your
passwords or your personal
informations.
Key loggers

 is computer software or computer hardware that can
intercept and log traffic passing over a digital network or
part of a network.
 Hackers can sniff your packets with some softwares or
hardwares and they can steal your creadit card
numbers, paswords or e-mails.
Sniffers
Child pornography
-Abuse children/teens sexually
-More children would be using the internet and more are the
chances of falling victim to the aggression of pedophiles
Computer vandalism
-Damaging or destroying data rather than stealing or reusing
DoS attack
-Floods the bandwidth of the victims network or fills his e-
mail box with spam mail depriving him of the services he is
entitled to access
Software piracy
-Theft of software through the illegal copying of genuine
programs

Virus Dissemination
 -Malicious software that attaches itself to other software (virus,
worms, Trojan Horse)
 Computer viruses can damage your computer software system
even cause collapse your system.
 İts can delete your files
Net extortion
-Copying the companies confidential data in order to extort said
company for huge amount
Phishing
-Act of sending an e-mail to a user falsely claiming to be an
established legitimate enterprise in an attempt to scam the user into
surrendering private information that will be used for identity theft
Spoofing
-Getting one computer on a network to pretend to have the identity
off another computer,, usually one with special access privileges ,so
as to obtain access to the other computers on the network.
Cyber crime threatens national security
-Ex union home minister Shivraj Patil said that the rising level of
cyber crime is an indication of an enormous threat to national
security.
-Everything is being operated through computer and hence the risk
increases.
-India is at eleventh position , U.S. being the first
-Increase in number of cases reported
cyber crime and security
cyber crime and security
Cyber security
-Involves protection of sensitive personal & business information
through prevention, detection and response to different online
attacks
-Protects from attacks by detecting and preventing

15-441 Networks Fall 2002 16
Why do we need
security?
 Protect vital information while still allowing access
to those who need it
 Trade secrets, medical records, etc.
 Provide authentication and access control for
resources
 Ex: AFS
 Guarantee availability of resources
 Ex: 5 9’s (99.999% reliability)

17
Who is vulnerable?
 Financial institutions and banks
 Internet service providers
 Pharmaceutical companies
 Government and defense agencies
 Contractors to various government agencies
 Multinational corporations
 ANYONE ON THE NETWORK
Do’s
-Install a firewall , pop-up blocker
-Ensure your virus definitions are up to date
-Use strong passwords , don’t give personal information unless
required(not even phone number)
-Use secure connections
-Disable file sharing , turn off internet when not in use
-Use spam filters , delete spam immediately
-Use various passwords for various accounts
-Don’t believe in everything you read online
-Open attachments carefully
-Beware of promises to make fast profits
-Be smart , don’t act foolish and help in spreading spam
Conclusion
The only system which is truly secure is one which is switched
off and unplugged.
So , only way to be safe is Pay attention and
Act smart.

References
 http://img208.imageshack.us/img208/1195/chart.jpg
 http://www.howdoigetridofspyware.com/wp-
content/uploads/2009/03/isitsafecompressed.jpg
 http://computersafetytips.files.wordpress.com/2008/12/comp
uter-virus-picturejpg.jpg
 http://wwwdelivery.superstock.com/WI/223/1614/PreviewC
omp/SuperStock_1614R-10559.jpg
 http://www.microsoft.com/protect/images/viruses/diagram.
jpg
 http://www.gulfnews.com/images/08/09/16/16_bz_atm_ban
k_hacker01_5.gif
 http://www.terminally-incoherent.com/blog/wp-
content/uploads/2007/12/hackers.png


More Related Content

PPTX
Phishing Awareness Training.pptx
PPT
Cyber Security and Cyber Awareness
PPTX
Cyber crime ✔
PPT
Cyberstalking
PPTX
Cyber crime social media &; family
PPTX
Cybercrime and security
PPTX
Cyber crime
PPTX
Different Types of Phishing Attacks
Phishing Awareness Training.pptx
Cyber Security and Cyber Awareness
Cyber crime ✔
Cyberstalking
Cyber crime social media &; family
Cybercrime and security
Cyber crime
Different Types of Phishing Attacks

What's hot (20)

