SlideShare une entreprise Scribd logo
1  sur  35
Cyber crimes
Presentation on
Introduction to cyber
crime...
What is cyber crime ??
Cyber crime is a generic term that
refers to all criminal activities done
using the medium of computers, the
Internet, cyber space and the
worldwide web.
Cyber law
• Cyber law is a term used to describe the
legal issues related to use of
communications technology, particularly
“cyberspace”, i.e. the Internet.
• Cyber law is an attempt to apply laws
designed for the physical world, to
human activity on the Internet.
Categories of Cyber crimes
• e.g. Hacking, Virus/Worm attacks,
DOS attack etc.
1. The Computer
as a Target :-using
a computer to
attack other
computers.
• e.g. Cyber Terrorism, IPR violations,
Credit card frauds, EFT frauds,
Pornography etc.
2. The computer
as a weapon :-
using a computer
to commit real
world crimes.
We can categorize Cyber crimes in two ways
Another Categorization of Cyber
crimes
Various types of cyber
crime..
1. Hacking
• Hacking is the unauthorized access to a
computer system, programs, data and
network resources.
Law & Punishment
• Under Information Technology (Amendment)
Act, 2008, Section 43(a) read with section 66
is applicable and Section 379 & 406 of Indian
Penal Code, 1860 also are applicable.
• If crime is proved under IT Act, accused shall
be punished for imprisonment, which may
extend to three years or with fine, which may
extend to five lacs rupees or both.
2. Data theft
If any person without permission of the
owner or any other person, who is in charge
of a computer, computer system of computer
network - downloads, copies or extracts any
data, computer data base or information
from such computer, computer system or
computer network including information or
data held or stored in any removable storage
medium, then it is data theft.
Law & Punishment
Under Information Technology (Amendment)
Act, 2008, Section 43(b) read with Section 66
is applicable and under Section 379, 405 &
420 of Indian Penal Code, 1860 also
applicable.
3. Spreading Virus or Worms
• Viruses can do any amount of damage, the creator
intends them to do.
• They can send your data to a third party and then
delete your data from your computer.
• They can also ruin/mess up your system and render it
unusable without a re-installation of the operating
system.
• Usually the virus will install files on your system and
then will change your system so that virus program is
run every time you start your system.
• It will then attempt to replicate itself by sending itself
to other potential victims.
Law & Punishment
Under Information Technology (Amendment)
Act, 2008, Section 43(c) & 43(e) read with
Section 66 is applicable and under Section
268 of Indian Penal Code, 1860 also
applicable.
4. Identity Theft
Identity theft is a form of fraud or cheating of
another person’s identity in which someone
pretends to be someone else by assuming
that person’s identity, typically in order to
access resources or obtain credit and other
benefits in that person’s name.
Law & Punishment
• Under Information Technology (Amendment)
Act, 2008, Section 66-C and Section 419 of
Indian Penal Code, 1860 also applicable.
5. E-Mail Spoofing
• A spoof email is one that appears to originate
from one source but actually has been sent
from another source.
• Hackers use this method to disguise the actual
email address from which phishing and spam
messages are sent and often use email
spoofing in conjunction with Web page
spoofing to trick users into providing personal
and confidential information.
Law & Punishment
• Under Information Technology (Amendment)
Act, 2008, Section 66-C and Section 419 of
Indian Penal Code, 1860 also applicable.
6. Trojan Attack
• The program that act like something useful
but do the things that are quiet damping. The
programs of this kind are called as Trojans.
• The name Trojan Horse is popular.
7. E-mail related crimes
1. Email spoofing
Email spoofing refers to email that appears to have been originated
from one source when it was actually sent from another source.
Please Read
2. Email Spamming
Email "spamming" refers to sending email to thousands and
thousands of users - similar to a chain letter.
3 Sending malicious codes through email
E-mails are used to send viruses, Trojans etc through emails as an
attachment or by sending a link of website which on visiting
downloads malicious code.
4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an
identical email message to a particular address.
8. IPR Violations
IPR stands for intellectual proprietary rights.
These include software piracy, copyright
infringement, trademarks violations, theft of
computer source code, patent violations. etc.
9.Data diddling
• Data diddling involves changing data prior or
during input into a computer.
• In other words, information is changed from
the way it should be entered by a person
typing in the data, a virus that changes data,
the programmer of the database or
application, or anyone else involved in the
process of having information stored in a
computer file.
Cyber crime evolution
Cyber crime in different
countries
Documented cases
• June 2012 LinkedIn and eHarmony had been attacked, compromising 65 million passwords, 30,000
passwords were cracked and 1.5 million EHarmony passwords were posted online.[17]
• December 2012 Wells Fargo website experienced a denial of service attack. Potentially
compromising 70 million customers and 8.5 million active viewers. Other banks thought to be
compromised: Bank of America, J. P. Morgan U.S. Bank, and PNC Financial Services[18]
• In January 2012 Zappos.com experienced a security breach after as many as 24 million customers'
credit card numbers, personal information, billing and shipping addresses had been
compromised.[19] On 2 March 2010, Spanish investigators arrested 3[clarification needed] in infection of
over 13 million computers around the world. The "botnet" of infected computers included PCs
inside more than half of the Fortune 1000 companies and more than 40 major banks, according to
investigators.
• In August 2010 the international investigation Operation Delego, operating under the aegis of
the Department of Homeland Security, shut down the international pedophile ring Dreamboard.
The website had approximately 600 members, and may have distributed up to 123 terabytes of
child pornography (roughly equivalent to 16,000 DVDs). To date this is the single largest U.S.
prosecution of an international child pornography ring; 52 arrests were made worldwide.[23]
• April 23, 2013 saw the Associated Press' Twitter account's hacking to release a hoax tweet about
fictional attacks in the White House that left President Obama injured.[24] This erroneous tweet
resulted in a brief plunge of 130 points from the Dow Jones Industrial Average, removal of $136
billion from S&P 500 index,[25] and the temporary suspension of their Twitter account. The Dow
Jones later restored its session gains.
Cyber Security
“Cyber Security” is defined as
protecting information, equipment,
devices computer, computer resource,
communication device and information
stored therein from unauthorized
access, use, disclosure, disruption,
modification or destruction.
Safety tips
• Use antivirus software
• Internet firewalls
• Uninstall unnecessary software
• Maintain backup
• Check security settings
• Use good passwords
• Individual awareness
Thank you !!

