0% found this document useful (0 votes)
6 views20 pages

Avdoot Word 1 FULLY FINAL

The document is an English project by Avdhoot Nagave on cyber crime and security for the academic year 2025-2026. It covers various aspects of cyber crime, including definitions, types, security measures, and the role of government and laws in combating cyber threats. The project emphasizes the importance of cyber security in today's digital age and the emerging challenges posed by advanced technologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views20 pages

Avdoot Word 1 FULLY FINAL

The document is an English project by Avdhoot Nagave on cyber crime and security for the academic year 2025-2026. It covers various aspects of cyber crime, including definitions, types, security measures, and the role of government and laws in combating cyber threats. The project emphasizes the importance of cyber security in today's digital age and the emerging challenges posed by advanced technologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

ENGLISH PROJECT WORK

2025-2026
CYBER CRIME AND SECURITY
NAME- AVDHOOT NAGAVE
CLASS-12 TH
COLLEGE- ST THOMAS SCHOOL AND JR.COLLEGE
ROLL NO-
CERTIFICATE
This is to certify that Avdhoot Nagave Of class 12th (Academic Year 2025-2026)
Has successfully completed the English investigatory project on the topic
Development of artificial intelligence and its help to humanity.”The project has
been completed under the guidance of the subject teacher as part of the English
curriculum. It reflects sincere effort, creativity, and a clear understanding of the
chosen topic.We congratulate him on this achievement and wish him continued
success in all future endeavors.
Subject teacher
( Signature )

Principal

( Signature )
Acknowledgment
 I am deeply grateful to Miss Shakila Patel, my English teacher, for her
continuous support, encouragement, and guidance throughout the process of
completing this investigatory project her expert advice on language grammar
and presentation greatly helped me to express my ideas clearly and
effectively. She patiently reviewed my work and provided valuable
suggestions that improved the overall quality of the project.

 I also appreciate her motivation which inspired me to put in my best effort.


Her dedication as a teacher has been a great source of inspiration for me.

I would like to extend my thanks to my family and friends for their constant
encouragement and help whenever I needed it.
CONTENT
 CONTENT ..................................................................................... Error! Bookmark not defined.
 What is cyber crime ? ................................................................................................................ 6
 Types of cybercrimes ................................................................................................................. 7
 Cyber security Measures ........................................................................................................... 9
 Cyber Security Attacks ............................................................................................................. 10
 Cyber security for students ......................................................... Error! Bookmark not defined.
 Cyber security in demand in india ........................................................................................... 12
 How can we prevent Cyber crime ? ......................................................................................... 13
 Cyber laws and Regulations in india Top 3 major cyber laws .................................................. 16
 Emerging Threats .................................................................................................................... 17
 Future of cyber security........................................................................................................... 18
INTRODUCTION

Cybercrime is illegal activity conducted using computers and the internet, while cyber security
aims to protect systems and data from cyber attacks. Both are crucial in today's digital world,
as cybercrime can lead to financial losses, data breaches, and reputational damage.

Cybercrime encompasses a wide range of offenses, including hacking, data theft, malware attacks,
and financial fraud. It is driven by profit and can target individuals, businesses, governments,
and critical infrastructure. Examples include phishing scams, ran somware attacks, and
identity theft.

Cyber security is the practice of safeguarding digital assets from cyber threats. It involves
implementing various technologies, processes, and controls to protect systems, networks,
programs, and data. Cyber security measures include firewalls, intrusion detection systems,
encryption, and security awareness training.

The importance of cyber security is underscored by the escalating cost of cyber attacks and their
potential impact on individuals, businesses, and society. As cybercriminals become more
sophisticated, the need for robust cyber security measures is paramount.
What is cyber crime ?
 It refers to any illegal activity that uses a computer
network or networked device to carry out criminal
acts.
 Cyber security’s Duty :- Their duty is to protecting
information systems and data from various threats .
 They also play a crucial role in educating users cyber security
best practices
 Importance in the digital age :- connectivity access to
information and the ability to adapt to changing
technological landscapes are crucial for individuals
businesses and societies.
 Furthermore digital literacy , data privacy and Critical
thinking skills are essential for navigating the
complexities of the digital world .
Types of cybercrimes

 HACKING
 PHISING
 IDENTITY THEFT
 CYBERBULLYING
 RANSOMWARE ATTACKS
 FINANACIAL FRAUDS

This Photo by Unknown Author is licensed under CC BY-NC-ND


This Photo by Unknown Author is licensed under CC BY
Cyber security Measures

 Strong password:- A strong password can keep you safe and secure and not
letting of data bleaching
 Firewall:- A network security device that monitors and filters incoming and
outgoing network traffic based on an organization’s previously established
security policies.
 Antivirus software:- A strong antivirus software apps keeps secure our data and
keep it private it do not allow any third party or unknown files to enter in the
device to encounter personal information about an individual
Cyber Security Attacks

