4. Cybercrime is nothing but where the computer used as an
object or subject of crime.
Cyber crime is an evil having its origin in the growing
dependence on computers in modern life. In a day and
age when everything from microwave ovens and
refrigerators to nuclear power plants is being run on
computers, cyber crime has assumed rather sinister
implications.
Crime committed using a computer and the internet to steal a
person's identity or illegal imports or malicious programs.
RAJENDRA
DANGWAL,
CYBER CRIME
GEHU(BHIMTAL)
4
5. In the early decades of modern information technology (IT),
computer crimes were largely committed by individual disgruntled
and dishonest employees.
Physical damage to computer systems was a prominent threat
until the 1980s.
Programmers in the 1980s began writing malicious software,
including self-replicating programs, to interfere with personal
computers.
As the Internet increased access to increasing numbers of
systems worldwide, criminals used unauthorized access to poorly
protected systems for vandalism, political action and financial
gain.
RAJENDRA
DANGWAL,
CYBER CRIME
GEHU(BHIMTAL)
5
6. Criminal activity involving
Information technology
infrastructure
Illegal access
Data interference
Misuse of devices
Forgery and
Electronic fraud.
RAJENDRA DANGWAL, GEHU(BHIMTAL)
CYBER CRIME
6
7. Types of Cyber Crime
Hacking - Hacking in simple terms means an illegal intrusion into a
computer system without permission of computer owner/user. Hackers
write or use ready-made computer programs to attack the target
computer.
Software Piracy - Theft of software through the illegal copying of
genuine programs or the counterfeiting
and
distribution
of
products intended to pass for the original. The unauthorized copying
of software.
RAJENDRA DANGWAL, GEHU(BHIMTAL)
CYBER CRIME
7
8. Email spoofing - A spoofed email is one that appears to originate from
one source but actually has been sent from another source.
Phishing - The e-mail directs the user to visit a Web site where they are
asked to update personal information, such as passwords and credit card,
social security, and bank account numbers, that the legitimate
organization already has .
RAJENDRA DANGWAL, GEHU(BHIMTAL)
CYBER CRIME
8
15. User awareness is key to a secure computer/network
Do not open suspicious files/emails
Avoid using P2P programs
Avoid downloading freeware
If attacked, disconnect the network. Do not turn off the
computer
So we must pay attention to all those issues and protect the
World from Cyber Crime
“If you spend more on coffee than on IT security, you
will be hacked. What’s more, you deserve to be hacked.
— White House Cybersecurity Advisor” ─ Richard
Clarke
RAJENDRA DANGWAL, GEHU(BHIMTAL)
CYBER CRIME
15