0% found this document useful (1 vote)
182 views

Cyber Security

The Internet and computers are an everyday part of life for many people. However, they have also become effective tool for criminals. Cyber crime is emerging as serious threat. To the world of computer technology, governments, police and intelligence units are acting toward the issue closely. Different strategies are put into action. The effort is done to educate people and to expose them to the idea that it is not safe anymore to navigate in the cyber world without security. This presentation will provide an overview of cyber security issues related to cyber crimes.

Uploaded by

Tharmi K
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
182 views

Cyber Security

The Internet and computers are an everyday part of life for many people. However, they have also become effective tool for criminals. Cyber crime is emerging as serious threat. To the world of computer technology, governments, police and intelligence units are acting toward the issue closely. Different strategies are put into action. The effort is done to educate people and to expose them to the idea that it is not safe anymore to navigate in the cyber world without security. This presentation will provide an overview of cyber security issues related to cyber crimes.

Uploaded by

Tharmi K
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Cyber Security

S.Sahaya Jency & K.Tharmi I MCA


Department of Computer Application
Holy Cross College (Autonomous)
Trichy-2

ABSTRACT:
The Internet and computers are an everyday part of life for many people. However, they have also become
effective tool for criminals. Cyber crime is emerging as serious threat. To the world of computer technology,
governments, police and intelligence units are acting toward the issue closely. Different strategies are put
into action. The effort is done to educate people and to expose them to the idea that it is not safe anymore to
navigate in the cyber world without security. This presentation will provide an overview of cyber security
issues related to cyber crimes.

Keywords: cyber-security, cyber-crime, Phishing, Vishing and Hacking.

1. INTRODUCTION music files to stealing millions of dollars from


Cyber-Security, techniques developed to online bank accounts. Cybercrime also includes
safeguard information and information systems non-monetary offenses, such as creating and
stored on computers. Potential threats include the distributing viruses on other computers or posting
destruction of computer hardware and software confidential business information on the Internet.
and the loss, modification, theft, unauthorized use,
observation, or disclosure of computer data. The
term cyber security is used to refer to the security
offered through on-line services to protect your
online information. With an increasing amount of
people getting connected to Internet, the security
threats that cause massive harm are increasing Fig.1: Cyber-crime.
also.

2. CYBER-CRIME 3. HISTORY OF CYBER-CRIME

Crime committed using a computer and The first recorded cyber crime took place

the internet to steal a persons identity or illegal in the year 1820! That is not surprising

imports or malicious programs. Cybercrime is considering the fact that the abacus, which is

nothing but where the computer used as an object thought to be the earliest form of a computer, has

or subject of crime. (Fig.1) Cybercrime is criminal been around since 3500 B.C.

activity done using computers and the Internet. in India, Japan and China. The era of modern

This includes anything from downloading illegal


computers, however, began with the analytical him to send account number or password for
engine of Charles Babbage. verification while the original aim is to use the
In 1820, Joseph-Marie Jacquard, a textile privacy of the user for illegal activities.
manufacturer in France, produced the loom. This
B. Hacking:
device allowed the repetition of a series of steps in
Hacking is the crime involves invading systems
the weaving of special fabrics. This resulted in a
and gaining unauthorized access to the data stored
fear amongst Jacquard's employees that their
in them. A hacker refers to someone who
traditional employment and livelihood were being
secretively invades others computers, inspecting
threatened. They committed acts of sabotage to
or tampering with the programs or data stored on
discourage Jacquard from further use of the new
them.
technology. This is the first recorded cyber crime!
C. Vishing:

4. CATEGORIES OF CYBER-CRIME Vishing is the criminal practice of using social


We can categorize cyber crime in two engineering Voice over IP (VoIP) to gain access
ways. to private personal, information from the public
-The computer as a target: - using a computer to for the purpose of financial reward. The term is
attacks other computer, (Fig.2) e.g. Hacking, the combination of Voice and Phishing.
virus/worms attacks, Dos attack etc. D. Cyber stalking:
-The computer as a weapon: - using a computer
The term refers to the act of online stalking
to commit real world crime e.g. cyber terrorism,
which involve online harassment and abuse. It
credit card fraud and pornography etc. involves vandalizing property, threatening
behaviours and message or objects which disturb
the user of the Internet or cyber technologies.

