SlideShare a Scribd company logo
Cyber security
Khandakar Mahmudur Rahaman
(15-01-04-066)
Prottasa Karim(15-01-04-080)
Debashis Roy(15-01-04-070)
Submitted To :
Sharmin Mam
Presented by :
Cyber security
Cyber Means
It is a combining form relating to
information technology,
the Internet,
and virtual reality.
Cyber security
• Cyber crime means any criminal or other offence
that is facilated by involves the use of electronic
communication or information system including
any devices or the internet or anyone or more of
them.
• Crime committed using a computer and the
internet to steal a person’s identity or illegal
imports or malicious programs. Cybercrime is
nothing but where the computer used as an
object or subject of crime.
Cyber security
Catagories of Cyber Crime
• The first recorded cyber crime took place in
1890.
• In 1970, One of the highest profiled banking
computer crime occurred, it cost over 1.5
million dollar.
• The first virus was installed on Apple
computer in1982, when a high school student,
Rick Skrenta developed the Elk cloner.
Cyber security
Hacking
Virus
Malware
Program horse tail
Password cracking or attack
Computer vandalism
DOS attack
Cyber security
Cyber security
Hacking
The word “Hacking” has
two definition
• The first definition refers
to the hobby/profession
of working with computer.
• The second definition
refers to breaking into
computer system.
How to prevent hacking
• Update operating system and web
browser
• Install a firewall
• Delete emails from unknown sources
• Install anti-spyware/adware program
• Change password often
• Download anti-virus software
• Always be aware
that is loaded
onto your computer
without your knowledge
and runs against
your wishes .
Install a security suite
that protects the
computer against
threats
such as viruses
and worms.
Cyber security
 Download an anti-malware
program that also
helps prevent infections.
 Activate Network Threat Protection,
Firewall, Antivirus.
Cyber security
Security suites, such as
Avast Internet Security,
Norton Internet Security
etc will prevent you from
downloading
Trojan Horses.
Cyber security
Use always Strong password.
Never use same password for two different
sites.
Cyber security
Solution
Don't be a fool …
Cyber security
• The law ensures five years imprisonment and
a fine of up to Taka 5 crore for offenders for
the first conviction and that could be
extended to 10 years imprisonment and Taka
10 crore as fine for each subsequent offence
of the same nature.
• Policemen can take any necessary action,
even breaking down doors and windows to
seize computers, according to this law.
Cyber security
Cyber Security Agency
Cyber security
Cyber security
Cyber security
Cyber security
Use anti-virus software’s
Insert firewalls
Maintain unnecessary software
Maintain backup
Check security settings
Learn more about Internet privacy
Cyber security
o www.Wikipedia.org
o www.avtest.org
o www.billmullins.blogspot.com
o www.digit/forum.com
o www.antivirusnews.com
o www.cybersecuritycrimes.com
o www.youtube.com
Cyber security
Thank You

More Related Content

PPTX
Cyber security system presentation
PPTX
Cybercrime a growing threat of 21 st century !!!
PPT
PPTX
Cyber Crime
PPTX
PPTX
Cyber crime & security
PPTX
Cyber security
PPTX
Cyber security
Cyber security system presentation
Cybercrime a growing threat of 21 st century !!!
Cyber Crime
Cyber crime & security
Cyber security
Cyber security

What's hot (20)

PPTX
Social engineering
PPTX
Cyber security
PPTX
Cyber security
PPTX
Cyber Crime and Security
PPTX
Cyber crime and security
PPTX
Cyber Crime and Cyber Security
PDF
Cyber Security Awareness
PPT
Cyber Crime and Security
PPT
Cyber security & Importance of Cyber Security
PPTX
Cyber Crime
PPTX
Cyber crime and security
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
Cyber crime ppt
PPTX
Cybercrime and Security
PPTX
Cyber crime.pptx
PPTX
Cyber crime ✔
PPT
Cyber Crime and Prevention Tips
PPTX
Phishing
PPTX
Security threats and safety measures
PPTX
Ransomware
Social engineering
Cyber security
Cyber security
Cyber Crime and Security
Cyber crime and security
Cyber Crime and Cyber Security
Cyber Security Awareness
Cyber Crime and Security
Cyber security & Importance of Cyber Security
Cyber Crime
Cyber crime and security
Cybersecurity Attack Vectors: How to Protect Your Organization
Cyber crime ppt
Cybercrime and Security
Cyber crime.pptx
Cyber crime ✔
Cyber Crime and Prevention Tips
Phishing
Security threats and safety measures
Ransomware
Ad

Viewers also liked (20)

PDF
帛琉五日
PDF
Vacante en Director de Ventas - Esri Colombia
PPT
Slide Da Atividade Educacional
PDF
環球影城六日
PPT
Power point in ped5 herwin
PPT
14 recursion
PDF
20160304埃及10日 直客版
PDF
20131006張家界八日
PPT
Binary search trees (1)
DOC
CVJM Update NYAMBE-F (2)
PDF
Bijoux ronaldo
PDF
Palestra Mariana
DOCX
ConnieJusticeCV-2016
PDF
Manual conciliação ok
PPTX
Linea de tiempo de literatura por monica llumiquinga
PDF
Material de trabajo informática i
PDF
Innovative Methods and Technologies in Project Management: Project Management...
PDF
Innovative Methods and Technologies in Project Management: Project Management...
PDF
Chancen 2013 - Seminare und Trainings - TUI Consulting und Services.pdf
帛琉五日
Vacante en Director de Ventas - Esri Colombia
Slide Da Atividade Educacional
環球影城六日
Power point in ped5 herwin
14 recursion
20160304埃及10日 直客版
20131006張家界八日
Binary search trees (1)
CVJM Update NYAMBE-F (2)
Bijoux ronaldo
Palestra Mariana
ConnieJusticeCV-2016
Manual conciliação ok
Linea de tiempo de literatura por monica llumiquinga
Material de trabajo informática i
Innovative Methods and Technologies in Project Management: Project Management...
Innovative Methods and Technologies in Project Management: Project Management...
Chancen 2013 - Seminare und Trainings - TUI Consulting und Services.pdf
Ad

