Professional Documents
Culture Documents
Cyber Crime
Cyber Crime
• This Presentation Includes A Basic Introduction To Cybercrime. You Will Get To Know About
The Variants Of Cybercrime Such As Phishing, Vishing, Cyberstalking, Cost Of Cybercrime In
India, Cyber Laws, Various Acts Including The Preventive Measures For Such Activities.
W H AT I S C Y B E R S E C U R I T Y
Technology Is Essential To Giving Organizations And Individuals The Computer Security Tools
Needed To Protect Themselves From Cyber Attacks. Three Main Entities Must Be Protected:
Endpoint Devices Like Computers, Smart Devices, And Routers; Networks; And The Cloud.
Common Technology Used To Protect These Entities Include Next-generation Firewalls, DNS
Filtering, Malware Protection, Antivirus Software, And Email Security Solutions.
WHY IS CYBERSECURITY
I M P O R TA N T ?
Users Must Understand And Comply With Basic Data Security Principles Like Choosing
Strong Passwords, Being Wary Of Attachments In Email, And Backing Up Data. Learn More
About Basic Cyber Security Principle Because in world most dangerous war is cyber war
TYPES OF CYBERSECURITY THREATS
Phishing
Ransomware
Malware
Distributed denial of service (DDoS) attacks.
•P h i s h i n g
R a n s o m w a r e I s A Ty p e O f M a l i c i o u s S o f t w a r e . I t I s
D e s i g n e d To E x t o r t M o n e y B y B l o c k i n g A c c e s s To F i l e s O r
The Computer System Until The Ransom Is Paid. Paying The
R a n s o m D o e s N o t G u a r a n t e e T h a t T h e F i l e s Wi l l B e
Recovered Or The System Restored.
• M A LWA R E
M a l w a r e I s A n y S o f t w a r e I n t e n t i o n a l l y D e s i g n e d To C a u s e D i s r u p t i o n
To A C o m p u t e r, S e r v e r, C l i e n t , O r C o m p u t e r N e t w o r k , L e a k P r i v a t e
I n f o r m a t i o n , G a i n U n a u t h o r i z e d A c c e s s To I n f o r m a t i o n O r S y s t e m s ,
D e p r i v e A c c e s s To I n f o r m a t i o n , O r W h i c h U n k n o w i n g l y I n t e r f e r e s W i t h
The User's Computer Security And Privacy.
• DDOS Attacks
A D i s t r i b u t e d D e n i a l - o f - s e r v i c e ( D d o s ) A t t a c k I s A M a l i c i o u s A t t e m p t To
D i s r u p t T h e N o r m a l Tr a ff i c O f A Ta r g e t e d S e r v e r, S e r v i c e O r N e t w o r k B y
O v e r w h e l m i n g T h e Ta r g e t O r I t s S u r r o u n d i n g I n f r a s t r u c t u r e W i t h A F l o o d O f
I n t e r n e t Tr a ff i c .
D d o s A t t a c k s A c h i e v e E ff e c t i v e n e s s B y U t i l i z i n g M u l t i p l e C o m p r o m i s e d
C o m p u t e r S y s t e m s A s S o u r c e s O f A t t a c k Tr a ff i c . E x p l o i t e d M a c h i n e s C a n I n c l u d e
Computers And Other Networked Resources Such As Iot Device From A High Level,
A D d o s A t t a c k I s L i k e A n U n e x p e c t e d Tr a ff i c J a m C l o g g i n g U p T h e H i g h w a y,
P r e v e n t i n g R e g u l a r Tr a ff i c F r o m A r r i v i n g A t I t s D e s t i n a t i o n .
THANK YOU
P R E S E N T E D B Y : - S H U B H A M K AYA N D E