E. Denial of service attacks:


This is an act by the criminals who floods the
bandwidth of the victims network or fills his E-
mail box with spam mail depriving him of the
Fig.2: Computer attacks service he is entitled to access or provide. Many
. DOS attacks, such as the ping of death and Tear

5. TYPES OF CYBER-CRIME drop attacks.

A. Phishing: F. Virus dissemination:

It is among the internet fraud involving getting Malicious software that attaches itself to other
financial information illegally online spam e-mail software. VIRUS, WORMS, TROJAN HORSE,
pretending to be from bank or any institution WEB JACKING, E-MAIL BOMBING etc.
concerning with the user of the account asking
G. Computer vandalism:
Damaging or destroying data rather than stealing
or misusing them is called cyber vandalism. These
are program that attach themselves to a file and
then circulate.

H. Cyber terrorism:
Terrorist attacks on the Internet are by
distributed denial of service attacks, hate websites
and hate E-mails, attacks on service network etc.
Fig.3: Cyber-crime in India.
I. Software piracy:
Theft of software through the illegal copying of
7. CYBER-SECURITY
genuine programs or the counterfeiting and
A. Cyber Security:
distribution of products intended to pass for the Cyber Security involves protection of
original.
sensitive personal and business information
6. CYBER-CRIMES THREATENS through prevention, detection and response to
NATIONAL SECURITY different online attacks. Cyber security actually
preventing the attacks, cyber security. (Fig.4)
CYBER CRIMES THREATENS NATIONAL
B. Privacy Policy:
SECURITY IN INDIA Before submitting your name, e-mail,
Likewise Union home minister Shivraj
address, on a website look for the sites privacy
Patil said that the rising level of cyber crime is an policy.
indication of enormous threat to national security.
C. Keep Software Up to Date:
On Googles social networking site orkut, If the seller reduces patches for the
facebook, have been perplexing authorities. Fan
software operating system your device, install
clubs of Underworld Dons like Dawood Ibrahim them as soon as possible .Installing them will
and Chhota Shakeel and other wanted underworld
prevent attackers form being able to take
dons are also doing the rounds on orkut. There is advantage. Use good password which will be
huge potential for damage to national security
difficult for thieves to guess. Do not choose option
through cyber attacks. The internet is a means for that allows your computer to remember your
money bounding and funding terrorist attacks in
passwords.
an organized manner. D. Disable remote connectivity:
India stands 11th in the ranking for Cyber Some PDAs and phones are equipped
Crime in the World, constituting 3% of the Global with wireless technologies, such as Bluetooth, that
Cyber Crime. (Fig.3) can be used to connect to other devices or
computers. You should disable these features
when they are not in use.
10. SAFETY TIPS TO CYBER CRIME
Use antivirus Software
Insert Firewalls
Uninstall unnecessary software
Maintain backup
Check security settings

11. CYBER LAW OF INDIA


Cyber crime can involve criminal activities
Fig.4: Cyber-security. that are traditional in nature, such as theft, fraud,
deformation and mischief, all of which are
8. ADVANTAGES OF CYBER- SECURITY subjected to the India Penal code. In simple way
The cyber security will defend us from we can say that cyber crime is unlawful acts
critical attacks. where in the computer is either a tool or both.
It helps us to browse the site, website. The abuse of computer has also given birth of new
Internet Security processes all the age crimes that are addressed by the Information
incoming and outgoing data on your Technology Act, 2000.
computer.
It will defend us from hacks and virus. 12. CONCLUSION
Application of cyber security used in our Cybercrime is indeed getting the
PC needs update every week. recognition it deserves. However, it is not going to
restricted that easily. In fact, it is highly likely that
9. DISADVANTAGES OF CYBER- cyber crime and its hackers will continue
SECURITY developing and upgrading to stay ahead of the
law.
Firewalls can be difficult to configure So, to make us a safer we must need cyber
correctly. security.
Incorrectly configured firewalls may block
users from performing certain actions on
the Internet, until the firewall configured
correctly.
Makes the system slower than before.
Need to keep updating the new software in
order to keep security up to date.
Could be costly for average user.
REFERENCES
[1] https://en.wikipedia.org/wiki/Cybercrime
[2]http://www.itgovernance.co.uk/what-is-
cybersecurity.aspx
[3] https://www.dhs.gov/topic/cybersecurity
[4]http://whatis.techtarget.com/definition/cybersecu
rity

[5]http://cybersecurityventures.com/cybersecurity-
500/

[6] https://www.us-cert.gov/ncas/tips

You might also like