0% found this document useful (0 votes)
48 views14 pages

Cyber Security

Uploaded by

Rao K V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views14 pages

Cyber Security

Uploaded by

Rao K V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Table of

Contents
What is Types of
How do How to
Cyber Cyber
they occur? prevent it?
Crime? Crime
 Acknowledge  How are they  Hacking  6
ment about occuring? recommende
cyber crime  Phishing d ways to
 Global prevent
Cybersecurit  Malware yourself
y Index (GCI) from
 Identity victimisation
Theft
All about Cyber
01 Crime 02
 Cyber crimes can be
 Cyber crimes involve
illegal activities committed from
using computers, anywhere in the world,
digital devices, or making it challenging
networks. for law enforcement

03 04
 The impact can be severe,  Cyber criminals
leading to financial loss, continuously develop
data breaches, and new techniques and
emotional distress. tools, requiring
constant adaptation in
cybersecurity
How do
Cybercrimes
Cybercrimes occur through various
methods, exploiting vulnerabilities in
occur?
computer systems and networks.
Here are some key points:

 Phishing and Ransomware:


Cybercriminals often use phishing
emails to trick users into revealing
sensitive information or installing
malware. Ransomware attacks
encrypt files and demand payment
for decryption.

 Email-Based Attacks: Over 75% of


targeted cyberattacks start with an
email1. These can lead to data
breaches, financial losses, or
system compromise.
 Tech Support Fraud: In 2020, the FBI
received 15,421 internet crime
complaints related to tech support
fraud1. Scammers pose as tech
support agents to deceive victims.

 Global Costs: Global cybercrime costs


are expected to reach $10.5 trillion
annually by 2025. More than half of
all consumers have experienced a
cybercrime.

 Physical Harm: Recent incidents show


that cyberattacks can cause physical
harm. For instance, a ransomware
attack led to the first reported death
in a hospital in Germany
S U M M A R
Y

Analysing
Global Cyber
Crime Index
Of
Recent Years
The concentration or frequency of cyber
incidents within a specific context. It provides
insights into risk exposure and aids in
prioritizing security measures.
ANALY
SE
Hacking

H
• Unauthorized access to computer
systems or networks to steal,
alter, or destroy data. This can
include activities like breaking
into systems to steal sensitive
information or to disrupt
operations
Phishing
• Fraudulent attempts to obtain
sensitive information such as

P
usernames, passwords, and
credit card details by disguising
as a trustworthy entity in
electronic communications1

Malware
Malicious software designed to
harm, exploit, or otherwise
compromise a computer system.
This includes viruses, worms,
Trojans, ransomware, and
spyware
M
I IDENTITY THEFT
• Stealing personal information
such as names, addresses, and
social security numbers to
fraudulently assume someone’s
identity, often for financial gain
Prevention
Methods
Consider trusted Avoid repeating passwords Regularly update your
security software like across different sites. Create operating systems and
Norton 360 with complex passwords with a mix internet security
LifeLock Select, which of at least 10 letters, numbers, software. Cybercriminals
provides comprehensive and symbols. Consider using a often exploit known
protection for your password management vulerbilities in outdated
devices, online privacy, application to keep them software.
and identity. secure.
Prevention
Methods
Secure your Wi-Fi Avoid opening attachments Stay informed about the
network with a strong from unknown sources or latest cyber threats and
password, enable WPA3 clicking on suspicious links. best practices.
encryption, and change Verify requests for personal Awareness is key to
default router information directly with preventing cybercrime.
credentials. Regularly companies an be mindful of
check connected devices the website URLs.
for security updates.

You might also like