 A cyber attack the attacker gains unauthorized access to a


computer system network or a device for stealing modifying or
destroying data. The attacker may use a variety of tactics
including malware social engineering or exploiting vulnerabilities
in software or systems
 These attacks aim to gain unauthorized access, steal data, disrupt
operations or cause damage.
 Stuxnet – this malware attack on iran’s uranium processing plants
is considered the first known cyber weapon targeting physical
infrastructure.
Cyber security for students
 Cyber security is important for students because they
often target cyber attacks. In a recent case a group
of students from college in the united states was
targeted by hackers who had access to their personal
information including their social security numbers
and credit card information.
 Cyber security education for students is crucial for fostering
online safety and preparing them for future careers in digital
world
 Relate cyber security to everyday life is the real world
examples.
Cyber security in demand in
india

 The Indian cyber security job market is experiencing a


surge in demand driven by increasing cyber threat
digitization and regulatory frameworks. This demand
is expected to lead o a significant shortfall of skilled
professional with projections indicating a million positions
unfilled by 2025.
 Key factors fuelling this demand include heightened
awarness of cyber attacks the rapid adoption of digital
technologies and the need for businesses to protect their
data and infrastructure.
How can we prevent
Cyber crime ?
 This includes practicing strong password
management, using secure internet
Connections, being vigilant about phishing attempts,
keeping software up-to-date, and utilizing cyber
security tools like antivirus software and firewall.
 To prevent cybercrime its crucial to maintain up-to
date software use strong password and be cautious
about clicking on unknown links or opening
attachments in suspicious emails.
 Additionally enable multifactor authentication back up important data and
educate yourself and others about potential threats like phishing and malware
Either side we can even pay for good antivirus software for our computers tab
and laptop. This is the best protection for your device and data from viruses
malware and other internet threats.
 The government’s role :-
 1. Establishing legal and regulatory
 2. Intelligence gathering and
Role of  sharing

government in 3. Responding to cyber attacks.
4. Supporting research and
cyber crime development.
The government plays a crucial role in  5 . Law enforcement and prosecution.
addressing cyber crime through various
measures. 6 . Promoting cyber security
 awareness.
This includes establishing regulatory
frameworks, conducting, intelligence
gathering, responding to cyberattacks,
and supporting research and
development in cyber security.
Cyber laws and Regulations in india
Top 3 major cyber laws
 The information technology Act, 2000 (IT
Act),:is the primary legislation dealing with
cybersecurity, data protection and cybercrime.
 Indian penal code (IPC):- (IPC) is used to address
various cybercrimes that fall under existing
criminal categories like fraud theft and
defamation. It allows fir the prosecution of
cybercriminals based on the traditional offenses they
commit.
 National cyber security policy, 2013:- This policy aims to
protect information, infrastructure and critical systems from
cyber threats. It focuses on building the necessary capacities
to prevent mitigate and respond to cyber incidents
Emerging Threats

 Al powered attacks:- The use of AI Technologies by cybercriminals to enhance


the effectiveness of their attacks. These attacks exploit AL’s ability to learn
adapt, and excute complex tasks faster and more accurately than humans
attackers could.
 Deep fakers:- Deepfake technology can be used to create new identities and
steal the identities of real people. Attackers use the technology to create false
documents or fake their victim’s voice which enables them to create accounts
or purchase products by pretending to be that person.
 IoT Vulnerability:- IoT stands for (internet of things) devices are inherently
vulnerable due to their design often prioritizing connectivity over security.
This include weak passwords, insecure networks, outdated components, lack of
proper.
Future of cyber security

 Machine Learning & AI in security:- Both are powerful tools used to enhance
cybersecurity by automating threat detection, analysis, and response. AL and
ML can algorithms can analyze vast datasets, identify patterns, and make
predictions with speed and accuracy that surpass human
 Zero Trust Architecture (ZTA) is a security approach that assumes no user or
device should be trusted by default, even if they are within the organization's
network.

 A cybersecurity career path typically involves starting with foundational IT


skills, gaining experience in specialized roles, and potentially progressing to
leadership positions.
Conclusion
 The intersection of cyber security and crime highlights the
critical need for strong defenses against evolving digital
threats. As the internet and digital technologies continue to
expand, so too does the potential for cybercrime, making cyber
security a crucial aspect of modern life and
business. Protecting individuals, businesses, and critical
infrastructure from cyber attacks requires a multi-faceted
approach, including robust security measures, heightened
awareness, and proactive collaboration between various
stakeholders.
BIBLOGRAPHY

 www.Wikipedia.com

 www.youtube.com

 www.chrome.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy