SUBMITTED BY:-
VARUN
ME IST YR
ROLL NO -162220
Presentation on cyber security
 Definition.
 History.
 Categories of cyber crime.
 Types of cyber crime.
 IT Act.
 Safety tips.
 Cyber Security.
 Importance of Cyber security.
 Agencies involved in Cyber Security.
 Be vigilant and follow the tips.
 Cybercrime or Computer crime is crime that
involves a Computer and a Network .The
computer may have been used in the commission
of a crime, or it may be the target
 Crime committed using a computer and the
internet to steal data or information.
 Professor Debarati Halder and K. Jaishankar define
cybercrimes as: "Offences that are committed against
individuals or groups of individuals with a criminal
motive to intentionally harm the reputation of the victim
or cause physical or mental harm, or loss, to the victim
directly or indirectly, using modern telecommunication
networks
 The first recorded cyber crime was recorded in the year
1820.
 The person involved was JOSEPH-MARIE JACQUARD.
 He was a textile manufacture, he made looms.
 He invented looms that can store designs.
 Cyber crimes are broadly categorized into three
categories, namely crime against
 INDIVIDUAL (against people)
 PROPERTY (against properties)
 GOVERNMENT (against nation)
Presentation on cyber security
 INDIVIDUAL:-This type of cyber crime can be in
the form of cyber stalking, distributing
pornography, trafficking and “grooming”
 PROPERTY:-In this case, they can steal a person’s
bank details and siphon off money; misuse the
credit card to make numerous purchases online
 GOVERNMENT:-crimes against a government are
referred to as cyber terrorism. In this category,
criminals hack government websites, military
websites or circulate propaganda
Categories Of Cyber Crime
 When any crime is committed over the Internet it
is referred to as a cyber crime. There are many
types of cyber crimes:-
 Hacking
 Cyber Stalking
 cyber bullying
 Identity Theft
 Malicious Software
 Child soliciting and Abuse
 This is a type of crime wherein a person’s
computer is broken into so that his personal or
sensitive information can be accessed.
 The person engaged in hacking
activities is generally referred to
as a HACKER.
Hacker are the person who learn
About the computer system in details. they
write program referred to as hacks.
 Website Hacking
 Network Hacking
 Email Hacking
 Password Hacking
 Online Banking Hacking
 Computer Hacking
 Website Hacking : Hacking a website means
taking control from the website owner to a
person who hacks the website.
 Network Hacking: is generally means gathering
information about domain by using tools like
Telnet, Ns look UP, Ping, Tracert, Netstat, etc
over the network.
 Email hacking:- is illicit access to an email
account or email correspondence
 Password Hacking:- Password cracking is the
process of recovering secret passwords from
data that has been stored in or transmitted by a
computer system.
 Online banking Hacking:- Unauthorized
accessing bank accounts without knowing the
password or without permission of account
holder is known as Online banking hacking.
 Computer Hacking:- is when files on your
computer are viewed, created, or edited without
your authorization.
Website Hacking Network Hacking
Email hacking
Password Hacking
Online banking
Computer Hacking
 This is a kind of online harassment wherein the
victim is subjected to a criticisms of online
messages and emails.
 Target victim through chat room, message boards
and emails.
 Examples of cyber stalking
Threatening or obscene e-mail
Make fake social network account
Sending unsolicited email.
Cyber bullying is defined as electronically
mediated behaviors among peers such as making
fun of ,telling lies ,spreading rumors, threats and
sharing private information or picture without
permission to do so.
 Example of cyber bullying
Posting hurtful message on social network .
Spreading rumour online or through texts.
Stealing identity of person.
 This has become a major problem with people
using the Internet for cash transactions and
banking services. In this cyber crime, a criminal
accesses data about a person’s bank account,
credit cards, Social Security, debit card and other
sensitive information to buy things online in the
victim’s name.
Malicious software, commonly known as
MALWARE, is any software that brings harm to
a computer system. Malware can be in the form
of worms, viruses, Trojans, spyware, adware
and root kits, etc. which steal protected data,
delete documents or add software not approved
by a user.
