SlideShare a Scribd company logo
CYBER SECURITY
Unit :-1
INTRODUCTION TO CYBER CRIME
AKTU BCC-301
BCC-401
(3rd Sem)
(4th Sem)
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
The word “Cybercrime” was first coined in 1982 by
William Gibson but it gained popularity in 1984 through
his novel 'Neuromancer'.
Akash Arora (1999) was one of the earliest examples
of cybercrime in India. (Yahoo Case)
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
According to the 2020 Cost of Cybercrime Study by
Accenture, the average number of security breaches
experienced by organizations increased by 11%
between 2018 and 2019. Cybercrime is also becoming
more sophisticated, with the emergence of new
threats such as ransomware and advanced
persistent threats (APTs)
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cybercrime Era: Survival Mantra for the Netizens
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
CYBER SECURITY
BCC-301
BCC-401
(3rd Sem)
(4th Sem)
AKTU Unit:-2
CYBER CRIME
Mobile and Wireless Devices :-
SmartPhones combine the best
aspects of mobile and wireless
technologies and blend them into
a useful business tool.
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security
Unit :- 3
TOOLS AND METHODS USED IN CYBERCRIME
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security
Unit :- 4
Understanding Computer Forensics
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security
Unit :- 5
INTRODUCTION TO SECURITY POLICIES AND CYBER LAWS
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Cyber Security All 5 Unit Notes.pptx.pdf
Important Topics
Unit :- 1
AKTU
1. Cyber Crime - Definition + Origin + Types
2. Social Engineering - Example + Classification
3. How Criminals Plan the Attacks
4. Cyber Stalking - Types + Working
5. Botnets and Attack Vector + Diagram
> Long Questions :
Cyber Security
> Two Marks Questions :
1. Information Security (CIA Triad)
2. Cyber Criminals
3. A Global Perspective on Cyber Crime
4. Survival Mantra for Netizens
5. Cyber Cafe and its Safety Tips
Unit :- 2
1. Proliferation of Mobile and Wireless Devices
2. Credit Card Frauds in Mobile and Wireless Devices
3. Attacks on Mobile / Security Challenges
4. Mobile Devices : Security Implications for Organizations
5. Organizational Measures for Mobile
1. Mobile and Wireless Devices
2. Trends in Mobility
3. Mobile Viruses
> Two Marks Questions :
Cyber Security All 5 Unit Notes.pptx.pdf
Unit :- 3
1. Proxy Server and Anonymizers
2. Phising and Identity Theft
3. Virus and Worms / DoS and DDoS Attacks
4. SQL Injection and Buffer Overflow
1. Introduction - Stages of Attack
2. Steganography
3. Password Cracking / Keyloggers / Spywares
4. Trojan Horses and Backdoors
> Two Marks Questions :
Unit :- 4
1. Computer Forensics - Definition + Function + Needs
2. Forensic Analysis of E-Mail and Tools
3. Digital Forensic Life Cycle / Chain of Custody
4. Challenges in Computer Foresics
1. Digital Forensics
2. Digital Evidence
3. Network Forensics
4. Forensics and Social Networking Sites
> Two Marks Questions :
1. Information Security Policy and its Needs
2. Cyber Law - Importance
3. The Digital Personal Data Protection Bill 2023
4. Intellectual Property and its Legislation and Issues
1. Indian Cyber Law
2. Patents and Copyrights
3. Trademark
> Two Marks Questions :
Unit :- 5
THANK YOU!!
I-TECH WORLD (AKTU)
JOIN TELEGRAM GROUP FOR HAND
WRITTEN NOTES , QUANTUMS AND
OTHER STUDY MATERIAL.
LINK GIVEN IN DESCRIPTION BOX

More Related Content

PPTX
Iot based smart irrigation system
PDF
IOT Forensic Challenges
PPTX
M2M vs IoT: The Key Differences and Similarities
PDF
Power Aware Routing in Adhoc Networks
DOCX
Security and Privacy considerations in Internet of Things
PPTX
Routing Protocols in WSN
PPTX
Mobile Phone and SIM card cloning
PDF
Different Generations Of Mobile Technologies
Iot based smart irrigation system
IOT Forensic Challenges
M2M vs IoT: The Key Differences and Similarities
Power Aware Routing in Adhoc Networks
Security and Privacy considerations in Internet of Things
Routing Protocols in WSN
Mobile Phone and SIM card cloning
Different Generations Of Mobile Technologies

What's hot (20)

