Cyber Safety: Made By-Aditya Giri Xii-C

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18
At a glance
Powered by AI
The key takeaways are that cyber crimes involve the use of computers and the internet to commit unlawful acts. Cyber crimes can be categorized based on whether the computer is the target or weapon of the crime. Common cyber crimes include hacking, phishing, cyber bullying, denial of service attacks, viruses, and child pornography.

Cyber crimes can be categorized into two ways - when the computer is the target of attacks like hacking, viruses etc. or when the computer is used as a weapon to commit real world crimes like cyber terrorism, credit card fraud etc.

Common types of cyber crimes mentioned are hacking, information theft through phishing, cyber bullying, denial of service attacks, spreading of viruses, and child pornography.

CYBER

SAFETY
M A D E B Y- A D I T YA G I R I
XII-C
 Cyber crime is an activity done
using computers and internet. We
can say that it is an unlawful acts
wherein the computer either a tool
What is a Cyber or target or both.
Crime?
HISTORY OF CYBER CRIME

• The first recorded cyber crime took


place in 1820.

•  The first spam email took place in


1976 when it was sent out over the
ARPANT.

• The first virus was installed on an


Apple computer in 1982 when a high
school student, Rich skrenta,
developed the EIK Cloner.
CATEGORIES OF CYBER CRIME
• We can categorize cyber crime in two ways.

• The computer as a target :- using a computer to attacks other


computer, e.g. Hacking, virus/worms' attacks, Dos attack etc.

• The computer as a weapon :- using a computer to commit real world


crime e.g. cyber terrorism, credit card fraud and pornography etc.
TYPES OF CYBER CRIME
• Hacking
• Information Theft-Phishing
• Cyber Bullying
• Denial of service attack
• Virus
• Child Pornography
HACKING
• Hacking in simple terms means an illegal intrusion into a computer
system and/or network . It is also known as CRACKING. Government
websites are the hot target of the hackers due to the press coverage it
receives. Hackers enjoy the media coverage.
• Motive behind the crime called HACKERS
• Motive behind the crime called hacking greed power, publicity,
revenge, adventure desire to access forbidden information destructive
mindset wants to sell n/w security services.
Information Theft-
Phishing
• fishing is the practice off
attempting to acquire sensitive
information from individuals
over the Internet , by means of
deception. Information
typically targeted by phishing
schemes include passwords,
usernames, bank information ,
and Social Security numbers.
CYBER BULLYING

• Cyber Bullying is the use of the Internet and related technologies to harm other
people in a deliberate, repeated, and hostile manner.
• EFFECTS-
• Undermining confidence
• Causing stress and hurtful health effects
• Affecting performance and attendance in school/work.
• Depression and a sense of lonlines
• Suicidal Thoughts
  CHILD PORNOGRAPHY :
• The Internet is being highly used by its
abusers to reach and abuse children sexually,
worldwide. As more homes have access to
internet, more children would be using the
internet and more are the chances of falling
victim to the aggression of Pedophiles.

• How Do They Operate :
• How do they operate Pedophiles use false
identity to trap the children , Pedophiles
connect children in various chat rooms
which are used by children to interact with
other children.
• DENIAL OF SERVICE ATTACKS : This is
an act by the criminals who floods the
bandwidth of the victim's network or fills his E-
mail box with spam mail depriving him of the
service he is entitled to access or provide. Many
DOS attacks, such as the ping of death and Tear
drop attacks.

• VIRUS DISSMINITION : Malicious software


that attaches itself to other software. VIRUS ,
WORMS, TROJAN HORSE ,WEB JACKING,
E-MAIL BOMBING etc.
CYBER
SECURITY
SOME MEASURES TO BE
SAFE IN THE WORLD WIDE
WEB
• Cyber Security involves protection of sensitive personal and business
information through prevention, detection and response to different
online attacks.

• Privacy Policy : Before submitting your name , e-mail , address, on a


website look for the sites privacy policy.
• Keep Software Up to Date: If the seller reduces patches for the
software operating system your device ,install them as soon as
possible .Installing them will prevent attackers form being able to take
advantage. Use good password which will be difficult for thieves to
guess. Do not choose option that allows your computer to remember
your passwords.
• DISABLE REMOTE CONNECTIVITY : Some PDA’s and phones are
equipped with wireless technologies, such as Bluetooth, that can be
used to connect to other devices or computers. You should disable
these features when they are not in use.

• BE CAREFULL : when downloading files off the internet and make


sure you're downloading files from a trusted source. Viruses must be
executed to have any effect on your computer, so there are a couple of
file types that have no chance of containing a virus. These files are
predominantly sound, image, and text file types.
• Use antivirus Software :

• Insert Firewalls

• Uninstall unnecessary software

• Maintain backup :Backup your computer regularly. This is a good


habit to get into in case any fatal errors occur.
• Check security settings
Advantages of cyber security
the cyber security will defend us from critical attacks .
Internet security process all the incoming and outgoing data on your
computer.
• It will defend us from hacks and virus.
CYBER LAW OF
INDIA
• Cyber crime can involve criminal activities that are
traditional in nature, such as theft, fraud, deformation
and mischief, all of which are subjected to the India
Penal code. In simple way we can say that cyber
crime is unlawful acts where in the computer is either
a tool or both. The abuse of computer has also given
birth of new age crime that are addressed by the
Information Technology Act, 2000.
THE END
EFFORTS BY- ADITYA GIRI
XII-
C

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy