SlideShare une entreprise Scribd logo
1  sur  16
 The first recorded cyber crime took place in 1820.
 That is not surprising considering the fact that the
abacus, which is thought to be the earliest from of a
computer, has been around since 3500 B.c.
 In India, Japan and China, the era of modern
computer, however, began with the analytical
engine of Charles Babbage.
 The first spam email took place in 1976 when it was
sent out over the ARPANT.
 The first virus was installed on an Apple computer in
1982 when a high school student, Rich skrenta,
developed the EIK Cloner.
What is Cyber Crime????
 We often hear the term ‘cybercrime’ bandied about these days, as
it's a bigger risk now than ever before due to the sheer number of
connected people and devices. But what is it exactly?
 In a nutshell, it is simply a crime that has some kind of computer or
cyber (computer/computer networks from word cybernetics) aspect
to it. To go into more detail is not as straightforward, as it takes shape
in a variety of different formats. Cyber crime encompasses any
criminal act dealing with computers and networks. Additionally, cyber
crime also includes traditional crimes conducted through the Internet.
 According to Interpol, Cybercrime is one of the fastest growing areas
of crime. More and more criminals are exploiting the speed,
convenience and anonymity that modern technologies offer in order
to commit a diverse range of criminal activities.
Cyber Crime Variants
 Hacking
 "Hacking" is a crime, which entails cracking systems and gaining
unauthorized access to the data stored in them. Hacking had
witnessed a 37 percent increase this year.
 Hacker
 Hacker (programmer subculture), who combines excellence,
playfulness, cleverness and exploration in performed activities.
 Kevin David Mitnick is first hacker.
We can categorize cyber crime in two
ways.
 The computer as a target :- using a
computer to attacks other computer,
e.g. Hacking, virus/worms attacks, Dos
attack etc.
 The computer as a weapon :- using a
computer to commit real world crime
e.g. cyber terrorism, credit card fraud
and pornography etc.
 HACKING :- Hacking in simple terms means an
illegal intrusion info a computer system and/or
network . It is also known as CRACKING.
Government websites are the hot target of the
hackers due to the press coverage, it receives.
Hackers enjoy the media coverage.
Motive behind the crime called HACKERS
Motive behind the crime called hacking greed
power, publicity, revenge, adventure desire to
access forbidden information destructive
mindset wants to sell n/w security services.
 CHILD PORNOGRAPHY : The Internet is being
highly used by its abusers to reach and abuse
children sexually, worldwide. As more homes
have access to internet, more children would
be using the internet and more are the
chances of falling victim to the aggression of
Pedophiles.
How Do They Operate :
How do they operate Pedophiles use false
identity to trap the children , Pedophiles
connect children in various chat rooms which
are used by children to interact with other
children.
 DENIAL OF SERVICE ATTACKS : This is an act by the
criminals who floods the bandwidth of the victims
network or fills his E-mail box with spam mail
depriving him of the service he is entitled to
access or provide. Many DOS attacks, such as the
ping of death and Tear drop attacks.
 VIRUS DISSMINITION : Malicious software that
attaches itself to other software. VIRUS , WORMS,
TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING
etc.
 COMPUTER VANDALISM : Damaging or destroying
data rather than stealing or misusing them is
called cyber vandalism. These are program that
attach themselves to a file and then circulate.
 CYBER TERRORISM : Terrorist attacks on
the Internet is by distributed denial of
service attacks, hate websites and hate
E-mails , attacks on service network etc.
 SOFTWARE PIRACY : Theft of software
through the illegal copying of genuine
programs or the counterfeiting and
distribution of products intended to pass
for the original.
CYBER CRIMES THREATENS
NATIONAL SECURITY
CYBER CRIMES THREATENS NATIONAL SECURITY
IN INDIA Likewise Union home minister Shivraj Patil
said that the rising level of cyber crime is an
indication of enormous threat to national security. On
Google’s social networking site orkut, facebook, have
been perplexing authorities . Fan clubs of Underworld
Dons like Dawood Ibrahim and Chhota Shakeel and
other wanted underworld dons are also doing the
rounds on orkut. There is huge potential for damage
to national security through cyber attacks. The
internet is a means for money bounding and funding
terrorist attacks in an organized manner.
How it Works ??? ?
 The cyber security will defend us from
critical attacks.
 It helps us to browse the site, website.
 Internet Security process all the incoming
and outgoing data on your computer.
 It will defend us from hacks and virus.
 Application of cyber security used in our
PC needs update every week
 Use antivirus Software
 Insert Firewalls
 Uninstall unnecessary software
 Maintain backup
 Check security settings
Cyber crime can involve criminal activities
that are traditional in nature, such as theft,
fraud, deformation and mischief, all of
which are subjected to the India Penal
code. In simple way we can say that cyber
crime is unlawful acts where in the
computer is either a tool or both.
The abuse of computer has also given birth
of new age crime that are addressed by
the Information Technology Act, 2000.
Cybercrime is indeed getting the
recognition it deserves. However, it is not
going to restricted that easily . In fact , it
is highly likely that cyber crime and its
hackers will continue developing and
upgrading to stay ahead of the law.
So, to make us a safer we must need
cyber security.
First Recorded Cyber Crime 1820

Contenu connexe

Tendances

Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthDababrata Mondal
 
Email crime ppt
Email crime pptEmail crime ppt
Email crime pptOnkar1431
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Class on cyber crime
Class on cyber crimeClass on cyber crime
Class on cyber crimeJayakumar PP
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 

Tendances (20)

Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
 
Email crime ppt
Email crime pptEmail crime ppt
Email crime ppt
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Class on cyber crime
Class on cyber crimeClass on cyber crime
Class on cyber crime
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

En vedette (12)

Coal petroleum
Coal petroleumCoal petroleum
Coal petroleum
 
hans joerg.schaeper
hans joerg.schaeperhans joerg.schaeper
hans joerg.schaeper
 
Data : Hoe ga je er mee aan de slag ?
Data : Hoe ga je er mee aan de slag ?Data : Hoe ga je er mee aan de slag ?
Data : Hoe ga je er mee aan de slag ?
 