Similar to Cyber security (20)

PPTX
Cyber_security_EI _48,49,50.pptx
PPTX
Cybercrime
PPTX
Cybercrime
PPTX
Eset cybersecurity awareness (laxman giri)
PPT
Cyber crime and cyber security
PPTX
CYBER CRIME AWARENESS (Thematic Presentation)
PPTX
It presentation cyber crime
PPTX
Cyber_Crime_Security.pptx
PPTX
Cyber Crime
PPTX
Cyber Crime and Security Presentation
PPT
cyber crime and privacy issues by varun call for assistence 8003498888
PPTX
Cyber crime and Security
PPT
Cyber crime and forensic
PPTX
Cyber crime
PPTX
Cyber Crime &Cyber Awareness
PPTX
Cyber crime
PPTX
Cyber crime
PPTX
Cyber crime and Security
PPTX
cybersecurity understanding in simple way
PPTX
Cybercrimeppt
Cyber_security_EI _48,49,50.pptx
Cybercrime
Cybercrime
Eset cybersecurity awareness (laxman giri)
Cyber crime and cyber security
CYBER CRIME AWARENESS (Thematic Presentation)
It presentation cyber crime
Cyber_Crime_Security.pptx
Cyber Crime
Cyber Crime and Security Presentation
cyber crime and privacy issues by varun call for assistence 8003498888
Cyber crime and Security
Cyber crime and forensic
Cyber crime
Cyber Crime &Cyber Awareness
Cyber crime
Cyber crime
Cyber crime and Security
cybersecurity understanding in simple way
Cybercrimeppt

Recently uploaded (20)

PPTX
innovation process that make everything different.pptx
PPTX
artificial intelligence overview of it and more
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
Introduction to Information and Communication Technology
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Testing WebRTC applications at scale.pdf
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
Funds Management Learning Material for Beg
PPT
tcp ip networks nd ip layering assotred slides
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
innovation process that make everything different.pptx
artificial intelligence overview of it and more
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Decoding a Decade: 10 Years of Applied CTI Discipline
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
presentation_pfe-universite-molay-seltan.pptx
Introduction to Information and Communication Technology
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Tenda Login Guide: Access Your Router in 5 Easy Steps
Testing WebRTC applications at scale.pdf
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Job_Card_System_Styled_lorem_ipsum_.pptx
Funds Management Learning Material for Beg
tcp ip networks nd ip layering assotred slides
Paper PDF World Game (s) Great Redesign.pdf
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
An introduction to the IFRS (ISSB) Stndards.pdf
Slides PDF The World Game (s) Eco Economic Epochs.pdf

Cyber security

  • 2. Khandakar Mahmudur Rahaman (15-01-04-066) Prottasa Karim(15-01-04-080) Debashis Roy(15-01-04-070) Submitted To : Sharmin Mam Presented by :
  • 4. Cyber Means It is a combining form relating to information technology, the Internet, and virtual reality.
  • 6. • Cyber crime means any criminal or other offence that is facilated by involves the use of electronic communication or information system including any devices or the internet or anyone or more of them. • Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs. Cybercrime is nothing but where the computer used as an object or subject of crime.
  • 9. • The first recorded cyber crime took place in 1890. • In 1970, One of the highest profiled banking computer crime occurred, it cost over 1.5 million dollar. • The first virus was installed on Apple computer in1982, when a high school student, Rick Skrenta developed the Elk cloner.
  • 11. Hacking Virus Malware Program horse tail Password cracking or attack Computer vandalism DOS attack
  • 14. Hacking The word “Hacking” has two definition • The first definition refers to the hobby/profession of working with computer. • The second definition refers to breaking into computer system.
  • 15. How to prevent hacking • Update operating system and web browser • Install a firewall • Delete emails from unknown sources • Install anti-spyware/adware program • Change password often • Download anti-virus software • Always be aware
  • 16. that is loaded onto your computer without your knowledge and runs against your wishes .
  • 17. Install a security suite that protects the computer against threats such as viruses and worms.
  • 19.  Download an anti-malware program that also helps prevent infections.  Activate Network Threat Protection, Firewall, Antivirus.
  • 21. Security suites, such as Avast Internet Security, Norton Internet Security etc will prevent you from downloading Trojan Horses.
  • 23. Use always Strong password. Never use same password for two different sites.
  • 26. Don't be a fool …
  • 28. • The law ensures five years imprisonment and a fine of up to Taka 5 crore for offenders for the first conviction and that could be extended to 10 years imprisonment and Taka 10 crore as fine for each subsequent offence of the same nature. • Policemen can take any necessary action, even breaking down doors and windows to seize computers, according to this law.
  • 35. Use anti-virus software’s Insert firewalls Maintain unnecessary software Maintain backup Check security settings Learn more about Internet privacy
  • 37. o www.Wikipedia.org o www.avtest.org o www.billmullins.blogspot.com o www.digit/forum.com o www.antivirusnews.com o www.cybersecuritycrimes.com o www.youtube.com