Cyber Crime and Security: em Fig
Cyber Crime and Security: em Fig
Cyber Crime and Security: em Fig
em
D
fig
SIII
I
Lipsita Behera.
B.Sc 1ST, 3rd Year.
Roll-11DIS110.
RAVENSHAW UNIVERSITY.
CONTENTS
■ Introduction.
■ Definition.
■ History.
■ Cyber threat evolution.
■ Categories of cyber crime.
■ Types of cyber crime.
■ Prevention.
■ Security.
■ Conclusion.
INTRODUCTION
♦>
■
Crime committed using a computer and the
internet to steal data or information.
■ Illegal imports.
■ Malicious programs.
Cybercrime is nothing but where
the computer used as an object
or subject of crime..
HISTORY
• Hacking
• Denial of service attack
• Virus Dissemination
• Computer Vandalism
• Cyber Terrorism
• Software Piracy
HACKING