0% found this document useful (0 votes)
60 views19 pages

Cyber Crime: Name:-Jaivik Akbari Enroll No: - 20SS02IT002

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1/ 19

CYBER

CRIME

Name :- Jaivik Akbari

Enroll No :- 20SS02IT002
INTRODUCTION 01

02 TABLE OF
LITERATURE
REVIEW
04 CONCLUSION

CONTENTS
CASE STUDY
03 05 FUTURE WORKS

06 REFERENCES
01
iNTRODUCTION
Introduction to The Area
-
Cyber Security

Cyber security is the practice of defending computers, servers, mobile devices,


electronic systems, networks, and data from malicious attacks. It's also known as
information technology security or electronic information security. The term
applies in a variety of contexts, from business to mobile computing, and can be
divided into a few common categories.
The Importance of Cyber
Security.

Cyber security is important because government,


military, corporate, financial, and medical
organizations collect, process, and store
unprecedented amounts of data on computers and
other devices.
Types of Cyber
Threats.
1. Cybercrime includes single actors or groups
targeting systems for financial gain or to cause
disruption.

2. Cyber-attack often involves politically motivated


information gathering.

3. Cyberterrorism is intended to undermine


electronic systems to cause panic or fear.
Introduction to The Topic
-
CyberCrime

Cybercrime is the activity of using computers and networks to perform illegal


activities like spreading computer viruses, online bullying, performing
unauthorized electronic fund transfers, etc. Most cybercrime hacks are
committed through the internet, and some cybercrimes are performed using
Mobile phones via SMS and online chatting applications.
CyberCrime In-Depth

- Botnets
- Phishing and Other Social Engineering Attacks
- Fraud and Identity Theft
Three Major Examples of Cyber
Crime

1. 2013 – 2016 : YAHOO DATA


BREACH

2. 2014 : CARD HAUL

3. 2017 : WannaCry ATTACK


02
LITERATURE REVIEW
SUMMARY

Techopedia1 defines Cybercrime as “[...] a crime in which a computer is the object of the crime (hacking,
phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes)”. Cybercriminals
may use computer technology to access information that can be personal, business information like trade
secrets, or use the net for any other malicious purposes. “Hackers usually perform these types of illegal
activities”. The damage that any single cybercriminal activity can bring about is massive. In 2017, the WannaCry
ransomware was used to attack the National Health Service in May of that year, and Petya/NotPetya
ransomware infecting global companies with a total waste of resources that cannot, to date, be estimated. The
years 2018 and 2019 suffered no better fate, indeed (Solano and Peinado, 2021). The overly high costs
connected to and lack of knowledge over these cyberattacks fundamentally motivates a systematic synthesis of
the problem and solutions around the phenomenon. We operate such a systematic synthesis intending to
identify gaps and shortcomings in the literature if any.
03
Case Study
Case STUDY

In this study, a novel approach comprising data mining technology and visualization
technique are implemented for predicting the distribution of cyber crime over major areas
of India. Initially, cyber crime datasets were preprocessed and data mining algorithms
were utilized to extort the facts out of them and then concealed interactions among the
data were explored that is promoted to report. Then, the cyber crime prototypes were
explored which were useful to cyber crime analysts in analyzing those networks by
means of visualization for cyber crime prediction and hence compassionate in preclusion
of cyber crimes. This work depicts the design of a knowledge base for an intelligent cyber
crime pattern identification system dealing with cases of Information Technology Act (IT
Act).
04
CONCLUSION
Conclusion

In the world of cyber-crime, underhanded bytes are quickly supplanting


zooming slugs. The Indian specialists know about the battle ahead.
That is each of the ones can do, at that point, until laws become more
severe, or innovation further developed. Digital wrongdoing turns into a
most concerning issue in this entire world and is expanding.
FUTURE
References.

Slide 4 :- [1]

Slide 5 :- [1]

Slide 6 :- [1]

Slide 7 :- [1]

Slide 8 :- [1]

Slide 9 - 10 :- [1]

Slide 12, 14, 16 and 18 :- [1]


THANKS

You might also like