Cyber crime and security issues

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Security, Privacy, and Ethics Online Computer Crimes.
James Tam Computer Security Concepts covered Malicious computer programs Malicious computer use Security measures.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
CYBER CRIME AND SECURITY TRENDS
presentation topic : cyber crimes and security By ashwini awatare
Submitted by: Abhashree Pradhan CA (1)
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Cyber Crimes.
Unit 19 INTERNET SECURITY
Cyber crime & Security Prepared by : Rughani Zarana.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
 a crime committed on a computer network, esp. the Internet.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Types of Electronic Infection
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
Computer Crimes Career & Technology Education Department.
CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Topic 5: Basic Security.
Hurdles in implementation of cyber security in India.
Malicious Software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
CLICKTECHSOLUTION.COM.  INTRODUCTION  HISTORY OF CYBER CRIME  CATEGORIES OF CYBER CRIME  TYEPS OF CYBER CRIME  CYBERCRIMES THREATENS NATIONAL SECORITY.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Security and Ethics Safeguards and Codes of Conduct.
Presented by Presented by Daniel Lawrence Delgado CITCS BSIT 1-D.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
What is Cybercrime? Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs Cybercrime.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Computer safety Filip Hruby.
Managing Windows Security
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
CYBER SECURITY...
Seminar On Cyber Crime Submitted To: Submitted By:
The Best Way To Secure U R Self
Assalamualaikum Today, I am going to give a presentation on
COMPUTER CRIME.
Cyber Crimes Chunlian QU 9/18/2018.
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Ethics.
– Communication Technology in a Changing World
BCT 2.00 Analyze Technology Issues
ISNE101 Dr. Ken Cosh Week 13.
UNIT 18 Data Security 1.
Chapter 13 Security and Ethical Challenges.
King Saud University- College OF Applied Studies
Unit# 7: Future Enabling use of ICT
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
King Saud University- College OF Applied Studies
Entering the World of Cybercrime
Introduction-Cyber Safety
Presentation transcript:

Cyber crime and security issues Rahul Reddy Komireddy(11561794) Naresh Kumar Janga(11562701) Surender Reddy Guduru(11563088)

CONTENTS Introduction Definition History Cyber threat evolution Categories of cyber crime Types of cyber crime Prevention Security

Introduction The internet is becoming quickly. It has offered ascend to new open doors in each field we can consider be it stimulation, business, entertainment or instruction.  There're two sides to a coin. internet likewise has it's own weaknesses is Cyber wrongdoing illicit movement submitted on the web.

DEFINING CYBER CRIME  Cyber Crime committed by using a computer and the internet to steal data or informationfrom others. Import Illegal files. Malicious programs.

HISTORY The first cyber crime recorded in the year 1820.

CYBER THREAT EVOLUTION

CATEGORIES OF CYBER CRIME The computer as a target : using a computer system to attack on other’s computers. The computer as a weapon : using a computer to commit the real world crimes.

TYPES OF CYBER CRIME

HACKING Hacking in simple words an illegal intrusion into a computer system and/or network.

DENIAL OF SERVICE ATTACK

VIRUS DISSEMINATION The Malicious software is that attaches files itself to other software files. (ex: virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)

COMPUTER VANDALISM Damaging or destroying the data rather than stealing Transmission of virus

CYBER TERRORISM  Using the Internet based attacks in regular terrorist activities. Some Technology savvy terrorists are using 512-bit encryption, that which is not possible to decrypt.

SOFTWARE PIRACY illegal copying files from genuine programs. Distributing the products to pass for the originality.

TYPES OF CYBER ATTACK BY PERCENTAGE

SAFETY TIPS FOR CYBER CRIME

SECURITY

CYBER SECURITY

ADVANTAGES OF CYBER SECURITY

CONCLUSION Technology is devastating only in the hands of people who do not realize that they are one and the same process in the computer world.

THANK YOU