Contenu connexe

Tendances

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
Alisha Korpal
 

Tendances (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

En vedette

Indian Penal Code - by Alvin Jo caleb
Indian Penal Code - by Alvin Jo calebIndian Penal Code - by Alvin Jo caleb
Indian Penal Code - by Alvin Jo caleb
Schin Dler
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 

En vedette (19)

Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Air India's details
Air India's detailsAir India's details
Air India's details
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Important sections of IPC - By Abirami.G
Important sections of IPC - By Abirami.GImportant sections of IPC - By Abirami.G
Important sections of IPC - By Abirami.G
 
Indian Penal Code
Indian Penal CodeIndian Penal Code
Indian Penal Code
 
Indigo airlines
Indigo airlinesIndigo airlines
Indigo airlines
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Indian Penal Code in India
Indian Penal Code in IndiaIndian Penal Code in India
Indian Penal Code in India
 
Indian Penal Code - by Alvin Jo caleb
Indian Penal Code - by Alvin Jo calebIndian Penal Code - by Alvin Jo caleb
Indian Penal Code - by Alvin Jo caleb
 
Ipc ppt
Ipc pptIpc ppt
Ipc ppt
 
Strategy Management at IndiGo Airlines
Strategy Management at IndiGo AirlinesStrategy Management at IndiGo Airlines
Strategy Management at IndiGo Airlines
 
General exceptions Indian Penal Code, (S. 76 to 106)
General  exceptions Indian Penal Code, (S. 76 to 106)General  exceptions Indian Penal Code, (S. 76 to 106)
General exceptions Indian Penal Code, (S. 76 to 106)
 
IndiGo Airlines
IndiGo Airlines IndiGo Airlines
IndiGo Airlines
 
IndiGo Airlines
IndiGo Airlines IndiGo Airlines
IndiGo Airlines
 
Air india
Air indiaAir india
Air india
 
The Indian Penal Code.
The Indian Penal Code.The Indian Penal Code.
The Indian Penal Code.
 
Indian Penal Code,1860
Indian Penal Code,1860Indian Penal Code,1860
Indian Penal Code,1860
 
Indian Legal System An Introduction
Indian Legal System  An IntroductionIndian Legal System  An Introduction
Indian Legal System An Introduction
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 

Similaire à Cyber crime

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
 
English in written
English in writtenEnglish in written
English in written
azhar manap
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa
 
Internet
InternetInternet
Internet
Jodip
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 

Similaire à Cyber crime (20)

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
English in written
English in writtenEnglish in written
English in written
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Internet
InternetInternet
Internet
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Final ppt
Final pptFinal ppt
Final ppt
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 

Dernier

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Dernier (20)