 Virus
 Worms
 Trojan horse
 Fast Facts: Attaches to an executable file,
requires human action to spread.
A computer virus attach itself to a program or a file
enabling it to spread from one computer to
another. Almost all viruses are attached to an
executable file, which means the virus may exist
on your computer but it actually cannot infect your
computer unless you run or open the malicious
program.
 Dormant phase:- The virus program is idle during
this stage. The virus program has managed to
access the target user's computer or software, but
during this stage, the virus does not take any
action.
 Propagation phase:-The virus starts propagating,
that is multiplying and self-replicating itself. The
virus places a copy of itself into other programs or
into certain system areas on the disk. The copy
may not be identical to the propagating version.
 Triggering phase:- A dormant virus moves into his
phase when it is activated, and will now perform the
function for which it was intended. The triggering phase
can be caused by a variety of system events, including a
count of the number of times that this copy of the virus
has made copies of itself.
 Execution phase:- This is the actual work of the virus,
where the "payload" will be released. It can be
destructive such as deleting files on disk, crashing the
system, or corrupting files or relatively harmless such as
popping up humorous or political messages on screen.
Boot Viruses
 Infect the boot block on a floppy or hard disk
File Viruses
 Infect .EXE or .COM files
Multi-partite Viruses
 Infect both boot blocks and executable files.
Polymorphic Viruses
 Is self-modifying, changes each time it infects a file or
disk.
 Fast Facts:- Can replicate itself on system, does not
require human action to spread
A worm is similar to a virus by design and is considered
to be a sub-class of a virus. Worms spread from
computer to computer, but unlike a virus, it has the
capability to travel without any human action.
The biggest danger with a worm is its capability to
replicate itself on your system, so rather than your
computer sending out a single worm, it could send out
hundreds or thousands of copies of itself, creating a
huge devastating effect
 Fast Facts:- Appears useful but damages system,
requires human action to run, do not self-replicate.
The Trojan Horse, at first glance will appear to be
useful software but will actually do damage once
installed or run on your computer. Trojan is
activated on your computer, the results can vary.
Some Trojans are designed to be more annoying
than malicious (like changing your desktop, adding
silly active desktop icons)
 Lots of popup messages.
 The home page in your browser has changed.
 Programs start with no reason or interaction
from the user.
 Files and folders disappear.
 The PC feels slower than usual.
 Install Anti-Virus/Malware Software.
 Keep Your Anti-Virus Software Up to Date.
 Run Regularly Scheduled Scans with Your Anti-
Virus Software.
 Keep Your Operating System Current.
 Secure Your Network.
 Keep Your Personal Information Safe.
 Don’t Use Open Wi-Fi.
 Use Multiple Strong Passwords.
 This is also a type of cyber crime wherein
criminals solicit minors via chat rooms for the
purpose of child pornography.
 Child pornography is one of fastest bussiness
going online.
 1 in 5 girls and 1 in 20 boys is victim of child
sexual abuse
 In order to prevent child abuse you should:
 Explian your children the safety rules of the internet.
 Keep your home computer out in the open.
 Set up an internet protection program on the computers
your children use.
 Tell your children not to
give out passwords,
even to a good friend.
 Spam is unsolicited or bulk electronic message used to
promote material that is often not wanted or applicable to
the recipient
 The content of spam can also immoral ,illegal and
offensive
 spam is often refered to as unsolicated bulk
mail(ubm),excessive multi posting (emp),unsolicated
commerical mail(uce),spam mail,,bulk mail or junk mail
 The first spam message
 3rd may 1978
 Gary thuerk salesman a marketer for the Digital
Equipment Corporation, blasted out his
message Using ARPANET sent to 593
accounts numerous times to restrictions of email
account
 It's usually sent by a "spammer," a company in
the business of distributing unsolicited email
 The cost of spam is far less than postal bulk
mailings.
 15 million email addresses can be purchased for
as little as $129
 Sometimes they may buy your address .
 They obtain them by using software programs
known as "harvesters" that pluck names from
websites, newsgroups
 Don’t give out email addresses to unreliable sources.
 Delete spam mail without read them.
