0% found this document useful (0 votes)
26 views

Presentation 1

Uploaded by

Palak Rana
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

Presentation 1

Uploaded by

Palak Rana
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

PRESENTATI ON BY:

PAL AK RANA
JI SHAN MALI K
CYBER CRIME:
URVASHI a threat we can't ignore
VINEET SANGER
INTRODUCTION

Imagine this: You’re sipping coffee, scrolling through your phone, and suddenly get a notification—"Suspicious
login detected" on your bank app. Your heart races. Did someone hack your account? You rush to check, only to
realize your savings are gone. It sounds like a nightmare, but for millions of people, this is reality.
Cyber crime isn’t just a plot in movies or something that happens to “other people.” It’s an everyday threat that
creeps into our personal and professional lives without warning. From hacked Instagram accounts and phishing
emails to ransomware attacks on businesses, cyber criminals are constantly lurking in the shadows, waiting to
strike.
What’s scarier? No one is immune. Whether you’re a student, business owner, or casual internet user, cyber crime
affects us all. And it doesn’t just cost money—it takes away peace of mind, trust, and privacy. In this digital world,
where every click, password, and online transaction matters, the line between safety and danger is razor-thin.
So how do we fight back? Let’s dive into the world of cyber crime—its types, the dangers it poses, and most
importantly, how we can protect ourselves before we become the next target.
WHAT IS CYBER CRIME:
At its core, cyber crime refers to any illegal activity that involves a computer, network, or the internet as a tool, target, or both.
Unlike traditional crimes that happen in the physical world—like theft or vandalism—cyber crimes take place in the virtual world,
often with devastating real-world consequences. It’s not just about hackers breaking into systems anymore. Cyber criminals can now
steal your personal information, spread harmful software, or manipulate people through scams—all without ever leaving their desks.

Why Cyber Crime Affects Everyone

It’s easy to think, “I’m just a regular person—why would a hacker care about me?” But the reality is that everyone is a
target. Cyber criminals thrive on small opportunities. Sometimes, they aim to steal large sums of money from corporations. Other
times, they focus on individuals—like stealing your credit card info or social media passwords.

Every time you click on a link, enter your bank details, or use public Wi-Fi, you’re opening a window to potential danger. And the
problem is that you might not even realize you’ve been targeted until it’s too late.
Common Types of Cyber Crime
• Phishing: This is when you get an email or message pretending to be from a trusted organization
(like a bank) asking for your login credentials or personal data. It looks real—but it’s not.
• Hacking: Unauthorized access to your computer or online accounts. Hackers often steal or
manipulate your data.
• Identity Theft: This happens when someone uses your personal information—like your name,
credit card, or social security number—to commit fraud.
• Ransomware: Malicious software that locks you out of your data until you pay a ransom.
Businesses, hospitals, and even schools have fallen victim to such attacks.
• Online Scams: These come in many forms—fake online shops, bogus lottery wins, romance
scams—and they all aim to steal your money
Examples You Can Relate To

• Bank Fraud: You receive a call claiming to be from your bank, saying there’s an issue with your account, and they ask for
your password. After giving it to them, you find out they drained your funds.

• Social Media Hack: Your Instagram is suddenly posting links to fake giveaways. It’s not you—it’s a hacker using your
account to scam others.

• Ransomware Attack: Imagine your workplace files becoming inaccessible, with a hacker demanding payment to restore
them. This can shut down hospitals, companies, or even city services.

• Phishing: Sending fake emails or messages to trick people into giving up passwords or financial information.
• Identity Theft: Stealing someone’s personal information to commit fraud or access their accounts.
How Cyber Crime Impacts Our Lives
Cyber crime doesn’t just affect our finances—it can also have emotional
consequences. Victims often feel vulnerable, anxious, and unsure of how to
move forward. Trust in online services gets eroded, making it harder to shop
online or use banking apps confidently. And the damage to privacy can be
enormous: private photos, chats, or emails can be exposed, creating stress and
embarrassment.

On a larger scale, cyber crime can disrupt entire industries. When businesses
are hacked, it can lead to massive data breaches, financial losses, and even the
collapse of services that people rely on. In some cases, governments are
targeted, leading to national security threats.

ThePhoto by PhotoAuthor is licensed under CCYYSA.


1.Privacy Violations
Teens often share personal information online without realizing the risks. Cyber criminals can exploit this data for identity theft
or to stalk individuals. For example, sharing location data on social media can lead to unwanted attention or harassment.
2. Cyberbullying
The internet provides a platform for bullies to target their victims anonymously. Cyberbullying can lead to severe emotional
distress, anxiety, and depression among teens, affecting their mental health and social relationships. Victims may feel isolated and
fearful of going online.
3. Exposure to Inappropriate Content
Teens may stumble upon or be deliberately targeted by harmful content, including pornography, hate speech, or violent material.
This exposure can distort their understanding of healthy relationships and reality.
4. Financial Scams
Teens are often less aware of financial scams, such as phishing attempts or fraudulent online stores. They may fall for tricks that
lead to financial loss or identity theft.
5. Impact on Academic Performance
The anxiety and stress from being a victim of cyber crime can distract teens from their studies.
Governments’ Role
• 1.Creating Cyber Laws and RegulationsGovernments around the world are introducing and updating
laws to criminalize activities like hacking, identity theft, phishing, and ransomware.

