2. CONTENTS
INTRODUCTION
HISTORY
CATEGORIES
TYPES OF CYBER CRIME
CYBER CRIMINALS
CYBER SECURITY
PREVENTION
CYBER LAW
CONCLUSION
3. INTRODUCTION
Cyber Crime is an activity done by the Computers
and Internet. It is an unlawful acts wherein the
computer is either a tool or a target or both.
4. HISTORY
The first recorded cyber crime took place
in 1820.
That is not surprising considering the fact
that the abacus, which is thought to be the
earliest form of a computer has been
around since 3500 B.C.
The first virus was installed on an apple
computer in 1982.
5. CATEGORIES OF CYBER CRIME
Cyber Crimes against persons
Cyber Crimes against property
Cyber Crimes against government
6. Cyber Crimes against persons
Harassment via emails
Carding
E-mail/SMS
Spoofing
Assault by threat
7. Cyber Crimes against
property
Intellectual property crimes
Cyber Squatting
Cyber Vandalism
Transmitting virus
Internet time theft
10. TYPES OF CYBER CRIME
Hacking
Child Pornography
Denial of Service Attack
Virus Dissemination
Computer Vandalism
Cyber Terrorism
Software Privacy
11. oHacking
Hacking in simple terms means an illegal
intrusion into a computer system and/or
network.
Hacking may refer to:
Computer hacking
Phone hacking
Roof and Tunnel hacking, etc
12. oChild Pornography
The internet is being highly used by its
abusers to reach and abuse children
sexually, worldwide.
Laws regarding child
pornography generally include sexual
images involving prepubescents,
pubescent or post-pubescent minors and
computer-generated images that appear
to involve them.
13. oDenial of Service Attack
Act by the criminal, who floods the
bandwidth of the victims network or fills his
e-mail box with spam mail depriving him of
the services he is entitled to access or provide.
Short for denial-of-service attack, a type
of attack on a network that is designed to
bring the network to its knees by flooding it
with useless traffic. Many DoS attacks, such
as the Ping of Death and Tear drop attacks,
exploit limitations in the TCP/IP protocols.
14. oVirus Dissemination
Malicious software that attaches itself
to other software. (viruses, worms,
Trojan, horse, e-mail bombing etc.)
There are estimated 30,000 computer
viruses in existence.
Over 300 new ones are created each
month
First virus was created to show
loopholes in software.
15. oComputer Vandalism
Damaging or destroying data rather
than stealing or misusing them is
called cyber vandalism.
On the Internet, includes acts such as a
cracker’s replacing the original Web
page with profanity or some racist
16. oCyber Terrorism
Use of internet based attacks in terrorist
activities. These terrorists are using 512-bit
encryption, which is impossible to decrypt.
Cyber terrorism can be also defined as the
intentional use of computer, networks, and
public internet to cause destruction and
harm for personal objectives.
Objectives may be political or ideological
since this can be seen as a form of terrorism.
17. oSoftware Privacy
Theft of software through the illegal copying
of genuine programs.
Distribution of products intended to pass for
the original.
The majority of software today is purchased
as a one-site license,
meaning that only one
computer may have that
software installed on it at
one time.
18. CYBER CRIMINALS
Cyber criminal is an a individual who commits cyber
crime where heshe makes use of the computer either
as a tool or as a target or as a both.
Cybercriminals use computers in three broad ways:
Select computer as their target: These criminals
attack other people's computers to perform malicious
activities, such as spreading viruses, data theft,
identity theft, etc.
Uses computer as their weapon: They use the
computer to carry out "conventional crime", such as
spam, fraud, illegal gambling, etc.
Uses computer as their accessory: They use the
computer to save stolen or illegal data.
19. TYPES OF CYBER
CRIMINALS
Script Kiddies
Scammers
Hacker groups
Phishers
Insiders
Cyber terrorists
20. CYBER SECURITY
Cyber security focuses on protecting computers,
networks, programs and data from unintended or
unauthorized access, change or destruction.
Computer security, also known as cyber security or
IT security, is the protection of information
systems from theft or damage to the hardware, the
software, and to the information on them, as well
as from disruption or misdirection of the services
they provide.
21. NEED OF CYBER
SECURITY
Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from
viruses.
Hacking, cracking and other forms of cyber
mischief have reached a level of sophistication
equalling (and in many cases surpassing) the
capability of most organizations to defend
against.
22. ADVANTAGES OF CYBER
SECURITY
Protects system against viruses, worms,
spyware and other unwanted
programs.
Protection against data from theft.
Protects the computer from being
hacked.
Minimizes computer freezing and
crashes.
Gives privacy to users
23. PREVENTION TIPS
Use strong passwords
Install the latest OS updates
Secure your wireless network
Secure your computer by activating
firewall and using anti-virus software's
Maintain backups
Check security settings
24. CYBER
LAW
Cyber law is an attempt to integrate the
challenges presented by human activity
on the Internet with legacy system of laws
applicable to the physical world.
25. IT ACT PROVISIONS
E-mail would now be a valid and legal form of
communication in our country that can be duly
produced and approved in a court of law.
Companies shall now be able to carry out electronic
commerce using the legal infrastructure provided
by the Act.
Digital signatures have been given legal validity and
sanction in the Act.
26. CYBER LAWS AMENDMENTS
INDIAN PENAL CODE,1860
INDIAN EVIDENCE ACT,1872
BANKER’S BOOK EVIDENCE
ACT,1891
GENERAL CLAUSES ACT,1897
27. CONCLUSION
Technology is destructive only in the hands of
people who do not realize that they are one and
the same process as the universe.
Cybercrime is a major problem – and growing
Cybercrime is about much more than hackers
There is a natural adversarial relationship
between IT and police
Successful prosecution of cybercrime must be a
team effort
IT personnel must learn investigation and police
must learn technology