Read carefully when filling out online forms requesting
your e-mail address, and exercise your choice.
 Use multiple e-mail addresses.
 Short e-mail addresses are easy to guess, and may
receive more spam.
• Use of internet based attacks in terrorists
activities against computers/networks with the
intension of causing harm.
• Cyber terrorism can also include attacks on
Internet business, but when this is done for
economic motivations rather than ideological.
 Software piracy is the unauthorized or illegal copying,
distribution, or use of software. It is such a profitable
“Business" that it has caught the attention of organized
crime groups in a number of countries.
Presentation on cyber security
o Use Anti-virus software.
o Insert Firewall.
o Uninstall unnecessary software.
o Maintain Backup.
o Check security settings.
o Stay Anonymous - choose a genderless screen
name.
o Never give your full name or address to
strangers.
o Learn more about Internet Privacy.
Presentation on cyber security
 Cyber security denotes the technologies and
procedures intended to safeguard computers,
networks, and data from unlawful admittance,
weaknesses, and attacks transported through the
Internet
 Cyber security standards are security standards
which enable organizations to practice safe
security techniques to minimize the number of
successful cyber security attacks.
 Governments, military, corporations, financial
institutions, hospitals and other businesses collect,
process and store a great deal of confidential
information on computers and transmit that data
across networks to other computers. With the
growing volume and sophistication of cyber
attacks, ongoing attention is required to protect
sensitive business and personal information, as
well as safeguard national security.
 ISO 27001 is the international Cybersecurity
Standard that delivers a model for creating,
applying, functioning, monitoring, reviewing,
preserving, and improving an Information Security
Management System.
 The Ministry of Communication and Information
Technology under the government of India
provides a strategy outline called the National
Cybersecurity Policy. The purpose of this
government body is to protect the public and
private infrastructure from cyber-attacks.
Mission:-
To safeguard information and information infrastructure in
cyberspace.
 To build capabilities to prevent and respond to cyber
threats.
 To reduce vulnerabilities and minimize damage from
cyber incidents through a combination of institutional
structures, people, processes, technology, and
cooperation
 Vision:- To build a secure and resilient cyberspace for
citizens, businesses, and Government.
 Protects system against viruses, worms,
spyware and other unwanted programs.
 Protection against data from theft.
 Protects the computer from being hacked.
 Protect it from criminal attack.
 Application of cyber security used in our
computer need to be update every week.
 National Cyber Security Awareness Month is
designed to engage and educate public and
private sector partners through events and
initiatives with the goal of raising awareness about
cyber security and increasing the resiliency of the
nation in the event of a cyber incident.
October 2014 marks the 11th Annual National
Cyber Security Awareness Month
 CERT-In(Computer Emergency Response Team India)
 NCIIPC(National Critical Information Infrastructure
Protection Center)
 CS&C(Office Of Cyber Security & Communication)
 NCCIC(National Cyber Security & Communication
Integration Center)
 NCCC(National Cyber Coordination Center)
 Be vigilant and follow the tips given below while you
participate in online activities:
 Filter the visibility of personal information in social sites.
 Do not keep the "remember password" button active for
any email address and passwords
 Make sure your online banking platform is secure.
 Keep a watchful eye while shopping online.
 Do not save passwords on mobile devices.
 Secure the login details for mobile devices and
computers, etc.
 To tackle the issue of cybercrimes, CIDs (Criminal
Investigation Departments) of various cities opened up
Cyber Crime Cells in different cities.
 Process--
 Step 1- For Cyber Crime Complaint First of all write an
application in the name head of cyber crime cell.
 Step 2- Provide the following things with the application-
 Name
 Address
 Email address
 Telephone no.
 Step 3- For required documents there are two cases.
 a) In case of vulgar emails, abusive email etc the following
details is required cyber crime compliant-
 The header of email which is offending you.
 The email address of offending sender.
 b) In case of Hacking the following details is required for
cyber crime complaint-
 Logs of the server.
 A hard copy and soft copy of the defected page.
 If the data of the defected site is compromised then you will
need a soft copy of original data as well as compromised
data.