PPTX
localization in wsn
PPTX
Wireless Sensor Networks
PPTX
Wireless and mobile security
PPTX
Trojan virus & backdoors
PPTX
Smart Irrigation ppt
PPTX
Iot enabled technologies
PDF
Intrusion Detection System Project Report
PPTX
Encryption and Tokenization: Friend or Foe?
PDF
Emerging Memory Technologies
PPT
Ethical hacking: Conceitos básicos de Testes de penetração
PPTX
WSN Routing Protocols
PPTX
Cyber crime
DOCX
Research paper on cyber security.
PPTX
Cyber Threat Simulation Training
PPT
Ai Tdma
PDF
PDF
Coal Mine Safety Monitoring and Alerting System using IOT Based
PPS
Notes on gsm
PPT
Cellular communication
PPSX
EC/Bios Interaction Laptop Repair Course
localization in wsn
Wireless Sensor Networks
Wireless and mobile security
Trojan virus & backdoors
Smart Irrigation ppt
Iot enabled technologies
Intrusion Detection System Project Report
Encryption and Tokenization: Friend or Foe?
Emerging Memory Technologies
Ethical hacking: Conceitos básicos de Testes de penetração
WSN Routing Protocols
Cyber crime
Research paper on cyber security.
Cyber Threat Simulation Training
Ai Tdma
Coal Mine Safety Monitoring and Alerting System using IOT Based
Notes on gsm
Cellular communication
EC/Bios Interaction Laptop Repair Course
Ad

Similar to Cyber Security All 5 Unit Notes.pptx.pdf (20)

PPTX
Cybercrime and the Origins of Cybercrime
PPTX
Cyber crime & law
PPTX
UNIT 1Computer forensics science. .pptx
PPTX
cyber security and its importance .pptx
PDF
CS6004 Cyber Forensics
PDF
CS6004 Cyber Forensics
PPT
Secure Computer Forensics and its tools
PPTX
Cyber_security_EI _48,49,50.pptx
DOCX
BCC -401-aktu-Cyber-Security Unit-1.docx
PPTX
computer security and its relationship to computer forensic
PPTX
Cybercrime 131020055545-phpapp02
PDF
cybercrime-131020055545-phpapp02.pdf
PPTX
Cybercrime 131020055545-phpapp02
PPTX
Cybercrime And Cyber forensics
PPTX
Cyber crime
PPTX
Presentation on cyber crime and prevention
PPTX
NEW FORMS OF CYBER CRIMES MDHR.pptx
PDF
QUESTION BANK CYBER OPEN ELECTIVE.pdfjjj
PDF
Digital Forensics.pdf df ppt digital forensic
PPTX
Cyber crime and Security
Cybercrime and the Origins of Cybercrime
Cyber crime & law
UNIT 1Computer forensics science. .pptx
cyber security and its importance .pptx
CS6004 Cyber Forensics
CS6004 Cyber Forensics
Secure Computer Forensics and its tools
Cyber_security_EI _48,49,50.pptx
BCC -401-aktu-Cyber-Security Unit-1.docx
computer security and its relationship to computer forensic
Cybercrime 131020055545-phpapp02
cybercrime-131020055545-phpapp02.pdf
Cybercrime 131020055545-phpapp02
Cybercrime And Cyber forensics
Cyber crime
Presentation on cyber crime and prevention
NEW FORMS OF CYBER CRIMES MDHR.pptx
QUESTION BANK CYBER OPEN ELECTIVE.pdfjjj
Digital Forensics.pdf df ppt digital forensic
Cyber crime and Security
Ad

Recently uploaded (20)

PPTX
IDP PPT Format. .pptx
PDF
Biography of Mohammad Anamul Haque Nayan
PDF
Blue-Modern-Elegant-Presentation (1).pdf
PPTX
PE3-WEEK-3sdsadsadasdadadwadwdsdddddd.pptx
PDF
HR Jobs in Jaipur: 2025 Trends, Banking Careers & Smart Hiring Tools
PPTX
Sports and Dance -lesson 3 powerpoint presentation
PPT
BCH3201 (Enzymes and biocatalysis)-JEB (1).ppt
PDF
Entrepreneurship PowerPoint for students
PPTX
Nervous_System_Drugs_PPT.pptxXXXXXXXXXXXXXXXXX
PPTX
internship presentation of bsnl in colllege
PPTX
Definition and Relation of Food Science( Lecture1).pptx
PDF
RIBOSOMES.12.pdf kerala msc botany degree
PDF
Villa Thesis-Final.pdf NNNNNNNNNNNNNNNNNNNNNNNNNNNNN
PPTX
Foundations-of-Water-Resources-Planning2652.0032.pptx
PDF
Manager Resume for R, CL & Applying Online.pdf
PPTX
CORE 1 HOUSEKEEPING TOURISM SECTOR POWERPOINT
PPTX
Discovering the LMA Course by Tim Han.pptx
PPTX
cse couse aefrfrqewrbqwrgbqgvq2w3vqbvq23rbgw3rnw345
PPTX
退学买新西兰毕业证(WelTec毕业证书)惠灵顿理工学院毕业证国外证书制作
PPTX
Surgical thesis protocol formation ppt.pptx
IDP PPT Format. .pptx
Biography of Mohammad Anamul Haque Nayan
Blue-Modern-Elegant-Presentation (1).pdf
PE3-WEEK-3sdsadsadasdadadwadwdsdddddd.pptx
HR Jobs in Jaipur: 2025 Trends, Banking Careers & Smart Hiring Tools
Sports and Dance -lesson 3 powerpoint presentation
BCH3201 (Enzymes and biocatalysis)-JEB (1).ppt
Entrepreneurship PowerPoint for students
Nervous_System_Drugs_PPT.pptxXXXXXXXXXXXXXXXXX
internship presentation of bsnl in colllege
Definition and Relation of Food Science( Lecture1).pptx
RIBOSOMES.12.pdf kerala msc botany degree
Villa Thesis-Final.pdf NNNNNNNNNNNNNNNNNNNNNNNNNNNNN
Foundations-of-Water-Resources-Planning2652.0032.pptx
Manager Resume for R, CL & Applying Online.pdf
CORE 1 HOUSEKEEPING TOURISM SECTOR POWERPOINT
Discovering the LMA Course by Tim Han.pptx
cse couse aefrfrqewrbqwrgbqgvq2w3vqbvq23rbgw3rnw345
退学买新西兰毕业证(WelTec毕业证书)惠灵顿理工学院毕业证国外证书制作
Surgical thesis protocol formation ppt.pptx