2.INTERNATIONAL COOLABORATION:Cyber crime knows no borders, so


governments are working together to track down attackers. Organizations
like Interpol and the Budapest Convention on Cybercrime promote
international cooperation to investigate and prosecute offenders across
countries.

3.CYBERSECURITY TASKFORCES:Many governments have specialized task forces


to fight cyber crime. For example, the FBI's Cyber Divisiontackles major cyber
threats in the U.S., while India’s CERT-In (Computer Emergency Response
Team) handles cyber incidents and provides guidance to prevent attacks
Companies’ Role
• Building Secure Systems
Companies are adopting cybersecurity frameworks to build robust systems resistant to attacks. Encryption ensures sensitive
data is protected in transit and storage, and two-factor authentication (2FA) makes it harder for hackers to access user
accounts. Many companies also conduct regular penetration testing to spot and fix vulnerabilities.
• Incident Response Teams
Organizations now have dedicated cybersecurity teams to detect and respond to threats. Many large companies also work
with external cybersecurity firms to monitor and defend against attacks in real-time.
• Employee Training Programs
Human error is a common reason for cyber breaches. To tackle this, businesses provide cybersecurity awareness training to
employees, teaching them how to recognize phishing emails and follow safe practices.
• Investing in Security Technologies
Companies invest heavily in advanced technologies like firewalls, intrusion detection systems (IDS), and artificial
intelligence (AI) to detect unusual behavior and block attacks before they occur.
Data Protection Policies

Businesses implement strict data protection policies to minimize the impact of breaches. Many use backup
and disaster recovery plans to ensure they can restore operations quickly in case of ransomware or other
attacks.

Partnerships Between Governments and Companies

Governments and the private sector often work together to fight cyber crime. Initiatives like information-
sharing partnerships allow companies and agencies to exchange threat intelligence. For example,
the National Cyber Security Centre (NCSC) in the U.K. collaborates with companies to improve the
nation’s cyber defenses.
How You Can Protect Yourself
There are several ways you can reduce your risks:
1.Use Strong and Unique Passwords
•Create Complex Passwords: Use a combination of uppercase and lowercase letters, numbers, and symbols to create strong
passwords. Avoid using easily guessable information like birthdays or names.
•Unique Passwords for Each Account: Don’t reuse passwords across multiple accounts. If one account gets compromised,
others remain secure.
•Password Managers: Consider using a password manager to generate and store complex passwords securely. This can
help you keep track of various passwords without relying on memory.

•2. Enable Two-Factor Authentication (2FA)


•Additional Layer of Security: Activate 2FA on accounts that offer it. This requires a second form of verification, like a
code sent to your phone or an authentication app, making it harder for attackers to gain access.
3. Be Wary of Phishing Scams
• Recognize Phishing Attempts: Be cautious of unsolicited emails, messages, or phone calls asking for personal
information. Look for signs of phishing, such as poor grammar, unusual requests, or unfamiliar sender addresses.
• Verify Links: Before clicking on links in emails or messages, hover over them to see the URL. Make sure it
directs to a legitimate site.
4. Keep Software Updated
• Regular Updates: Ensure that your operating system, applications, and antivirus software are always up to date.
Updates often include security patches that protect against vulnerabilities.
5. Use Antivirus and Anti-Malware Software
• Protective Measures: Install reputable antivirus and anti-malware programs on your devices. These tools help
detect and eliminate malicious software and provide real-time protection against threats.
6. Secure Your Wi-Fi Network 7. Be Cautious with Public Wi-Fi

Change Default Settings: Modify your router’s Avoid Sensitive Transactions: Refrain from
default username and password. accessing sensitive information or making
Use Strong Encryption: Set your Wi-Fi network financial transactions while connected to public
to WPA3 (or at least WPA2) encryption to secure Wi-Fi networks.
your network from unauthorized access. Use a VPN: A Virtual Private Network (VPN)
Guest Network: Consider setting up a separate encrypts your internet connection, making it
guest network for visitors to limit access to your safer to browse on public networks.
main network.
Monitor Educate

8. Monitor Your Accounts Regularly 9. Educate Yourself


• Check Statements: Regularly review bank • Stay Informed: Follow cybersecurity news
statements and credit card transactions to learn about emerging threats and best
for any unauthorized activity. practices. Awareness can help you
• Credit Monitoring: Consider enrolling in a recognize potential risks and respond
credit monitoring service that alerts you to effectively.
any changes in your credit report, helping • Take Courses: Many organizations offer
you detect identity theft early. free or low-cost online courses about
cybersecurity basics. Educating yourself
can empower you to make safer online
choices.
CONCLUSION

As we conclude our talk on cyber crime, it's crucial to remember that this isn't just a distant problem—it’s something that touches
each of our lives, especially for us teens navigating the vast world of the internet. Think about it: every time you log into social
media, play games online, or shop, you’re opening a door to risks that can lead to identity theft, scams, or even harassment.

But don’t feel overwhelmed! The power to protect yourself lies in your hands. By staying informed, being mindful of the content
you share, and using security tools like strong passwords and two-factor authentication, you can significantly reduce your chances
of falling victim to these threats.

We’re all in this together. The more we share information and support one another, the stronger we become against cyber crime.
Let’s commit to being vigilant and proactive, making the internet a safer place not just for ourselves, but for everyone. Together,
we can push back against the shadows of cyber crime and build a brighter, more secure online future. Thank you for engaging in
this vital conversation!

You might also like