457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 

Cyber crime

  • 3. What is cyber crime ?? Cyber crime is a generic term that refers to all criminal activities done using the medium of computers, the Internet, cyber space and the worldwide web.
  • 4. Cyber law • Cyber law is a term used to describe the legal issues related to use of communications technology, particularly “cyberspace”, i.e. the Internet. • Cyber law is an attempt to apply laws designed for the physical world, to human activity on the Internet.
  • 5.
  • 7. • e.g. Hacking, Virus/Worm attacks, DOS attack etc. 1. The Computer as a Target :-using a computer to attack other computers. • e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc. 2. The computer as a weapon :- using a computer to commit real world crimes. We can categorize Cyber crimes in two ways
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Various types of cyber crime..
  • 14. 1. Hacking • Hacking is the unauthorized access to a computer system, programs, data and network resources.
  • 15. Law & Punishment • Under Information Technology (Amendment) Act, 2008, Section 43(a) read with section 66 is applicable and Section 379 & 406 of Indian Penal Code, 1860 also are applicable. • If crime is proved under IT Act, accused shall be punished for imprisonment, which may extend to three years or with fine, which may extend to five lacs rupees or both.
  • 16. 2. Data theft If any person without permission of the owner or any other person, who is in charge of a computer, computer system of computer network - downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium, then it is data theft.
  • 17. Law & Punishment Under Information Technology (Amendment) Act, 2008, Section 43(b) read with Section 66 is applicable and under Section 379, 405 & 420 of Indian Penal Code, 1860 also applicable.
  • 18. 3. Spreading Virus or Worms • Viruses can do any amount of damage, the creator intends them to do. • They can send your data to a third party and then delete your data from your computer. • They can also ruin/mess up your system and render it unusable without a re-installation of the operating system. • Usually the virus will install files on your system and then will change your system so that virus program is run every time you start your system. • It will then attempt to replicate itself by sending itself to other potential victims.
  • 19. Law & Punishment Under Information Technology (Amendment) Act, 2008, Section 43(c) & 43(e) read with Section 66 is applicable and under Section 268 of Indian Penal Code, 1860 also applicable.
  • 20. 4. Identity Theft Identity theft is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name.
  • 21. Law & Punishment • Under Information Technology (Amendment) Act, 2008, Section 66-C and Section 419 of Indian Penal Code, 1860 also applicable.
  • 22. 5. E-Mail Spoofing • A spoof email is one that appears to originate from one source but actually has been sent from another source. • Hackers use this method to disguise the actual email address from which phishing and spam messages are sent and often use email spoofing in conjunction with Web page spoofing to trick users into providing personal and confidential information.
  • 23. Law & Punishment • Under Information Technology (Amendment) Act, 2008, Section 66-C and Section 419 of Indian Penal Code, 1860 also applicable.
  • 24. 6. Trojan Attack • The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans. • The name Trojan Horse is popular.
  • 25. 7. E-mail related crimes 1. Email spoofing Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. Please Read 2. Email Spamming Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter. 3 Sending malicious codes through email E-mails are used to send viruses, Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code. 4. Email bombing E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address.
  • 26. 8. IPR Violations IPR stands for intellectual proprietary rights. These include software piracy, copyright infringement, trademarks violations, theft of computer source code, patent violations. etc.
  • 27. 9.Data diddling • Data diddling involves changing data prior or during input into a computer. • In other words, information is changed from the way it should be entered by a person typing in the data, a virus that changes data, the programmer of the database or application, or anyone else involved in the process of having information stored in a computer file.
  • 29.
  • 30. Cyber crime in different countries
  • 31.
  • 32. Documented cases • June 2012 LinkedIn and eHarmony had been attacked, compromising 65 million passwords, 30,000 passwords were cracked and 1.5 million EHarmony passwords were posted online.[17] • December 2012 Wells Fargo website experienced a denial of service attack. Potentially compromising 70 million customers and 8.5 million active viewers. Other banks thought to be compromised: Bank of America, J. P. Morgan U.S. Bank, and PNC Financial Services[18] • In January 2012 Zappos.com experienced a security breach after as many as 24 million customers' credit card numbers, personal information, billing and shipping addresses had been compromised.[19] On 2 March 2010, Spanish investigators arrested 3[clarification needed] in infection of over 13 million computers around the world. The "botnet" of infected computers included PCs inside more than half of the Fortune 1000 companies and more than 40 major banks, according to investigators. • In August 2010 the international investigation Operation Delego, operating under the aegis of the Department of Homeland Security, shut down the international pedophile ring Dreamboard. The website had approximately 600 members, and may have distributed up to 123 terabytes of child pornography (roughly equivalent to 16,000 DVDs). To date this is the single largest U.S. prosecution of an international child pornography ring; 52 arrests were made worldwide.[23] • April 23, 2013 saw the Associated Press' Twitter account's hacking to release a hoax tweet about fictional attacks in the White House that left President Obama injured.[24] This erroneous tweet resulted in a brief plunge of 130 points from the Dow Jones Industrial Average, removal of $136 billion from S&P 500 index,[25] and the temporary suspension of their Twitter account. The Dow Jones later restored its session gains.
  • 33. Cyber Security “Cyber Security” is defined as protecting information, equipment, devices computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction.
  • 34. Safety tips • Use antivirus software • Internet firewalls • Uninstall unnecessary software • Maintain backup • Check security settings • Use good passwords • Individual awareness