GLOSARIO
GLOSARIOGLOSARIO
GLOSARIO
 
Cells
CellsCells
Cells
 
Gallery 1 tute prep 9
Gallery 1 tute prep 9Gallery 1 tute prep 9
Gallery 1 tute prep 9
 
What can we do? against inefficient budget execution
What can we do?  against inefficient budget executionWhat can we do?  against inefficient budget execution
What can we do? against inefficient budget execution
 
Gallery 2 tute prep 9
Gallery 2 tute prep 9Gallery 2 tute prep 9
Gallery 2 tute prep 9
 
Preso09 10-2014
Preso09 10-2014Preso09 10-2014
Preso09 10-2014
 
Short & sweet story (Ice Cream Moral Story)
Short & sweet story (Ice Cream Moral Story)Short & sweet story (Ice Cream Moral Story)
Short & sweet story (Ice Cream Moral Story)
 
Effects of computer games
Effects of computer gamesEffects of computer games
Effects of computer games
 
GLOSARIO
GLOSARIO GLOSARIO
GLOSARIO
 

Similaire à First Recorded Cyber Crime 1820

cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfKira Dess
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Ambrish Mishra
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02raja jawahar
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and historygururaj lulkarni
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 

Similaire à First Recorded Cyber Crime 1820 (20)

cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
English in written
English in writtenEnglish in written
English in written
 

Dernier

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Dernier (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

First Recorded Cyber Crime 1820

  • 1.
  • 2.  The first recorded cyber crime took place in 1820.  That is not surprising considering the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c.  In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage.  The first spam email took place in 1976 when it was sent out over the ARPANT.  The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 3. What is Cyber Crime????  We often hear the term ‘cybercrime’ bandied about these days, as it's a bigger risk now than ever before due to the sheer number of connected people and devices. But what is it exactly?  In a nutshell, it is simply a crime that has some kind of computer or cyber (computer/computer networks from word cybernetics) aspect to it. To go into more detail is not as straightforward, as it takes shape in a variety of different formats. Cyber crime encompasses any criminal act dealing with computers and networks. Additionally, cyber crime also includes traditional crimes conducted through the Internet.  According to Interpol, Cybercrime is one of the fastest growing areas of crime. More and more criminals are exploiting the speed, convenience and anonymity that modern technologies offer in order to commit a diverse range of criminal activities.
  • 4. Cyber Crime Variants  Hacking  "Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 percent increase this year.  Hacker  Hacker (programmer subculture), who combines excellence, playfulness, cleverness and exploration in performed activities.  Kevin David Mitnick is first hacker.
  • 5. We can categorize cyber crime in two ways.  The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc.  The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
  • 6.  HACKING :- Hacking in simple terms means an illegal intrusion info a computer system and/or network . It is also known as CRACKING. Government websites are the hot target of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motive behind the crime called HACKERS Motive behind the crime called hacking greed power, publicity, revenge, adventure desire to access forbidden information destructive mindset wants to sell n/w security services.
  • 7.  CHILD PORNOGRAPHY : The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of Pedophiles. How Do They Operate : How do they operate Pedophiles use false identity to trap the children , Pedophiles connect children in various chat rooms which are used by children to interact with other children.
  • 8.  DENIAL OF SERVICE ATTACKS : This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many DOS attacks, such as the ping of death and Tear drop attacks.  VIRUS DISSMINITION : Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING etc.  COMPUTER VANDALISM : Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.
  • 9.  CYBER TERRORISM : Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails , attacks on service network etc.  SOFTWARE PIRACY : Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 10. CYBER CRIMES THREATENS NATIONAL SECURITY CYBER CRIMES THREATENS NATIONAL SECURITY IN INDIA Likewise Union home minister Shivraj Patil said that the rising level of cyber crime is an indication of enormous threat to national security. On Google’s social networking site orkut, facebook, have been perplexing authorities . Fan clubs of Underworld Dons like Dawood Ibrahim and Chhota Shakeel and other wanted underworld dons are also doing the rounds on orkut. There is huge potential for damage to national security through cyber attacks. The internet is a means for money bounding and funding terrorist attacks in an organized manner.
  • 11. How it Works ??? ?
  • 12.  The cyber security will defend us from critical attacks.  It helps us to browse the site, website.  Internet Security process all the incoming and outgoing data on your computer.  It will defend us from hacks and virus.  Application of cyber security used in our PC needs update every week
  • 13.  Use antivirus Software  Insert Firewalls  Uninstall unnecessary software  Maintain backup  Check security settings
  • 14. Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code. In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both. The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act, 2000.
  • 15. Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily . In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security.