cyber crime and security
TRANSCRIPT
![Page 1: CYBER CRIME AND SECURITY](https://reader038.vdocument.in/reader038/viewer/2022110310/55a786801a28ab96188b463e/html5/thumbnails/1.jpg)
If we can defeat them sitting at
home……who needs to fight
with tanks and guns!!!!
Presented By
Muskan sharama
Class ix.
![Page 2: CYBER CRIME AND SECURITY](https://reader038.vdocument.in/reader038/viewer/2022110310/55a786801a28ab96188b463e/html5/thumbnails/2.jpg)
![Page 3: CYBER CRIME AND SECURITY](https://reader038.vdocument.in/reader038/viewer/2022110310/55a786801a28ab96188b463e/html5/thumbnails/3.jpg)
![Page 4: CYBER CRIME AND SECURITY](https://reader038.vdocument.in/reader038/viewer/2022110310/55a786801a28ab96188b463e/html5/thumbnails/4.jpg)
Cyber crime
![Page 5: CYBER CRIME AND SECURITY](https://reader038.vdocument.in/reader038/viewer/2022110310/55a786801a28ab96188b463e/html5/thumbnails/5.jpg)
CYBER THREAT EVOLUTION
![Page 6: CYBER CRIME AND SECURITY](https://reader038.vdocument.in/reader038/viewer/2022110310/55a786801a28ab96188b463e/html5/thumbnails/6.jpg)
TYPES OF CYBER CRIME
![Page 7: CYBER CRIME AND SECURITY](https://reader038.vdocument.in/reader038/viewer/2022110310/55a786801a28ab96188b463e/html5/thumbnails/7.jpg)
HACKING
![Page 8: CYBER CRIME AND SECURITY](https://reader038.vdocument.in/reader038/viewer/2022110310/55a786801a28ab96188b463e/html5/thumbnails/8.jpg)
VIRUS DISSEMINATION
![Page 9: CYBER CRIME AND SECURITY](https://reader038.vdocument.in/reader038/viewer/2022110310/55a786801a28ab96188b463e/html5/thumbnails/9.jpg)
CYBER TERRORISM
![Page 10: CYBER CRIME AND SECURITY](https://reader038.vdocument.in/reader038/viewer/2022110310/55a786801a28ab96188b463e/html5/thumbnails/10.jpg)
SOFTWARE PIRACY
![Page 11: CYBER CRIME AND SECURITY](https://reader038.vdocument.in/reader038/viewer/2022110310/55a786801a28ab96188b463e/html5/thumbnails/11.jpg)
SAFETY TIPS FOR CYBER CRIME
![Page 12: CYBER CRIME AND SECURITY](https://reader038.vdocument.in/reader038/viewer/2022110310/55a786801a28ab96188b463e/html5/thumbnails/12.jpg)
Security
![Page 13: CYBER CRIME AND SECURITY](https://reader038.vdocument.in/reader038/viewer/2022110310/55a786801a28ab96188b463e/html5/thumbnails/13.jpg)
CYBER SECURITY
![Page 14: CYBER CRIME AND SECURITY](https://reader038.vdocument.in/reader038/viewer/2022110310/55a786801a28ab96188b463e/html5/thumbnails/14.jpg)
ADVANTAGES OF CYBER SECURITY
![Page 15: CYBER CRIME AND SECURITY](https://reader038.vdocument.in/reader038/viewer/2022110310/55a786801a28ab96188b463e/html5/thumbnails/15.jpg)
CONCLUSION
.
![Page 16: CYBER CRIME AND SECURITY](https://reader038.vdocument.in/reader038/viewer/2022110310/55a786801a28ab96188b463e/html5/thumbnails/16.jpg)