 Control mechanism details of access in which you have to tell
who has access the computer.
 If you have any doubt or your feeling suspicious about
anyone then you have to provide the list of these suspicions.
 Step 4- You can file the complaint from any cyber cell of any
of the cities and also send direct email on below given email
of Cyber Cell Police Station.
 Technology is destructive only in the hands of
people who do not realize that they are one
And the same process as the universe.
Presentation on cyber security

More Related Content

PPTX
Cyber crime - What is and types.
PPTX
cyber security
PPTX
Cyber crime
PDF
1. introduction to cyber security
PDF
Cyber Security
PPTX
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
PPTX
Cyber security government ppt By Vishwadeep Badgujar
PPTX
Cyber crime and security
Cyber crime - What is and types.
cyber security
Cyber crime
1. introduction to cyber security
Cyber Security
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
Cyber security government ppt By Vishwadeep Badgujar
Cyber crime and security

What's hot (20)

PPTX
Cyber Security A Challenges For Mankind
PPTX
Cyber security system presentation
PPTX
Cyber Crime and Security
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Cyber security
PPSX
Cyber crime
PDF
Cyber Security Awareness
PPTX
Cyber Security Presentation
PPSX
Cyber crime and cyber security
PDF
End-User Security Awareness
PPTX
Computer Hacking - An Introduction
PPTX
Cyber security
PPTX
Phishing attack seminar presentation
PPT
Cyber Crime
PPT
Internet Security
PPTX
Introduction to cybercrime
PPTX
Cyber Crime And Security
PDF
Network Security Presentation
PPTX
Cyber security
Cyber Security A Challenges For Mankind
Cyber security system presentation
Cyber Crime and Security
Network security (vulnerabilities, threats, and attacks)
Cyber security
Cyber crime
Cyber Security Awareness
Cyber Security Presentation
Cyber crime and cyber security
End-User Security Awareness
Computer Hacking - An Introduction
Cyber security
Phishing attack seminar presentation
Cyber Crime
Internet Security
Introduction to cybercrime
Cyber Crime And Security
Network Security Presentation
Cyber security
Ad

Similar to Presentation on cyber security (20)

PPTX
Cyber crime and security
PPTX
Cyber crimes
PPTX
Grade 7 Chap 10 Cyber Threats and Security
PPT
Introduction to CYBER-CRIME PRESENTATION.ppt
PDF
Security and Privacy.PDF
PPT
cyber crime
PDF
cybercrimeandtypes-19101817340 2.pdf
PPTX
Cyber crime and its types
PPTX
Cyber crime
PPTX
CYBER SECURITY FOR SCHOOL AND JUNIOR COLLEGE STUDENTS
PPT
cyber crime
PDF
Ch 1 intro to cyber crime and cyber security.pdf
PPTX
Cyber Crime and Social Media Security
PPTX
Cyber crime and security 1
PPTX
Cyber crime
PPT
Cyber Crime & Security
PPT
cyber crime and privacy issues by varun call for assistence 8003498888
PPTX
Cyber crime ppt
PPTX
Cyber Crime
PPTX
Cyber crime: A Quick Survey
Cyber crime and security
Cyber crimes
Grade 7 Chap 10 Cyber Threats and Security
Introduction to CYBER-CRIME PRESENTATION.ppt
Security and Privacy.PDF
cyber crime
cybercrimeandtypes-19101817340 2.pdf
Cyber crime and its types
Cyber crime
CYBER SECURITY FOR SCHOOL AND JUNIOR COLLEGE STUDENTS
cyber crime
Ch 1 intro to cyber crime and cyber security.pdf
Cyber Crime and Social Media Security
Cyber crime and security 1
Cyber crime
Cyber Crime & Security
cyber crime and privacy issues by varun call for assistence 8003498888
Cyber crime ppt
Cyber Crime
Cyber crime: A Quick Survey
Ad

Recently uploaded (20)

PPTX
Principal presentation for NAAC (1).pptx
PDF
Micro 4 New.ppt.pdf a servay of cells and microorganism
PPTX
Micro1New.ppt.pptx the mai themes of micfrobiology
PPTX
Module1.pptxrjkeieuekwkwoowkemehehehrjrjrj
PPTX
Micro1New.ppt.pptx the main themes if micro
PDF
Research on ultrasonic sensor for TTU.pdf
PDF
Present and Future of Systems Engineering: Air Combat Systems
PDF
Designing Fault-Tolerant Architectures for Resilient Oracle Cloud ERP and HCM...
