There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
2. CONTENTS
Introduction
History of cyber crime
Definition
Categories of cyber crime
Role of computer in crime
Cyber criminals
Phishing
Prevention
source-michielwillens.com
3. INTRODUCTION
The internet in India is growing rapidly. It has
given rise to new opportunities in every field
we can think of – be it entertainment,
business, sports or education.
There are two sides to a coin. Internet also has
its own disadvantages. One of the major
disadvantages is Cyber crime – illegal
activity committed on the internet.
4. HISTORY OF CYBER CRIME
THE FIRST RECORDED CYBER CRIME IN THE 1820.
In 1820, Joseph-Marie Jacquard, a textile
manufacturer in France, produced the loom. This
device allowed the repetition of a series of steps in
the weaving of special fabrics. This resulted in a
fear amongst Jacquard's employees that their
traditional employment and livelihood were being
threatened. They committed acts of sabotage to
discourage Jacquard from further use of the new
technology. This is the first recorded cyber crime!
5. DEFINING CYBER CRIME
It’s an unlawful act wherein the computer is either
a tool or a target or both.
Acts that are punishable by the Information
Technology Act.
Cyber space is a virtual space that has become as
important as real space for business, politics, and
communities
6. CATEGORIES OF CIBER CRIME
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government.
8. ROLE OF COMPUTER IN CRIME
COMPUTER AS
TARGET
COMPUTER AS
TOOL
COMPUTER AS
APPLIANCE
Source-interaksyon.com
9. Insider Threats
(employees)
Hackers
(teenage thrill-seekers to
sophisticated criminals)
Hactivists'
(overloads e-mail servers or hack
web sites to send political message)
Virus writers
(writes viruses to that infect
systems)
Criminal groups
(attack systems & steal
password for financial gain)
Sensitive
intrusions
(sensitive information is
obtained via computer
intrusions)
Information
warfare
(alternative to military attacks)
Terrorists
(who have potential to disrupt
government systems with
computer attacks)
Cyber Warfare
(attack by sovereigns --- Crime or
Declaration of war)
CYBER CRIMINALS
10. Frequently Used Cyber Crimes
Unauthorized access to computer
systems or networks.
Theft of information contained in
electronic form.
Email bombing.
Data diddling.
Salami attacks.
Denial of Service attack.
11. Virus / worm attacks
Logic bombs
Trojan attacks
Internet time thefts
Web jacking
Theft of computer system
Physically damaging a computer
system
Source:bostinno.streetwise.co
12. PHISHING
(A GROWING PROBLEM)
LINK MANIPULATION
A deception designed to steal valuable
personal data, such as credit card
numbers, passwords, account data, or
other information.
Source-pcwordl.com
17. BE SOCIAL –MEDIA SAVVY
SECURE YOUR MOBILR DEVICES.
INSTALL LATEST OS.
SECURE WIRELESS NETWORK.
PROTECT YOUR E-IDENTITY
18. CONCLUSION
“BYTES ARE REPLACING BULLETS IN
THE CRIME WORLD”
India needs a good combination of laws
and technology, in harmony with the
laws of other countries and keeping in
mind common security standards.