SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
Presented & performed by




                           Divya Rani
                               115353
                              CSE N 2
   Introduction
   History
   Cyber Criminals
   Modes & Manner
   Categories
   Types
   Cyber Security
   Protecting your privacy
   How can we protect?
   Concluding remarks
Crime committed using a computer and the internet to steal a
person's identity or illegal imports or malicious programs
Cybercrime is nothing but where the computer used as an object
or subject of crime.
The first spam email took place in 1978 when it was sent out over the
Arpanet (Advanced Research Projects Agency Network),.
The first virus was installed on an Apple computer in 1982 when a
high school student, Rich Skrenta, developed the Elk cloner.
Those who are doing crimes by using the computer as an target or
object.
i. Children and adolescents between the age group of 6 – 18 years
ii. Dissatisfied employees
iii. Professional hackers / crackers
iv. Organized hackers
Unauthorized access to computer systems or networks:
         This is generally referred as ‘Hacking’. That is accessing the
information of others without proper authorization.

Theft of information contained in electronic form:
        This includes theft of information stored in computer hard disks,
removable storage media etc.
Data diddling:
 This is altering raw data just before a computer processes it and
 then changing it back after the processing is completed.
Denial of Service attack:
 The computer is flooded with more requests than it can handle which
 cause it to crash. Distributed Denial of Service (DDOS) attack is a
 example.
Trojan attacks:
   It means unauthorized programmer. It gains control over another’s
  system by representing itself as an authorized programmer.
 Web jacking:
    This term is derived from the term hi jacking. In these kinds of offences
    the hacker gains access and control over the web site of another.
Email bombing:
  It refers to sending large numbers of mail to the victim, which
  may be an individual or a company by ultimately resulting into
  crashing.
The Cyber crimes are categorized as the following
  i. Cyber crimes against persons
  ii. Cyber crimes against Individual Property
  iii. Cyber crimes against government
Under these categorize there are many ways to done Crimes. Here let
we see some ways …
i. Harassment via e-mails:
      Harassment through e-mails is not a new concept. It is very similar
      to harassing through letters.
ii. Cyber-stalking :
      Cyber stalking involves following a person movements across the
      Internet by posting messages.
iii. Email spoofing:
      A mail which misrepresents its origin. It shows it's origin to be
      different from which actually it originates.
i.Computer Vandalism:
     Damaging or destroying data rather than stealing or misusing them is
     called cyber vandalism.
ii.Transmitting virus:
     These are programs that attach themselves to a file and then
     circulate .
     They usually affect the data on a computer, either by altering or
     deleting it.
Cyber Terrorism:
  Terrorist attacks on the Internet is by distributed denial of service
  attacks, hate websites and hate emails, attacks on sensitive computer
  networks, etc. Technology savvy terrorists are using 512-bit encryption,
  which is impossible to decrypt.
  The recent example may be cited of – Osama Bin Laden, the LTTE, and
  attack on America’s army deployment system during Iraq war.
i. Child Pornography:
      The use of computer networks to create, distribute, or access
      materials that sexually use underage children.
ii. Cyber Contraband:
      Transferring illegal items through the internet (such as encryption
      technology) that is barred in some locations.
iii. Cyber laundering:
      Electronic transfer of illegally-obtained money with the goal of hiding
      its source and possibly its destination.
iv. Cyber Stalking:
    Threats that creates fear through the use of computer technology such
    as email, phones, text messages, webcams, websites or videos.
v. Cyber Theft:
    Using a computer to steal. This includes activities related to: breaking
    and entering, unlawful appropriation, identity theft, fraud, malicious
    hacking and piracy.
Cyber security involves protection of sensitive personal and
business    information through prevention, detection, and
response to different online attacks.
 Cyber security actually protects your personal information by
responding, detecting and preventing the attacks.
Privacy policy :
   Before submitting your name, email address, or other personal
   information on a web site, look for the site's privacy policy.
Evidence that your information is being encrypted :
   To protect attackers from hijacking your information, any personal
   information submitted online should be encrypted. Many sites use SSL
   or secure sockets layer, to encrypt information.
Keep software up to date:
  If the seller releases patches for the software operating your device,
  install them as soon as possible. Installing them will prevent attackers
  from being able to take advantage.
Use good passwords:
  Select passwords that will be difficult for thieves to guess. Do not
  choose options that allow your computer to remember your
  passwords.
Disable remote connectivity:
   Some PDA’s and phones are equipped with wireless technologies,
   such as Bluetooth, that can be used to connect to other devices or
   computers. You should disable these features when they are not in
   use.
Cybercrime is indeed getting the recognition it
deserves.
However, it is not going to restricted that easily.
In fact, it is highly likely that cybercrime and its
hackers will continue developing and upgrading to
stay ahead of the law.
So, to make us a safer we must need cyber
security.
Thank You

Divya Rani

Contenu connexe

Tendances

Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivismrashidirazali
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime finalKudakwashe Shamu
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsPrabesh Shrestha
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPTAnandKaGe
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 

Tendances (20)

cyber crime
cyber crimecyber crime
cyber crime
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
it act
it actit act
it act
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 

