2. CONTENT
2
INTRODUCTION
HISTORY OF CYBER CRIME
CATEGORIES OF CYBER CRIME
TYPES OF CYBER CRIME
CYBER ATTACKS
CYBER SECURITY
CYBER LAW OF INDIA
ADVANTAGES OF CYBER SECURITY
STATISTICS OF CYBER CRIME
CONCLUSION
3. 3
INTRODUCTION
Cyber crime is an activity done using computers and
internet. We can say that it is an unlawful acts where in
the computer either a tool or target or both.
The term cyber security is used to refer to the security
offered through on-line services to protect your online
information.
Cyber security refers to the body of technologies,
processes, and practices designed to protect networks,
devices, programs, and data from attack, damage, or
unauthorized access. Cyber security may also be referred
to as information technology security
4. 4
HISTORY OF CYBERCRIME
The first recorded cyber crime took place in 1820.
That is not surprising considering the fact that the
abacus, which is thought to be the earliest from of
a computer, has been around since 3500 B.c.
In India, Japan and China, the era of modern
computer, however, began with the analytical
engine of Charles Babbage.
The first spam email took place in 1976 when it
was sent out over theARPANT.
The first virus was installed on an Apple computer
in 1982 when a high school student, Rich skrenta,
developed the EIK Cloner.
5. 5
The computer as a target The computer as a weapon
Using a computer to
attacks other computer,
e.g. Hacking,
virus/worms attacks, Dos
attack etc.
Using a computer to
commit real world crime
e.g. cyber terrorism,
credit card fraud and
pornography etc
CATEGORIESOF CYBER CRIME
6. 6
TYPES OF CYBERCRIME
HACKING
Hacking in simple terms means an illegal intrusion info
a computer system and/or network . It is also
known as CRACKING. Government websites are
the hot target of the hackers due to the press
coverage, it receives. Hackers enjoy the media
coverage.
Motive behind the crime called HACKERS
Motive behind the crime called hacking greed
power, publicity, revenge, adventure desire to
access forbidden information destructive mindset
wants to sell n/w security services.
7. 7
TYPES OF CYBERCRIME
CHILD PORNOGRAPHY :
The Internet is beinghighly used by its abusers to
reach and abuse children sexually, worldwide. As
more homes have access to internet, more
children would be using the internet and more are
the chances of falling victim to the aggression of
Pedophiles.
How Do They Operate :
How do they operate Pedophiles use false
identity to trap the children , Pedophiles connect
children in various chat rooms which are used by
children to interact with other children.
8. 8
TYPES OF CYBERCRIME
CHILD PORNOGRAPHY :
The Internet is beinghighly used by its abusers to
reach and abuse children sexually, worldwide. As
more homes have access to internet, more
children would be using the internet and more are
the chances of falling victim to the aggression of
Pedophiles.
How Do They Operate :
How do they operate Pedophiles use false
identity to trap the children , Pedophiles connect
children in various chat rooms which are used by
children to interact with other children.
9. 9
TYPES OF CYBERCRIME
DENIAL OF SERVICE ATTACKS : This is an act by
the criminals who floods the bandwidth of the
victims network or fills his E-mail box with spam
mail depriving him of the service he is entitled to
access or provide. Many DOS attacks, such as
the ping of death and Tear drop attacks.
VIRUS DISSMINITION : Malicious software that
attaches itself to other software. VIRUS ,
WORMS, TROJAN HORSE ,WEB JACKING,
E-MAIL BOMBING etc.
COMPUTER VANDALISM : Damaging or
destroying data rather than stealing or misusing
them is called cyber vandalism. These are
program that attach themselves to a file and then
circulate.
10. 10
TYPES OF CYBERCRIME
CYBER TERRORISM : Terrorist attacks on the
Internet is by distributed denial of service
attacks, hate websites and hate E-mails ,
attacks on service network etc.
SOFTWARE PIRACY : Theft of software
through the illegal copying of genuine
programs or the counterfeiting and
distribution of products intended to pass
for the original.
