Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

CYBER CRIME

INTRODUCTION TO CYBER SECURITY

• This Presentation Includes A Basic Introduction To Cybercrime. You Will Get To Know About
The Variants Of Cybercrime Such As Phishing, Vishing, Cyberstalking, Cost Of Cybercrime In
India, Cyber Laws, Various Acts Including The Preventive Measures For Such Activities.
W H AT I S C Y B E R S E C U R I T Y

Cybersecurity Is The Practice Of Deploying People, Policies, Processes And Technologies To


Protect Organizations, Their Critical Systems And Sensitive Information From Digital Attacks.
Cybersecurity Is The Practice Of Protecting Systems, Networks, And Programs From
Digital Attacks. These Cyber Attack Are Usually Aimed At Accessing, Changing, Or
Destroying Sensitive Information Extorting Money From Users Or Interrupting Normal
Business Processes.
Implementing Effective Cybersecurity Measures Is Particularly Challenging Today Because
There Are More Devices Than People, And Attackers Are Becoming More Innovative
TECHNOLOGY

 Technology Is Essential To Giving Organizations And Individuals The Computer Security Tools
Needed To Protect Themselves From Cyber Attacks. Three Main Entities Must Be Protected:
Endpoint Devices Like Computers, Smart Devices, And Routers; Networks; And The Cloud.
Common Technology Used To Protect These Entities Include Next-generation Firewalls, DNS
Filtering, Malware Protection, Antivirus Software, And Email Security Solutions.
WHY IS CYBERSECURITY
I M P O R TA N T ?

In Today’s Connected World, Everyone Benefits From Advanced Cyberdefense Programs. At An


Individual Level, A Cybersecurity Attack Can Result In Everything From Identity Theft, To Extortion
Attempts, To The Loss Of Important Data Like Family Photos. Everyone Relies On Critical
Infrastructure Like Power Plants, Hospitals, And Financial Service Companies. Securing These And
Other Organizations Is Essential To Keeping Our Society Functioning.
People’s
News Paper : -

Users Must Understand And Comply With Basic Data Security Principles Like Choosing
Strong Passwords, Being Wary Of Attachments In Email, And Backing Up Data. Learn More
About Basic Cyber Security Principle Because in world most dangerous war is cyber war
TYPES OF CYBERSECURITY THREATS

 Phishing
 Ransomware
 Malware
 Distributed denial of service (DDoS) attacks.
•P h i s h i n g

 Phising Is The Practice Of Sending Fraudulent Emails That


Resemble Emails From Reputable Sources. The Aim Is To Steal
Sensitive Data Like Credit Card Numbers And Login Information. It’s
The Most Common Type Of Cyber Attack. You Can Help Protect
Yourself Through Education Or A Technology Solution That Filters
• R A NS O M WA R E

 R a n s o m w a r e I s A Ty p e O f M a l i c i o u s S o f t w a r e . I t I s
D e s i g n e d To E x t o r t M o n e y B y B l o c k i n g A c c e s s To F i l e s O r
The Computer System Until The Ransom Is Paid. Paying The
R a n s o m D o e s N o t G u a r a n t e e T h a t T h e F i l e s Wi l l B e
Recovered Or The System Restored.
• M A LWA R E

M a l w a r e I s A n y S o f t w a r e I n t e n t i o n a l l y D e s i g n e d To C a u s e D i s r u p t i o n
To A C o m p u t e r, S e r v e r, C l i e n t , O r C o m p u t e r N e t w o r k , L e a k P r i v a t e
I n f o r m a t i o n , G a i n U n a u t h o r i z e d A c c e s s To I n f o r m a t i o n O r S y s t e m s ,
D e p r i v e A c c e s s To I n f o r m a t i o n , O r W h i c h U n k n o w i n g l y I n t e r f e r e s W i t h
The User's Computer Security And Privacy.
• DDOS Attacks

 A D i s t r i b u t e d D e n i a l - o f - s e r v i c e ( D d o s ) A t t a c k I s A M a l i c i o u s A t t e m p t To
D i s r u p t T h e N o r m a l Tr a ff i c O f A Ta r g e t e d S e r v e r, S e r v i c e O r N e t w o r k B y
O v e r w h e l m i n g T h e Ta r g e t O r I t s S u r r o u n d i n g I n f r a s t r u c t u r e W i t h A F l o o d O f
I n t e r n e t Tr a ff i c .
 D d o s A t t a c k s A c h i e v e E ff e c t i v e n e s s B y U t i l i z i n g M u l t i p l e C o m p r o m i s e d
C o m p u t e r S y s t e m s A s S o u r c e s O f A t t a c k Tr a ff i c . E x p l o i t e d M a c h i n e s C a n I n c l u d e
Computers And Other Networked Resources Such As  Iot Device From A High Level,
A D d o s A t t a c k I s L i k e A n U n e x p e c t e d Tr a ff i c J a m C l o g g i n g U p T h e H i g h w a y,
P r e v e n t i n g R e g u l a r Tr a ff i c F r o m A r r i v i n g A t I t s D e s t i n a t i o n .
THANK YOU

P R E S E N T E D B Y : - S H U B H A M K AYA N D E

You might also like