En vedette

Oliver toni presentació bowie
Oliver toni presentació bowieOliver toni presentació bowie
Oliver toni presentació bowieies llucmajor
 
Stamps of Emotion
Stamps of EmotionStamps of Emotion
Stamps of Emotionmmw5183
 
Atestat mihaela corectat
Atestat mihaela corectatAtestat mihaela corectat
Atestat mihaela corectatMĂDĂLINA TOMA
 
Reducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksReducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksJames Cash
 
Computer Networking
Computer NetworkingComputer Networking
Computer NetworkingAlisha Jain
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

En vedette (16)

Models and Ontologies: differences
Models and Ontologies: differencesModels and Ontologies: differences
Models and Ontologies: differences
 
Oliver toni presentació bowie
Oliver toni presentació bowieOliver toni presentació bowie
Oliver toni presentació bowie
 
Art pp
Art ppArt pp
Art pp
 
Aduh ujang
Aduh ujangAduh ujang
Aduh ujang
 
Stamps of Emotion
Stamps of EmotionStamps of Emotion
Stamps of Emotion
 
Atestat mihaela corectat
Atestat mihaela corectatAtestat mihaela corectat
Atestat mihaela corectat
 
Reducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksReducing the Impact of Cyber Attacks
Reducing the Impact of Cyber Attacks
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 

Similaire à Cyber Crime

Similaire à Cyber Crime (20)

Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 

Dernier

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 

Dernier (20)

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 

Cyber Crime

  • 1.
  • 2. Presented & performed by Divya Rani 115353 CSE N 2
  • 3. Introduction  History  Cyber Criminals  Modes & Manner  Categories  Types  Cyber Security  Protecting your privacy  How can we protect?  Concluding remarks
  • 4. Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs Cybercrime is nothing but where the computer used as an object or subject of crime.
  • 5. The first spam email took place in 1978 when it was sent out over the Arpanet (Advanced Research Projects Agency Network),. The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk cloner.
  • 6. Those who are doing crimes by using the computer as an target or object. i. Children and adolescents between the age group of 6 – 18 years ii. Dissatisfied employees iii. Professional hackers / crackers iv. Organized hackers
  • 7. Unauthorized access to computer systems or networks: This is generally referred as ‘Hacking’. That is accessing the information of others without proper authorization. Theft of information contained in electronic form: This includes theft of information stored in computer hard disks, removable storage media etc.
  • 8. Data diddling: This is altering raw data just before a computer processes it and then changing it back after the processing is completed. Denial of Service attack: The computer is flooded with more requests than it can handle which cause it to crash. Distributed Denial of Service (DDOS) attack is a example.
  • 9. Trojan attacks: It means unauthorized programmer. It gains control over another’s system by representing itself as an authorized programmer. Web jacking: This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the web site of another. Email bombing: It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing.
  • 10. The Cyber crimes are categorized as the following i. Cyber crimes against persons ii. Cyber crimes against Individual Property iii. Cyber crimes against government Under these categorize there are many ways to done Crimes. Here let we see some ways …
  • 11. i. Harassment via e-mails: Harassment through e-mails is not a new concept. It is very similar to harassing through letters. ii. Cyber-stalking : Cyber stalking involves following a person movements across the Internet by posting messages. iii. Email spoofing: A mail which misrepresents its origin. It shows it's origin to be different from which actually it originates.
  • 12. i.Computer Vandalism: Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. ii.Transmitting virus: These are programs that attach themselves to a file and then circulate . They usually affect the data on a computer, either by altering or deleting it.
  • 13. Cyber Terrorism: Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt. The recent example may be cited of – Osama Bin Laden, the LTTE, and attack on America’s army deployment system during Iraq war.
  • 14. i. Child Pornography: The use of computer networks to create, distribute, or access materials that sexually use underage children. ii. Cyber Contraband: Transferring illegal items through the internet (such as encryption technology) that is barred in some locations. iii. Cyber laundering: Electronic transfer of illegally-obtained money with the goal of hiding its source and possibly its destination.
  • 15. iv. Cyber Stalking: Threats that creates fear through the use of computer technology such as email, phones, text messages, webcams, websites or videos. v. Cyber Theft: Using a computer to steal. This includes activities related to: breaking and entering, unlawful appropriation, identity theft, fraud, malicious hacking and piracy.
  • 16. Cyber security involves protection of sensitive personal and business information through prevention, detection, and response to different online attacks. Cyber security actually protects your personal information by responding, detecting and preventing the attacks.
  • 17. Privacy policy : Before submitting your name, email address, or other personal information on a web site, look for the site's privacy policy. Evidence that your information is being encrypted : To protect attackers from hijacking your information, any personal information submitted online should be encrypted. Many sites use SSL or secure sockets layer, to encrypt information.
  • 18. Keep software up to date: If the seller releases patches for the software operating your device, install them as soon as possible. Installing them will prevent attackers from being able to take advantage. Use good passwords: Select passwords that will be difficult for thieves to guess. Do not choose options that allow your computer to remember your passwords.
  • 19. Disable remote connectivity: Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.
  • 20. Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily. In fact, it is highly likely that cybercrime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security.