Avdoot Word 1 FULLY FINAL
Avdoot Word 1 FULLY FINAL
2025-2026
CYBER CRIME AND SECURITY
NAME- AVDHOOT NAGAVE
CLASS-12 TH
COLLEGE- ST THOMAS SCHOOL AND JR.COLLEGE
ROLL NO-
CERTIFICATE
This is to certify that Avdhoot Nagave Of class 12th (Academic Year 2025-2026)
Has successfully completed the English investigatory project on the topic
Development of artificial intelligence and its help to humanity.”The project has
been completed under the guidance of the subject teacher as part of the English
curriculum. It reflects sincere effort, creativity, and a clear understanding of the
chosen topic.We congratulate him on this achievement and wish him continued
success in all future endeavors.
Subject teacher
( Signature )
Principal
( Signature )
Acknowledgment
I am deeply grateful to Miss Shakila Patel, my English teacher, for her
continuous support, encouragement, and guidance throughout the process of
completing this investigatory project her expert advice on language grammar
and presentation greatly helped me to express my ideas clearly and
effectively. She patiently reviewed my work and provided valuable
suggestions that improved the overall quality of the project.
I would like to extend my thanks to my family and friends for their constant
encouragement and help whenever I needed it.
CONTENT
CONTENT ..................................................................................... Error! Bookmark not defined.
What is cyber crime ? ................................................................................................................ 6
Types of cybercrimes ................................................................................................................. 7
Cyber security Measures ........................................................................................................... 9
Cyber Security Attacks ............................................................................................................. 10
Cyber security for students ......................................................... Error! Bookmark not defined.
Cyber security in demand in india ........................................................................................... 12
How can we prevent Cyber crime ? ......................................................................................... 13
Cyber laws and Regulations in india Top 3 major cyber laws .................................................. 16
Emerging Threats .................................................................................................................... 17
Future of cyber security........................................................................................................... 18
INTRODUCTION
Cybercrime is illegal activity conducted using computers and the internet, while cyber security
aims to protect systems and data from cyber attacks. Both are crucial in today's digital world,
as cybercrime can lead to financial losses, data breaches, and reputational damage.
Cybercrime encompasses a wide range of offenses, including hacking, data theft, malware attacks,
and financial fraud. It is driven by profit and can target individuals, businesses, governments,
and critical infrastructure. Examples include phishing scams, ran somware attacks, and
identity theft.
Cyber security is the practice of safeguarding digital assets from cyber threats. It involves
implementing various technologies, processes, and controls to protect systems, networks,
programs, and data. Cyber security measures include firewalls, intrusion detection systems,
encryption, and security awareness training.
The importance of cyber security is underscored by the escalating cost of cyber attacks and their
potential impact on individuals, businesses, and society. As cybercriminals become more
sophisticated, the need for robust cyber security measures is paramount.
What is cyber crime ?
It refers to any illegal activity that uses a computer
network or networked device to carry out criminal
acts.
Cyber security’s Duty :- Their duty is to protecting
information systems and data from various threats .
They also play a crucial role in educating users cyber security
best practices
Importance in the digital age :- connectivity access to
information and the ability to adapt to changing
technological landscapes are crucial for individuals
businesses and societies.
Furthermore digital literacy , data privacy and Critical
thinking skills are essential for navigating the
complexities of the digital world .
Types of cybercrimes
HACKING
PHISING
IDENTITY THEFT
CYBERBULLYING
RANSOMWARE ATTACKS
FINANACIAL FRAUDS
Strong password:- A strong password can keep you safe and secure and not
letting of data bleaching
Firewall:- A network security device that monitors and filters incoming and
outgoing network traffic based on an organization’s previously established
security policies.
Antivirus software:- A strong antivirus software apps keeps secure our data and
keep it private it do not allow any third party or unknown files to enter in the
device to encounter personal information about an individual
Cyber Security Attacks
Machine Learning & AI in security:- Both are powerful tools used to enhance
cybersecurity by automating threat detection, analysis, and response. AL and
ML can algorithms can analyze vast datasets, identify patterns, and make
predictions with speed and accuracy that surpass human
Zero Trust Architecture (ZTA) is a security approach that assumes no user or
device should be trusted by default, even if they are within the organization's
network.
www.Wikipedia.com
www.youtube.com
www.chrome.com