PDF
electrical machines course file-anna university
PDF
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
PDF
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
PDF
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
PDF
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
PDF
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
PPT
Programmable Logic Controller PLC and Industrial Automation
PPTX
CS6006 - CLOUD COMPUTING - Module - 1.pptx
PDF
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
PPTX
Solar energy pdf of gitam songa hemant k
PPTX
MAD Unit - 3 User Interface and Data Management (Diploma IT)
PDF
Computer organization and architecuture Digital Notes....pdf
Principal presentation for NAAC (1).pptx
Micro 4 New.ppt.pdf a servay of cells and microorganism
Micro1New.ppt.pptx the mai themes of micfrobiology
Module1.pptxrjkeieuekwkwoowkemehehehrjrjrj
Micro1New.ppt.pptx the main themes if micro
Research on ultrasonic sensor for TTU.pdf
Present and Future of Systems Engineering: Air Combat Systems
Designing Fault-Tolerant Architectures for Resilient Oracle Cloud ERP and HCM...
electrical machines course file-anna university
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
Programmable Logic Controller PLC and Industrial Automation
CS6006 - CLOUD COMPUTING - Module - 1.pptx
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
Solar energy pdf of gitam songa hemant k
MAD Unit - 3 User Interface and Data Management (Diploma IT)
Computer organization and architecuture Digital Notes....pdf

Presentation on cyber security

  • 1. SUBMITTED BY:- VARUN ME IST YR ROLL NO -162220
  • 3.  Definition.  History.  Categories of cyber crime.  Types of cyber crime.  IT Act.  Safety tips.  Cyber Security.  Importance of Cyber security.  Agencies involved in Cyber Security.  Be vigilant and follow the tips.
  • 4.  Cybercrime or Computer crime is crime that involves a Computer and a Network .The computer may have been used in the commission of a crime, or it may be the target  Crime committed using a computer and the internet to steal data or information.
  • 5.  Professor Debarati Halder and K. Jaishankar define cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks
  • 6.  The first recorded cyber crime was recorded in the year 1820.  The person involved was JOSEPH-MARIE JACQUARD.  He was a textile manufacture, he made looms.  He invented looms that can store designs.
  • 7.  Cyber crimes are broadly categorized into three categories, namely crime against  INDIVIDUAL (against people)  PROPERTY (against properties)  GOVERNMENT (against nation)
  • 9.  INDIVIDUAL:-This type of cyber crime can be in the form of cyber stalking, distributing pornography, trafficking and “grooming”  PROPERTY:-In this case, they can steal a person’s bank details and siphon off money; misuse the credit card to make numerous purchases online  GOVERNMENT:-crimes against a government are referred to as cyber terrorism. In this category, criminals hack government websites, military websites or circulate propaganda Categories Of Cyber Crime
  • 10.  When any crime is committed over the Internet it is referred to as a cyber crime. There are many types of cyber crimes:-  Hacking  Cyber Stalking  cyber bullying  Identity Theft  Malicious Software  Child soliciting and Abuse
  • 11.  This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed.  The person engaged in hacking activities is generally referred to as a HACKER. Hacker are the person who learn About the computer system in details. they write program referred to as hacks.
  • 12.  Website Hacking  Network Hacking  Email Hacking  Password Hacking  Online Banking Hacking  Computer Hacking
  • 13.  Website Hacking : Hacking a website means taking control from the website owner to a person who hacks the website.  Network Hacking: is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc over the network.
  • 14.  Email hacking:- is illicit access to an email account or email correspondence  Password Hacking:- Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • 15.  Online banking Hacking:- Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.  Computer Hacking:- is when files on your computer are viewed, created, or edited without your authorization.
  • 16. Website Hacking Network Hacking Email hacking Password Hacking Online banking Computer Hacking
  • 17.  This is a kind of online harassment wherein the victim is subjected to a criticisms of online messages and emails.  Target victim through chat room, message boards and emails.  Examples of cyber stalking Threatening or obscene e-mail Make fake social network account Sending unsolicited email.
  • 18. Cyber bullying is defined as electronically mediated behaviors among peers such as making fun of ,telling lies ,spreading rumors, threats and sharing private information or picture without permission to do so.  Example of cyber bullying Posting hurtful message on social network . Spreading rumour online or through texts. Stealing identity of person.
  • 19.  This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to buy things online in the victim’s name.
  • 20. Malicious software, commonly known as MALWARE, is any software that brings harm to a computer system. Malware can be in the form of worms, viruses, Trojans, spyware, adware and root kits, etc. which steal protected data, delete documents or add software not approved by a user.
  • 21.  Virus  Worms  Trojan horse
  • 22.  Fast Facts: Attaches to an executable file, requires human action to spread. A computer virus attach itself to a program or a file enabling it to spread from one computer to another. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program.
  • 23.  Dormant phase:- The virus program is idle during this stage. The virus program has managed to access the target user's computer or software, but during this stage, the virus does not take any action.  Propagation phase:-The virus starts propagating, that is multiplying and self-replicating itself. The virus places a copy of itself into other programs or into certain system areas on the disk. The copy may not be identical to the propagating version.
  • 24.  Triggering phase:- A dormant virus moves into his phase when it is activated, and will now perform the function for which it was intended. The triggering phase can be caused by a variety of system events, including a count of the number of times that this copy of the virus has made copies of itself.  Execution phase:- This is the actual work of the virus, where the "payload" will be released. It can be destructive such as deleting files on disk, crashing the system, or corrupting files or relatively harmless such as popping up humorous or political messages on screen.
  • 25. Boot Viruses  Infect the boot block on a floppy or hard disk File Viruses  Infect .EXE or .COM files Multi-partite Viruses  Infect both boot blocks and executable files. Polymorphic Viruses  Is self-modifying, changes each time it infects a file or disk.
  • 26.  Fast Facts:- Can replicate itself on system, does not require human action to spread A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect
  • 27.  Fast Facts:- Appears useful but damages system, requires human action to run, do not self-replicate. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons)
  • 28.  Lots of popup messages.  The home page in your browser has changed.  Programs start with no reason or interaction from the user.  Files and folders disappear.  The PC feels slower than usual.
  • 29.  Install Anti-Virus/Malware Software.  Keep Your Anti-Virus Software Up to Date.  Run Regularly Scheduled Scans with Your Anti- Virus Software.  Keep Your Operating System Current.  Secure Your Network.  Keep Your Personal Information Safe.  Don’t Use Open Wi-Fi.  Use Multiple Strong Passwords.
  • 30.  This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography.  Child pornography is one of fastest bussiness going online.  1 in 5 girls and 1 in 20 boys is victim of child sexual abuse
  • 31.  In order to prevent child abuse you should:  Explian your children the safety rules of the internet.  Keep your home computer out in the open.  Set up an internet protection program on the computers your children use.  Tell your children not to give out passwords, even to a good friend.
  • 32.  Spam is unsolicited or bulk electronic message used to promote material that is often not wanted or applicable to the recipient  The content of spam can also immoral ,illegal and offensive  spam is often refered to as unsolicated bulk mail(ubm),excessive multi posting (emp),unsolicated commerical mail(uce),spam mail,,bulk mail or junk mail
  • 33.  The first spam message  3rd may 1978  Gary thuerk salesman a marketer for the Digital Equipment Corporation, blasted out his message Using ARPANET sent to 593 accounts numerous times to restrictions of email account
  • 34.  It's usually sent by a "spammer," a company in the business of distributing unsolicited email  The cost of spam is far less than postal bulk mailings.  15 million email addresses can be purchased for as little as $129
  • 35.  Sometimes they may buy your address .  They obtain them by using software programs known as "harvesters" that pluck names from websites, newsgroups
  • 36.  Don’t give out email addresses to unreliable sources.  Delete spam mail without read them. Read carefully when filling out online forms requesting your e-mail address, and exercise your choice.  Use multiple e-mail addresses.  Short e-mail addresses are easy to guess, and may receive more spam.
  • 37. • Use of internet based attacks in terrorists activities against computers/networks with the intension of causing harm. • Cyber terrorism can also include attacks on Internet business, but when this is done for economic motivations rather than ideological.
  • 38.  Software piracy is the unauthorized or illegal copying, distribution, or use of software. It is such a profitable “Business" that it has caught the attention of organized crime groups in a number of countries.
  • 40. o Use Anti-virus software. o Insert Firewall. o Uninstall unnecessary software. o Maintain Backup. o Check security settings. o Stay Anonymous - choose a genderless screen name. o Never give your full name or address to strangers. o Learn more about Internet Privacy.
  • 42.  Cyber security denotes the technologies and procedures intended to safeguard computers, networks, and data from unlawful admittance, weaknesses, and attacks transported through the Internet  Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks.
  • 43.  Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security.
  • 44.  ISO 27001 is the international Cybersecurity Standard that delivers a model for creating, applying, functioning, monitoring, reviewing, preserving, and improving an Information Security Management System.  The Ministry of Communication and Information Technology under the government of India provides a strategy outline called the National Cybersecurity Policy. The purpose of this government body is to protect the public and private infrastructure from cyber-attacks.
  • 45. Mission:- To safeguard information and information infrastructure in cyberspace.  To build capabilities to prevent and respond to cyber threats.  To reduce vulnerabilities and minimize damage from cyber incidents through a combination of institutional structures, people, processes, technology, and cooperation  Vision:- To build a secure and resilient cyberspace for citizens, businesses, and Government.
  • 46.  Protects system against viruses, worms, spyware and other unwanted programs.  Protection against data from theft.  Protects the computer from being hacked.  Protect it from criminal attack.  Application of cyber security used in our computer need to be update every week.
  • 47.  National Cyber Security Awareness Month is designed to engage and educate public and private sector partners through events and initiatives with the goal of raising awareness about cyber security and increasing the resiliency of the nation in the event of a cyber incident. October 2014 marks the 11th Annual National Cyber Security Awareness Month
  • 48.  CERT-In(Computer Emergency Response Team India)  NCIIPC(National Critical Information Infrastructure Protection Center)  CS&C(Office Of Cyber Security & Communication)  NCCIC(National Cyber Security & Communication Integration Center)  NCCC(National Cyber Coordination Center)
  • 49.  Be vigilant and follow the tips given below while you participate in online activities:  Filter the visibility of personal information in social sites.  Do not keep the "remember password" button active for any email address and passwords  Make sure your online banking platform is secure.  Keep a watchful eye while shopping online.  Do not save passwords on mobile devices.  Secure the login details for mobile devices and computers, etc.
  • 50.  To tackle the issue of cybercrimes, CIDs (Criminal Investigation Departments) of various cities opened up Cyber Crime Cells in different cities.  Process--  Step 1- For Cyber Crime Complaint First of all write an application in the name head of cyber crime cell.  Step 2- Provide the following things with the application-  Name  Address  Email address  Telephone no.  Step 3- For required documents there are two cases.  a) In case of vulgar emails, abusive email etc the following details is required cyber crime compliant-  The header of email which is offending you.  The email address of offending sender.
  • 51.  b) In case of Hacking the following details is required for cyber crime complaint-  Logs of the server.  A hard copy and soft copy of the defected page.  If the data of the defected site is compromised then you will need a soft copy of original data as well as compromised data.  Control mechanism details of access in which you have to tell who has access the computer.  If you have any doubt or your feeling suspicious about anyone then you have to provide the list of these suspicions.  Step 4- You can file the complaint from any cyber cell of any of the cities and also send direct email on below given email of Cyber Cell Police Station.
  • 52.  Technology is destructive only in the hands of people who do not realize that they are one And the same process as the universe.