PPTX
Cyber crime.ppt
PPTX
Cyber crime and its types
PPTX
Cyber crime and Security
PPTX
Cyber Crime And Security
PPTX
Cyber Crime
PPTX
Cyber crime
PPTX
It act and cyber crime
PPTX
PPT
Cyber crime and security
PPTX
Cybersecurity Awareness
PPTX
Cyber crime and issues
PPTX
PPT on Phishing
PPTX
Cyber crime & security
PPTX
Cyber crime-140128140443-phpapp02 (1)
PPTX
Cyber crime ppt
PPT
Cyber Crime & Security
PDF
Scams and-fraud-presentation
PDF
State of Cyber Crime in Banking Sector Today: Threats and Solutions
PPTX
Cyber crime and security
PPTX
Power point cybercrime
Cyber crime.ppt
Cyber crime and its types
Cyber crime and Security
Cyber Crime And Security
Cyber Crime
Cyber crime
It act and cyber crime
Cyber crime and security
Cybersecurity Awareness
Cyber crime and issues
PPT on Phishing
Cyber crime & security
Cyber crime-140128140443-phpapp02 (1)
Cyber crime ppt
Cyber Crime & Security
Scams and-fraud-presentation
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Cyber crime and security
Power point cybercrime
Ad

Viewers also liked (15)

PDF
Dissertation - Cyber Security
PPTX
What constitutes a cyber crime in the country
PPTX
Cyber crime and security
PPTX
Asis Verma cyber crime ppt
PPTX
Cyber crime & security
PPTX
An introduction to denial of service attacks
PPTX
Denial of service attack
PPTX
Basics of Denial of Service Attacks
PPTX
Denial of service attack
PPT
presentation on cyber crime and security
PPTX
Principles of Information Technology
PDF
Information Security (Dissertation)
PPTX
Cyber crime and security ppt
PPTX
Office 365: Do’s and Don’ts, Lessons learned from the field
Dissertation - Cyber Security
What constitutes a cyber crime in the country
Cyber crime and security
Asis Verma cyber crime ppt
Cyber crime & security
An introduction to denial of service attacks
Denial of service attack
Basics of Denial of Service Attacks
Denial of service attack
presentation on cyber crime and security
Principles of Information Technology
Information Security (Dissertation)
Cyber crime and security ppt
Office 365: Do’s and Don’ts, Lessons learned from the field
Ad

Similar to cyber crime and security (20)

PPTX
Cyber crime (do's&dont's)
PPTX
Cyber crime ppt
PDF
cybercrimeandtypes-19101817340 2.pdf
PPTX
CYBER CRIME - A Threat To Internet Users
PPT
Sahilmod 120315100301-phpapp01
PPTX
Computer Crime
PPTX
Cyber Crime &Cyber Awareness
PPTX
Cyber Security ( Action Against Cyber Crime )
PPT
Cyber crimes and their prevention
PPTX
Cyber crime and security
PPTX
cyber crime
PPTX
Cyber crime & law
PPTX
Cyber crime and security
PPTX
Cyber crime and security
PPTX
Cybersecurity2021
PPT
CYBER CRIME AND SECURITY
PPTX
Cyber Crime and Social Media Security
PPT
Cyber crime and forensic
PPTX
Cyber crime and Security
PPTX
Name parul
Cyber crime (do's&dont's)
Cyber crime ppt
cybercrimeandtypes-19101817340 2.pdf
CYBER CRIME - A Threat To Internet Users
Sahilmod 120315100301-phpapp01
Computer Crime
Cyber Crime &Cyber Awareness
Cyber Security ( Action Against Cyber Crime )
Cyber crimes and their prevention
Cyber crime and security
cyber crime
Cyber crime & law
Cyber crime and security
Cyber crime and security
Cybersecurity2021
CYBER CRIME AND SECURITY
Cyber Crime and Social Media Security
Cyber crime and forensic
Cyber crime and Security
Name parul

Recently uploaded (20)

PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Tartificialntelligence_presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
cuic standard and advanced reporting.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Group 1 Presentation -Planning and Decision Making .pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Tartificialntelligence_presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
MYSQL Presentation for SQL database connectivity
Reach Out and Touch Someone: Haptics and Empathic Computing
cuic standard and advanced reporting.pdf
A comparative analysis of optical character recognition models for extracting...
20250228 LYD VKU AI Blended-Learning.pptx
Spectroscopy.pptx food analysis technology
NewMind AI Weekly Chronicles - August'25-Week II
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Machine learning based COVID-19 study performance prediction
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Big Data Technologies - Introduction.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Agricultural_Statistics_at_a_Glance_2022_0.pdf

cyber crime and security

  • 1. AJAY SINGH B.TECH EC 3RD YEAR 1006331007
  • 2. What is Cyberspace And Cybercrime Cyberspace An electronic medium of computer system within which people can communicate do research, or simply window shop. Cybercrime Crime committed using a computer and the internet i.e. where the computer used as an object or subject of crime.
  • 3. History -The first recorded cyber crime took place in the year 1820. -The first spam email took place in 1978 when it was sent over the Arpanet -The first VIRUS was installed on an Apple computer in 1982
  • 4. Types of cyber crime -Hacking -Child pornography -Computer vandalism -DoS attack -Virus Dissemination -Software Piracy -Net Extortion -Phishing -Spoofing
  • 5.  Hacking -Illegal intrusion into a computer system and/or network. i.e. Unauthorized access Hacking Tools • Keyloggers • Sniffers
  • 6.  Key loggers are provide logging which you press on the keyboard buttons.  Hackers can steal your passwords or your personal informations. Key loggers
  • 7.   is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network.  Hackers can sniff your packets with some softwares or hardwares and they can steal your creadit card numbers, paswords or e-mails. Sniffers
  • 8. Child pornography -Abuse children/teens sexually -More children would be using the internet and more are the chances of falling victim to the aggression of pedophiles Computer vandalism -Damaging or destroying data rather than stealing or reusing
  • 9. DoS attack -Floods the bandwidth of the victims network or fills his e- mail box with spam mail depriving him of the services he is entitled to access Software piracy -Theft of software through the illegal copying of genuine programs
  • 10.  Virus Dissemination  -Malicious software that attaches itself to other software (virus, worms, Trojan Horse)  Computer viruses can damage your computer software system even cause collapse your system.  İts can delete your files Net extortion -Copying the companies confidential data in order to extort said company for huge amount
  • 11. Phishing -Act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft Spoofing -Getting one computer on a network to pretend to have the identity off another computer,, usually one with special access privileges ,so as to obtain access to the other computers on the network.
  • 12. Cyber crime threatens national security -Ex union home minister Shivraj Patil said that the rising level of cyber crime is an indication of an enormous threat to national security. -Everything is being operated through computer and hence the risk increases. -India is at eleventh position , U.S. being the first -Increase in number of cases reported
  • 15. Cyber security -Involves protection of sensitive personal & business information through prevention, detection and response to different online attacks -Protects from attacks by detecting and preventing
  • 16.  15-441 Networks Fall 2002 16 Why do we need security?  Protect vital information while still allowing access to those who need it  Trade secrets, medical records, etc.  Provide authentication and access control for resources  Ex: AFS  Guarantee availability of resources  Ex: 5 9’s (99.999% reliability)
  • 17.  17 Who is vulnerable?  Financial institutions and banks  Internet service providers  Pharmaceutical companies  Government and defense agencies  Contractors to various government agencies  Multinational corporations  ANYONE ON THE NETWORK
  • 18. Do’s -Install a firewall , pop-up blocker -Ensure your virus definitions are up to date -Use strong passwords , don’t give personal information unless required(not even phone number) -Use secure connections -Disable file sharing , turn off internet when not in use -Use spam filters , delete spam immediately -Use various passwords for various accounts -Don’t believe in everything you read online -Open attachments carefully -Beware of promises to make fast profits -Be smart , don’t act foolish and help in spreading spam
  • 19. Conclusion The only system which is truly secure is one which is switched off and unplugged. So , only way to be safe is Pay attention and Act smart.
  • 20.  References  http://img208.imageshack.us/img208/1195/chart.jpg  http://www.howdoigetridofspyware.com/wp- content/uploads/2009/03/isitsafecompressed.jpg  http://computersafetytips.files.wordpress.com/2008/12/comp uter-virus-picturejpg.jpg  http://wwwdelivery.superstock.com/WI/223/1614/PreviewC omp/SuperStock_1614R-10559.jpg  http://www.microsoft.com/protect/images/viruses/diagram. jpg  http://www.gulfnews.com/images/08/09/16/16_bz_atm_ban k_hacker01_5.gif  http://www.terminally-incoherent.com/blog/wp- content/uploads/2007/12/hackers.png
  • 21.