18
Cybercrime & Security

Cybercrime & Security

Embed Size (px)

Citation preview

Page 1: Cybercrime & Security

Cybercrime & Security

Page 2: Cybercrime & Security

INDEX• Introduction

• What is Cybercrime ?

• Cybercrimes in India

• Categorize of Cybercrimes

• Types of Cybercrimes

• Algorithms used for cybercrimes

• Security

Page 3: Cybercrime & Security

Introduction :

• The IT revolution resulted in a phenomenal increase in the

number of cyberspace users all over the world. The birth of the

internet resulted in networking which helped millions of users to

connect online, thus facilitating the sharing of information.

• In India also, there was an overwhelming increase in the number

of internet users.

Page 4: Cybercrime & Security

History:

• The first recorded cyber crime took place in the year 1820!

• In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime !

Page 5: Cybercrime & Security
Page 6: Cybercrime & Security

What is Cybercrime ?

• Cybercrime is a term for any illegal activity that uses a computer as its

primary means of commission.

• Cybercrime encompasses any criminal act dealing with computers

and networks (called hacking).

• Additionally, cyber crime also includes traditional crimes conducted through

the Internet.

Page 7: Cybercrime & Security
Page 8: Cybercrime & Security

Categories:

• The Computer as a Target : Using a computer

to attack other computer.

• The Computer as a Weapon : Using a computer

to commit a real world crime.

Page 9: Cybercrime & Security

Types of Cybercrimes

• Hacking

• Child Pornography

• Denial of Service attack

• Virus Dissemination

• Computer Vandalism

• Cyber Terrorism

• Software Piracy

Page 10: Cybercrime & Security

Some algorithms used in Cybercrimes:

• Heart bleed

• Shellshock

• Poodle

• Rosetta Flash

• Facebook hosted DDoS with notes app

• Google Two Factors Authentication bypass

Page 11: Cybercrime & Security

Cyber Security

• Internet security is a branch of computer security specifically

related to the internet.

• Its objective is to establish rules and measure to use against

attacks over the Internet.

Page 12: Cybercrime & Security

Top 10 Cyber Crime Prevention Tips

• Use Strong Passwords

• Secure your computer

• Be Social-Media Savvy

• Secure your Mobile Devices

• Install the latest operating system updates

Page 13: Cybercrime & Security

Contd.....

• Protect your Data

• Secure your wireless network

• Protect your e-identity

• Avoid being scammed

• Call the right person for help

Page 14: Cybercrime & Security

Advantages of cyber security

• Protects system against viruses, worms, spyware and other unwanted

programs.

• Protection against data from theft.

• Protects the computer from being hacked.

• Minimizes computer freezing and crashes.

• Gives privacy to users

Page 15: Cybercrime & Security

The Disadvantages

• Firewalls can be difficult to configure correctly.

• Incorrectly configured firewalls may block users from performing certain actions on the Internet, until the firewall configured correctly.

• Makes the system slower than before.

• Need to keep updating the new software in order to keep security up to date.

• Could be costly for average user.

Page 16: Cybercrime & Security

Technology gives us power, but it does not and cannot tell us

how to use that power. Thanks to technology, we can instantly

communicate across the world, but it still doesn't help us know

what to say.

Jonathan Sacks

Page 17: Cybercrime & Security
Page 18: Cybercrime & Security