final cyber crime and security

Post on 10-May-2015

4.891 Views

Category:

Internet

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

MY TOPIC IS CYBER CRIME AND SECURITY

TRANSCRIPT

Cyber Crime and Security

Crime Committed Using a Computer and the Internet to Steal a Persons Identity or Illegal Imports or Malicious Programs Cybercrime is Nothing but where the Computer used as an Object or Subject of Crime

What is Cyber crime ?

History of Cyber Crime

The first Recorded Cyber Crime took place in the year 1820 that is not Surprising Considering the fact that the Abacus , which is thought to be the Earliest from of a Computer , has been around since 3500 B.C.

In India, Japan and China.

The era of Modem Computers,

however, began with the

Analytical engine of

Charles Babbage.

Types of Cyber Crime

HackingChild PornographyDOS AttackVirus DisseminationComputer VandalismCyberterrorismSoftware PiracyPhishingCredit Card FraudMobile Hacking

Types of Cybercrime

Cyber Security

Cyber Security involves protection of sensitive personal and business information through prevention, detection, and response to different online attacks.

Advantages of Cyber Security

The Cyber Security will defend us from critical attacks.

It Helps us to browser the safe website.

Internet Security process all the Incoming and outgoing data on our computer.

The application of Cyber Security used in our PC needs updated every week

Disadvantages of Cyber Security

Improved hacker speed and ability.

Interconnected computers.

Improved viruses, malware and worms.

Increase in "cyber warfare" possibly.

More anonymity between hackers.

Safety Tips to Cyber Crime

Use Antivirus Software

Insert firewalls

Uninstall Unnecessary software

Maintain backup

Check security settings

Cyber Low of India

Cyber Crimes can Involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code.

In simple way we can say that Cyber Crime is unlawful acts where in the computer is either a tool or a target or both

Presented by

Nikunj Patel

Thank you

top related