Download presentation
Presentation is loading. Please wait.
1
Cyber crime and security issues
Rahul Reddy Komireddy( ) Naresh Kumar Janga( ) Surender Reddy Guduru( )
2
CONTENTS Introduction Definition History Cyber threat evolution
Categories of cyber crime Types of cyber crime Prevention Security
3
Introduction The internet is becoming quickly. It has offered ascend to new open doors in each field we can consider be it stimulation, business, entertainment or instruction. There're two sides to a coin. internet likewise has it's own weaknesses is Cyber wrongdoing illicit movement submitted on the web.
4
DEFINING CYBER CRIME Cyber Crime committed by using a computer and the internet to steal data or informationfrom others. Import Illegal files. Malicious programs.
5
HISTORY The first cyber crime recorded in the year 1820.
6
CYBER THREAT EVOLUTION
7
CATEGORIES OF CYBER CRIME
The computer as a target : using a computer system to attack on other’s computers. The computer as a weapon : using a computer to commit the real world crimes.
8
TYPES OF CYBER CRIME
9
HACKING Hacking in simple words an illegal intrusion into a computer system and/or network.
10
DENIAL OF SERVICE ATTACK
11
VIRUS DISSEMINATION The Malicious software is that attaches files itself to other software files. (ex: virus, worms, Trojan Horse, web jacking, bombing etc.)
12
COMPUTER VANDALISM Damaging or destroying the data rather than stealing Transmission of virus
13
CYBER TERRORISM Using the Internet based attacks in regular terrorist activities. Some Technology savvy terrorists are using 512-bit encryption, that which is not possible to decrypt.
14
SOFTWARE PIRACY illegal copying files from genuine programs.
Distributing the products to pass for the originality.
15
TYPES OF CYBER ATTACK BY PERCENTAGE
16
SAFETY TIPS FOR CYBER CRIME
17
SECURITY
18
CYBER SECURITY
19
ADVANTAGES OF CYBER SECURITY
20
CONCLUSION Technology is devastating only in the hands of people who do not realize that they are one and the same process in the computer world.
21
THANK YOU
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.