SlideShare a Scribd company logo
CYBER
CRIMES
BY: NITISH KUMAR
Roll No.-12001319032
CSE, 4TH YEAR
CONTENT
INTRODUCTION
HISTORY OF CYBER CRIME
TYPES OF CYBER CRIME
CYBERCRIME THREATENS NATIONAL
SECURITY
CYBER SECURITY
ADVANTAGES OF CYBER SECURITY
DISADVANTAGES OF CYBER SECURITY
SAFETY TIPS FOR CYBER CRIME
CONCLUSION
INTRODUCTION
Cybercrime is any criminal activity that
involves a computer, networked device
or a network. While most cybercrimes
are carried out in order to generate profit
for the cybercriminals, some cybercrimes
are carried out against computers or
devices directly to damage or disable
them.
History of Cyber Crime
The first recorded cyber crime took place in 1820.
Cybercrime first started with hackers trying to break into computer
networks. Some did it just for the thrill of accessing high-level
security networks, but others sought to gain sensitive, classified
material. Eventually, criminals started to infect computer systems with
computer viruses, which led to breakdowns on personal and business
computers.
Computer viruses are forms of code or malware programs that can
copy themselves and damage or destroy data and systems. When
computer viruses are used on a large scale, like with bank,
government or hospital networks, these actions may be categorized
as cyberterrorism. Computer hackers also engage in phishing
scams, like asking for bank account numbers, and credit card theft.
theft.
TYPES OF CYBER CRIME
 Cyberterrorism
 Electronic bullying and stalking
 Hacking for fun
 Credit card theft
 Identity theft
 Network intrusions
 Software piracy
 Data breaches
 Phishing
 Internet fraud
CYBERCRIME THREATENS NATIONAL SECURITY IN INDIA
Cyber crime is a rampant evil with its roots firmly planted on the growing
dependence on computers in the contemporary scenario. In today’s age when
everything from, small gadgets to nuclear plants is being operated through
computers, cyber crime has assumed threatening ramifications.
Various kinds of cyber crimes are prevailing in the world today. Hacking,
bombing, diddling, spoofing, botnet attacks, salami attacks and viruses are
capable of breaching the security in the information systems of vital installations.
There have been several instances in the recent past to support the prevalence of
these attacks on a large scale. In fact, the first recorded cyber crime dates back to
1820. Joseph-Marie Jacquard, a textile manufacturer in France produced the
loom which involved a series of steps. This caused fear among Jacquard’s
employees that their traditional employment and livelihood were being
threatened. They committed acts of sabotage to discourage Jacquard from further
use of the new technology.
CYBER SECURITY
Cyber security is the practice of defending computers, servers, mobile
devices, electronic systems, networks, and data from malicious attacks. It's
also known as information technology security or electronic information
security. The term applies in a variety of contexts, from business to mobile
computing, and can be divided into a few common categories.
· Network security is the practice of securing a computer network
from intruders, whether targeted attackers or opportunistic malware.
· Application security focuses on keeping software and devices free of
threats. A compromised application could provide access to the data its
designed to protect. Successful security begins in the design stage, well
before a program or device is deployed.
· Information security protects the integrity and privacy of data, both
in storage and in transit.
ADVANTAGES OF CYBER SECURITY
Cyber security will defend us from critical cyber-
attacks.
It helps us to browse the safe website.
Cyber security will defend us from hacks & virus.
The application of cyber security used in our PC
needs to update every week.
Internet security processes all the incoming &
outgoing data on our computer.
It helps to reduce computer chilling & crashes.
Gives us privacy.
DISADVANTAGES OF CYBER SECURITY
 It was expensive; most of the users can’t
afford this.
 A normal user can’t use this properly,
requiring special expertise.
 Lack of knowledge is the main problem.
 It was not easy to use.
 It makes the system slower.
 It could take hours to days to fix a breach in
security.
SAFETY TIPS for CYBER CRIME
• Keep software and operating system updated
• Use anti-virus software and keep it updated
• Use strong passwords
• Never open attachments in spam emails
• Do not click on links in spam emails or untrusted websites
• Contact companies directly about suspicious requests
• Do not give out personal information unless secure
• Be mindful of which website URLs you visit
• Keep an eye on your bank statements
CONCLUSION
Cybercrime is indeed getting the
recognition it deserves. However, it is not
going to restricted that easily. In fact, it is
highly likely that cyber crime and its
hackers will continue developing and
upgrading to stay ahead of the law. So, to
make us a safer we must need cyber
security.
THANK
YOU

More Related Content

PPTX
Cyber Security ( Action Against Cyber Crime )
TechnoHacks_Infosystem
 
PDF
cybercrime-131020055545-phpapp02.pdf
Kira Dess
 
PPTX
Cybercrime 131020055545-phpapp02
raja jawahar
 
PPTX
Cybercrime 131020055545-phpapp02
Ambrish Mishra
 
PPTX
Cyber crime and security
sanjana mun
 
PPTX
Cyber crime & cyber security 10
Sudeshna Biswas
 
PPTX
Cyber crime and security
Akash Dhiman
 
PPTX
Cyber security
Krishanu Ghosh
 
Cyber Security ( Action Against Cyber Crime )
TechnoHacks_Infosystem
 
cybercrime-131020055545-phpapp02.pdf
Kira Dess
 
Cybercrime 131020055545-phpapp02
raja jawahar
 
Cybercrime 131020055545-phpapp02
Ambrish Mishra
 
Cyber crime and security
sanjana mun
 
Cyber crime & cyber security 10
Sudeshna Biswas
 
Cyber crime and security
Akash Dhiman
 
Cyber security
Krishanu Ghosh
 

Similar to Presentation1_CYBERCRIME.pptx (20)

PPTX
Cybercrime.ppt
Aeman Khan
 
PPTX
Cyber crime and security
Eng. Shuaib ibrahim
 
PPTX
cyber crime
Mosuud jilani lipon
 
PPTX
Module 1_ Introduction to Cyber Security.pptx
Firoza10
 
PPTX
ppt Cybercrime
Avinash Katariya
 
PPT
CYBER CRIME AND SECURITY
Chaya Sorir
 
PPTX
Cyber Crime
aritraranjan
 
ODP
Cyber crime
Nishi Agrawal
 
PPTX
Cyber crime final
HIRA BARLAS
 
PPTX
Cyber security presentation
Bijay Bhandari
 
DOCX
Research paper on cyber security.
Hussain777
 
PPTX
CYBER CRIME
Raaz Shukla
 
PPTX
Cyber crime
Harendra Singh
 
PPTX
CLE-Cyber crimes.pptx
VipinRawat52
 
PDF
Cyber Crime
Shreyash Patel
 
DOCX
127027205 selected-case-studies-on-cyber-crime
homeworkping8
 
PPTX
Cyber security mis
Aditya Singh Rana
 
PPTX
Cyber Security
Home
 
PPTX
Cyber Crime
vivek sharma
 
Cybercrime.ppt
Aeman Khan
 
Cyber crime and security
Eng. Shuaib ibrahim
 
cyber crime
Mosuud jilani lipon
 
Module 1_ Introduction to Cyber Security.pptx
Firoza10
 
ppt Cybercrime
Avinash Katariya
 
CYBER CRIME AND SECURITY
Chaya Sorir
 
Cyber Crime
aritraranjan
 
Cyber crime
Nishi Agrawal
 
Cyber crime final
HIRA BARLAS
 
Cyber security presentation
Bijay Bhandari
 
Research paper on cyber security.
Hussain777
 
CYBER CRIME
Raaz Shukla
 
Cyber crime
Harendra Singh
 
CLE-Cyber crimes.pptx
VipinRawat52
 
Cyber Crime
Shreyash Patel
 
127027205 selected-case-studies-on-cyber-crime
homeworkping8
 
Cyber security mis
Aditya Singh Rana
 
Cyber Security
Home
 
Cyber Crime
vivek sharma
 
Ad

More from NitishChoudhary23 (9)

PPTX
12001319032_ML.pptx
NitishChoudhary23
 
PPTX
Screening of Mental Health in Adolescence.pptx
NitishChoudhary23
 
PPTX
12001319032_OR.pptx
NitishChoudhary23
 
PPTX
Screening of Mental Health in Adolescents using ML.pptx
NitishChoudhary23
 
PPTX
Attacks on Mobile Devices by Nitish.pptx
NitishChoudhary23
 
PPTX
Presentation_entrepreneurship_.pptx
NitishChoudhary23
 
PDF
shovan 7.pdf
NitishChoudhary23
 
12001319032_ML.pptx
NitishChoudhary23
 
Screening of Mental Health in Adolescence.pptx
NitishChoudhary23
 
12001319032_OR.pptx
NitishChoudhary23
 
Screening of Mental Health in Adolescents using ML.pptx
NitishChoudhary23
 
Attacks on Mobile Devices by Nitish.pptx
NitishChoudhary23
 
Presentation_entrepreneurship_.pptx
NitishChoudhary23
 
shovan 7.pdf
NitishChoudhary23
 
Ad

Recently uploaded (20)

PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PDF
UTS Health Student Promotional Representative_Position Description.pdf
Faculty of Health, University of Technology Sydney
 
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
PDF
Types of Literary Text: Poetry and Prose
kaelandreabibit
 
PDF
Electricity-Magnetic-and-Heating-Effects 4th Chapter/8th-science-curiosity.pd...
Sandeep Swamy
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PDF
Mga Unang Hakbang Tungo Sa Tao by Joe Vibar Nero.pdf
MariellaTBesana
 
PDF
PG-BPSDMP 2 TAHUN 2025PG-BPSDMP 2 TAHUN 2025.pdf
AshifaRamadhani
 
PDF
High Ground Student Revision Booklet Preview
jpinnuck
 
PPTX
vedic maths in python:unleasing ancient wisdom with modern code
mistrymuskan14
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PDF
Module 3: Health Systems Tutorial Slides S2 2025
Jonathan Hallett
 
PDF
5.Universal-Franchise-and-Indias-Electoral-System.pdfppt/pdf/8th class social...
Sandeep Swamy
 
PPTX
Strengthening open access through collaboration: building connections with OP...
Jisc
 
PPTX
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PPTX
Understanding operators in c language.pptx
auteharshil95
 
PDF
The Final Stretch: How to Release a Game and Not Die in the Process.
Marta Fijak
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
UTS Health Student Promotional Representative_Position Description.pdf
Faculty of Health, University of Technology Sydney
 
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
Types of Literary Text: Poetry and Prose
kaelandreabibit
 
Electricity-Magnetic-and-Heating-Effects 4th Chapter/8th-science-curiosity.pd...
Sandeep Swamy
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
Mga Unang Hakbang Tungo Sa Tao by Joe Vibar Nero.pdf
MariellaTBesana
 
PG-BPSDMP 2 TAHUN 2025PG-BPSDMP 2 TAHUN 2025.pdf
AshifaRamadhani
 
High Ground Student Revision Booklet Preview
jpinnuck
 
vedic maths in python:unleasing ancient wisdom with modern code
mistrymuskan14
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
Module 3: Health Systems Tutorial Slides S2 2025
Jonathan Hallett
 
5.Universal-Franchise-and-Indias-Electoral-System.pdfppt/pdf/8th class social...
Sandeep Swamy
 
Strengthening open access through collaboration: building connections with OP...
Jisc
 
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
Understanding operators in c language.pptx
auteharshil95
 
The Final Stretch: How to Release a Game and Not Die in the Process.
Marta Fijak
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 

Presentation1_CYBERCRIME.pptx

  • 1. CYBER CRIMES BY: NITISH KUMAR Roll No.-12001319032 CSE, 4TH YEAR
  • 2. CONTENT INTRODUCTION HISTORY OF CYBER CRIME TYPES OF CYBER CRIME CYBERCRIME THREATENS NATIONAL SECURITY CYBER SECURITY ADVANTAGES OF CYBER SECURITY DISADVANTAGES OF CYBER SECURITY SAFETY TIPS FOR CYBER CRIME CONCLUSION
  • 3. INTRODUCTION Cybercrime is any criminal activity that involves a computer, networked device or a network. While most cybercrimes are carried out in order to generate profit for the cybercriminals, some cybercrimes are carried out against computers or devices directly to damage or disable them.
  • 4. History of Cyber Crime The first recorded cyber crime took place in 1820. Cybercrime first started with hackers trying to break into computer networks. Some did it just for the thrill of accessing high-level security networks, but others sought to gain sensitive, classified material. Eventually, criminals started to infect computer systems with computer viruses, which led to breakdowns on personal and business computers. Computer viruses are forms of code or malware programs that can copy themselves and damage or destroy data and systems. When computer viruses are used on a large scale, like with bank, government or hospital networks, these actions may be categorized as cyberterrorism. Computer hackers also engage in phishing scams, like asking for bank account numbers, and credit card theft. theft.
  • 5. TYPES OF CYBER CRIME  Cyberterrorism  Electronic bullying and stalking  Hacking for fun  Credit card theft  Identity theft  Network intrusions  Software piracy  Data breaches  Phishing  Internet fraud
  • 6. CYBERCRIME THREATENS NATIONAL SECURITY IN INDIA Cyber crime is a rampant evil with its roots firmly planted on the growing dependence on computers in the contemporary scenario. In today’s age when everything from, small gadgets to nuclear plants is being operated through computers, cyber crime has assumed threatening ramifications. Various kinds of cyber crimes are prevailing in the world today. Hacking, bombing, diddling, spoofing, botnet attacks, salami attacks and viruses are capable of breaching the security in the information systems of vital installations. There have been several instances in the recent past to support the prevalence of these attacks on a large scale. In fact, the first recorded cyber crime dates back to 1820. Joseph-Marie Jacquard, a textile manufacturer in France produced the loom which involved a series of steps. This caused fear among Jacquard’s employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology.
  • 7. CYBER SECURITY Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories. · Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware. · Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed. · Information security protects the integrity and privacy of data, both in storage and in transit.
  • 8. ADVANTAGES OF CYBER SECURITY Cyber security will defend us from critical cyber- attacks. It helps us to browse the safe website. Cyber security will defend us from hacks & virus. The application of cyber security used in our PC needs to update every week. Internet security processes all the incoming & outgoing data on our computer. It helps to reduce computer chilling & crashes. Gives us privacy.
  • 9. DISADVANTAGES OF CYBER SECURITY  It was expensive; most of the users can’t afford this.  A normal user can’t use this properly, requiring special expertise.  Lack of knowledge is the main problem.  It was not easy to use.  It makes the system slower.  It could take hours to days to fix a breach in security.
  • 10. SAFETY TIPS for CYBER CRIME • Keep software and operating system updated • Use anti-virus software and keep it updated • Use strong passwords • Never open attachments in spam emails • Do not click on links in spam emails or untrusted websites • Contact companies directly about suspicious requests • Do not give out personal information unless secure • Be mindful of which website URLs you visit • Keep an eye on your bank statements
  • 11. CONCLUSION Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily. In fact, it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security.