1. cyber crime and security, and we are sitting in their homes ...... they can defeat the tanks and cannons to fight with you !!!! Presented Lipsita lake. B.Sc Wing, 3rd year. Roll 11DIS110. Ravenshaw University.
2. Growth role. Definition. History. The evolution of cyber threats. Electronic crime. Type of cyber crime. Prevention. Security. Conclusion.
3. The role of the Internet is growing rapidly in India The. It is entertainment, business, sports, education or lead to new opportunities in every field you can think of it as. There're two sides of the same coin. Cyber Internet crime committed by illegal activity to the Internet also has its disadvantages.
4. to steal data or information using a computer and Internet crime cybercrime description. Import illegal. malicious programs.
5. Cyber-crime is not only the use of a computer, or a criminal case ..
• 6. signed first Internet crimes recorded in 1820 years of history.
7. The development of the Internet threat
As a weapon, as the target of a PC computer • • 8 categories of cyber crime
9. quality of service attack cybercrime • • • • • • information and computer software piracy HIV, cyber terrorism and sabotage deny permission to enter without
10. • concessional terms of penetrating the computer system without permission and / or in the network means that the intervention is illegal.
• Act 23:00 stopped the attack, which floods the bandwidth of the network. • actions deprived him e-mail box with spam messages.
12. infection of HIV • Other programs that are attached to the same malware. (Viruses, worms, trojans, bombs kidnapped Web, email, etc.)
• damage or destruction of data theft and vandalism rather than 13 pc. • Infection
14. Using Web-based attacks-mail terrorism terrorism •. • Terrorists used technology-savvy impossible decryption of 512-bit.
Illegal copies of the software • 15 pirates stealing software program. • delivery of the product to pass.
Internet rights violations, and 11% of employees 17% 20% 25% 27% 71% 79% 85% Virus
17 Safety Tips for e • • • • • • Use the commit crime antivirus software. Keep the firewall. Uninstall unnecessary programs to Cola. Check the security settings. M - Choose your screen name does not have sex. • Do not give the name or address of visitors. • Information about Internet privacy.
18 Security
19 Security cyber security • Internet Computer security is a branch specifically related to the Internet. • The purpose is to create rules and the use of measures of attacks over the Internet.
• 20. facilities to protect us from cyber attacks. • Review and health on the Internet. • Internet security processes all incoming and outgoing data on your computer.
21. Conclusion of the universe is only one and the same process because they do not know it, in the hands of people who are destructive.
0 comments:
Post a Comment