11. 11
Cyber Attack’s
Cyber attacks are socially or politically
motivated attacks carried out primarily
through the Internet. Attacks target the
general public or national and corporate
organizations and are carried out through
the spread of malicious programs
(viruses), unauthorized web access, fake
websites, and other means of stealing
personal or institutional information from
targets of attacks, causing far-reaching
damage.
12. 12
Types of Cyber Attack
Password Attack
Dos Attack
Phishing
Worm,Virus & Trojan Horse Attack
SQL injection etc.
13. 13
Password Attack
Password Attack refers to various measures
used to discover computer passwords. This
is usually accomplished by recovering
passwords from data stored in, or
transported from, a computer system.
Password cracking is done by guessing the
password or use common password.
14. 14
DoS (Denial of Service) Attack
DOS is an attack used to deny legitimate users access
to a resource such as accessing a website, network,
emails, etc. or making it extremely slow. DoS is the
acronym for Denial of Service.
This type of attack is usually implemented by hitting
the target resource such as a web server with too many
requests at the same time. This results in the server
failing to respond to all the requests. The effect of this
can either be crashing the servers or slowing them
down.
15. 15
Worm, Virus & Trojan Horse Attack
The skilled hackers have programming and computer
networking skills. They often use these skills to gain
access to systems. The objective of targeting an
organization would be to steal sensitive data, disrupt
business operations or physically damage computer
controlled equipment.
Trojans, viruses, and worms can be used to achieve
the above-stated objectives.
16. 16
Cyber Attacks in india
Ransomeware Attack:-
The global Ransomeware attacks that hit
hundred of system to phishing an
dsccaningh rackets ,
At least one cybercrime was reported
every 10 minutes in India in the first six
month of 2017.
17. 17
CYBER SECURITY
Cyber Security : Cyber Security involves protection
of sensitive personal and business information
through prevention, detection and response to
different online attacks. Cyber security actually
preventing the attacks, cyber security.
Privacy Policy : Before submitting your name ,
e-mail , address, on a website look for the sites
privacy policy.
Keep Software Up to Date: If the seller reduces patches
for the software operating system your device
,install them as soon as possible .Installing them
will prevent attackers form being able to take
advantage. Use good password which will be
difficult for thieves to guess. Do not choose option
that allows your computer to remember your
passwords.
18. 18
CYBER SECURITY
DISABLE REMOTE CONNECTIVITY
Some PDA’s and phones are equipped
with wireless technologies, such as
Bluetooth, that can be used to connect
to other devices or computers. You
should disable these features when
they are not in use.
19. 19
ADVANTAGES OF CYBER SECURITY
The cyber security will defend us from data attack
It helps us to browse the site,website.
Internet Security process all the incoming
and outgoing data on your computer.
It will defend us from hacks and virus.
Application of cyber security used in our PC
needs update every week
20. 20
CYBER CRIMESTHREATENS NATIONALSECURITY
CYBER CRIMES THREATENS NATIONAL SECURIT IN INDIA
Likewise Union home minister Shivraj Patil said that
the rising level of cyber crime is an indication of
enormous threat to national security. On Google’s
social networking site orkut, facebook, have been
perplexing authorities . Fan clubs of Underworld Dons
like Dawood Ibrahim and Chhota Shakeel and other
wanted underworld dons are also doing the rounds on
orkut. There is huge potential for damage to national
security through cyber attacks. The internet is a
means for money bounding and funding terrorist
attacks in an organized manner.
21. 21
CYBER LAW OFINDIA
Cyber crime can involve criminal activities that are
traditional in nature, such as theft, fraud, deformation and
mischief, all of which are subjected to the India Penal
code. In simple way we can say that cyber crime is
unlawful acts where in the computer is either a tool or
both.
The abuse of computer has also given birth of new age
crime that are addressed by the Information Technology
Act,2000.
23. 23
CONCLUSION
Cyber crime can involve criminal activities that are
traditional in nature, such as theft, fraud, deformation and
mischief, all of which are subjected to the India Penal
code. In simple way we can say that cyber crime is
unlawful acts where in the computer is either a tool or
both.
The abuse of computer has also given birth of new age
crime that are addressed by the Information Technology
Act,2000.