Cyber Security All 5 Unit Notes.pptx.pdf

  • 1. CYBER SECURITY Unit :-1 INTRODUCTION TO CYBER CRIME AKTU BCC-301 BCC-401 (3rd Sem) (4th Sem)
  • 6. The word “Cybercrime” was first coined in 1982 by William Gibson but it gained popularity in 1984 through his novel 'Neuromancer'. Akash Arora (1999) was one of the earliest examples of cybercrime in India. (Yahoo Case)
  • 15. According to the 2020 Cost of Cybercrime Study by Accenture, the average number of security breaches experienced by organizations increased by 11% between 2018 and 2019. Cybercrime is also becoming more sophisticated, with the emergence of new threats such as ransomware and advanced persistent threats (APTs)
  • 19. Cybercrime Era: Survival Mantra for the Netizens
  • 41. CYBER SECURITY BCC-301 BCC-401 (3rd Sem) (4th Sem) AKTU Unit:-2 CYBER CRIME Mobile and Wireless Devices :- SmartPhones combine the best aspects of mobile and wireless technologies and blend them into a useful business tool.
  • 75. Cyber Security Unit :- 3 TOOLS AND METHODS USED IN CYBERCRIME
  • 108. Cyber Security Unit :- 4 Understanding Computer Forensics
  • 134. Cyber Security Unit :- 5 INTRODUCTION TO SECURITY POLICIES AND CYBER LAWS
  • 158. Important Topics Unit :- 1 AKTU 1. Cyber Crime - Definition + Origin + Types 2. Social Engineering - Example + Classification 3. How Criminals Plan the Attacks 4. Cyber Stalking - Types + Working 5. Botnets and Attack Vector + Diagram > Long Questions : Cyber Security
  • 159. > Two Marks Questions : 1. Information Security (CIA Triad) 2. Cyber Criminals 3. A Global Perspective on Cyber Crime 4. Survival Mantra for Netizens 5. Cyber Cafe and its Safety Tips
  • 160. Unit :- 2 1. Proliferation of Mobile and Wireless Devices 2. Credit Card Frauds in Mobile and Wireless Devices 3. Attacks on Mobile / Security Challenges 4. Mobile Devices : Security Implications for Organizations 5. Organizational Measures for Mobile 1. Mobile and Wireless Devices 2. Trends in Mobility 3. Mobile Viruses > Two Marks Questions :
  • 162. Unit :- 3 1. Proxy Server and Anonymizers 2. Phising and Identity Theft 3. Virus and Worms / DoS and DDoS Attacks 4. SQL Injection and Buffer Overflow 1. Introduction - Stages of Attack 2. Steganography 3. Password Cracking / Keyloggers / Spywares 4. Trojan Horses and Backdoors > Two Marks Questions :
  • 163. Unit :- 4 1. Computer Forensics - Definition + Function + Needs 2. Forensic Analysis of E-Mail and Tools 3. Digital Forensic Life Cycle / Chain of Custody 4. Challenges in Computer Foresics 1. Digital Forensics 2. Digital Evidence 3. Network Forensics 4. Forensics and Social Networking Sites > Two Marks Questions :
  • 164. 1. Information Security Policy and its Needs 2. Cyber Law - Importance 3. The Digital Personal Data Protection Bill 2023 4. Intellectual Property and its Legislation and Issues 1. Indian Cyber Law 2. Patents and Copyrights 3. Trademark > Two Marks Questions : Unit :- 5
  • 165. THANK YOU!! I-TECH WORLD (AKTU) JOIN TELEGRAM GROUP FOR HAND WRITTEN NOTES , QUANTUMS AND OTHER STUDY MATERIAL. LINK GIVEN IN DESCRIPTION BOX