6. 1.AGAINST
PERSON
Includes various harassment of anyone with
the use of a computer such as e-mail.
E.g.:- The Melissa virus first appeared on the internet in
March of 1999. It spread rapidly throughout computer systems
in the United States and Europe. It is estimated that the virus
caused 80 million dollars in damages to computers worldwide.
7. AGAINST
PERSON
contd..
oCyber harassment is a distinct Cybercrime.
oHarassment can be sexual, racial, religious, or other.
Persons perpetuating such harassment are also guilty of
cybercrimes.
oCyber harassment as a crime also brings us to another
related area of violation of privacy of citizens.
oNo one likes any other person invading the invaluable and
extremely touchy area of his or her own privacy which the
medium of internet grants to the citizen.
8. 2.AGAINST
PROPERTY
Include computer vandalism (destruction of
others' property), transmission of harmful
programmes.
E.g. : A Mumbai-based upstart engineering
company lost a say and much money in the
business when the rival company, an
industry major, stole the technical database
from their computers with the help of a
corporate cyber spy.
9. 3.AGAINST
GOVERNMENT
An individual "cracks" into a government or
military maintained website or systems.
This crime manifests itself into terrorism .
E.g. Group like
LUZSEC
Anonymous
10. Why learn
about CYBER
CRIME ?
Everybody is using COMPUTERS.
New generation is growing up with computers
Terrorist targeted the teenagers.
Conventional crimes like Forgery,, extortion,,
kidnapping are being committed with the help of
computers.
MOST IMPORTANT - Monetary transactions are
moving on to the INTERNET
11. IN SHORT
Cyber CRIME is any crime
where Computer is a target.
Computer is a tool of crime
Computer is incidental to
crime
13. Hacker and
Cracker
A Hacker is a person who just wants to know the
inner workings of computer systems, helping to
improve them if they detect flaws in their security.
A Cracker is a person with high skills in computer
systems (the same way that hackers), these skills are
regularly used for personal benefit or for harm.
14. HACKING
Illegal intrusion into a computer system without
the permission of the computer owner/user.
Types
1. Ethical hacking &
2. Non- ethical hacking
16. SOFTWARE
PRIVACY
Theft of software through the illegal copying of
genuine programs or the counterfeiting and
distribution of products intended to pass for the
original.
Retail revenue losses worldwide are ever increasing
due to this crime Can be done in various ways
E.g.:-End user copying, Hard disk loading, Counterfeiting,
Illegal downloads from the internet etc.
17. INTERNET
RELAY CHAT
Internet Relay Chat (IRC) servers have chat rooms
in which people from anywhere the world can come
together and chat with each other.
Criminals use it for meeting co-conspirators.
Hackers use it for discussing their exploits / sharing
the techniques.
18. DDOS ATTACK
malicious action typically taken against a
computer system such as a server or webpage
host.
Server Flooding is achieved by causing a server
to attempt to respond to an excessive number of
users simultaneously
Server crashing is typically achieved through a
malicious piece of software that uses a flaw or
weakness in the server programming to cause the
server to crash and be inaccessible until restarted.
19. Email Bombing
Form of denial of service attack that floods an
inbox and mail server with messages.
This type of attack can be a nuisance on a low
level, but it can also become a serious problem.
There are a variety of techniques that can be used
to address email bombing. Maintaining
-multiple email addresses for different activities can help.
21. CYBER
DEFAMATION
The Criminal sends emails containing defamatory
matters to all concerned off the victim or post the
defamatory matters on a website..
E.g.:-(disgruntled employee may do this against
boss,, ex-boys friend against girl,, divorced husband
against wife etc.)
22. PHISHING
It is technique of pulling out
confidential information from the
bank/financial institutional account
holders by deceptive means.
23. PHISHING
It is technique of pulling out confidential information
from the bank/financial institutional account holders by
deceptive means.
24. PHISHING
It is technique of pulling out confidential information
from the bank/financial institutional account holders by
deceptive means.
25. How to be secure
then .???
1. Enabled the “Always use HTTPS” setting for Facebook,
Twitter, Outlook, Gmail, Google and all the other online services.
2. Offers via an unknown person or offers that are too good to be
true should be suspect.
3. Don’t click the links in emails. Always go to the source or
manually type in the address in your web browser.
4. Don’t use a debit card online. If your debit card is
compromised that’s money out of your bank account. Credit
cards provide more protection and less liability.
26. How to be secure
then .???
5. Secure your PC. Update your critical security patches and anti-
virus and only shop from a secured Internet connection.
6. Change your password often and use combination of
Uppercase, Lowercase, Special characters and characters as
password.
28. Do take advantage of privacy settings and encourage
your friends to do the same
Do ask questions before clicking a link.
Do accept friend requests with caution.D
Don’t include too much identifying information.
Don’t automatically trust everyone.
Facebook Security
29. Stay Updated
Secure Web Hosts
Moderate the comment
Backups
Twitter Security
30. Never share personal information
Don’t be too specific
Link your twitter account
Don’t spit excessive personal
information, this is about as
dangerous on any other social
network. if necessary.
Twitter Security
Don’t tweet about moving servers,
changing passwords or any other
type of situation where your
security could be compromised
more easily.
Review applications that use your
twitter account with other
networking sites like Facebook
only
33. Security Tips |
Smartphone Users
Install anti-virus software, and keep it updated.
Use a PIN code or pattern lock on your phone.
Turn off geo-tagging, or turn off photo auto-uploads.
Avoid location "check-ins.“
Don't store passwords on the phone.
Enable remote 'wiping' of data.
Encrypt public Wi-Fi transmissions.
34. Our Expectation Now
Onwards
Conscious about Electronic Transaction act 2064
Don't edit images in unwanted manner and also do not like,
share ,tag and post such edited images in any Social
Networking sites.
Do not keep multi accounts of same sites | delete if you
already have.
Use privacy setting to avoid cyber theft.
Hide your Geographical Location as far as practicable.