cyber crime and privacy issues by varun call for assistence 8003498888

Varun Mathur
PRESENTED BY :-
varun mathur
mba 1st
sem
Cyber crimes and privacyCyber crimes and privacy
issuesissues
AGENDA
• Introduction to cyber crime
• Modes and manner
• Categories
• How to protect
Cyber crime refers to any crime that involves
a computer and a network . The computer may
have been used in the commission of a crime, or
it may be the target .
Debarati Halder and Dr. K. Jaishankar defines
Cybercrimes as: "Offences that are committed
against individuals or groups of individuals with a
criminal motive to intentionally harm the
reputation of the victim or cause physical or
mental harm to the victim directly or indirectly,
using modern telecommunication networks such
as Internet and mobile phones .
Categorize of cyber crime
We can categorize cyber crime
in two ways.
1. The computer as a target- using a computer to attack
other computers via hacking, virus , dos attack .
2. The computer as a weapon – using a computer to commit
real world crimes . Ex- cyber terrorism , credit cards
frauds, pornography etc .
Cyber criminals:-
Children between age of 12- 19 years
Dissatisfied employees
Professional hackers & crackers
Organized hackers
Modes and manners
1. Unauthorized access to computer system
and network.
2.Theft of information stored in electronic
form
3.Hacking
4.Trojan attacks
5.Web jacking
6.e-mail bombing
Unauthorized access to computer system –
Unauthorized access to a computer system
entails approaching, trespassing within and
retrieving data or otherwise intercepting and
altering computer resources without consent. It
broadly falls into the term 'computer hacking',
because it attempts to bypass the security
mechanisms of a system.
Hacking
• Computer hacking is when someone modifies
computer hardware or software in a way that
alters the creator's original intent. People who
hack computers are known as hackers. Hackers
are usually real technology buffs who enjoy
learning all they can about computers and how
they work. Hackers think that what they do is like
an art form. They usually have expert-level skills
in one specific program. For most hackers,
hacking gives them the opportunity to use their
problem-solving skills and a chance to show off
their abilities. Most of them do not wish to harm
others.
Trojan attack
• A Trojan horse, or Trojan, is a hacking program
that is a non-self-replicating type of malware
which gains privileged access to the operating
system while appearing to perform a desirable
function but instead drops a malicious payload,
often including a backdoor allowing unauthorized
access to the target's computer.These
backdoors tend to be invisible to average users,
but may cause the computer to run slow.
Web jacking
• The web jacking attack vector is another
phishing technique that can be used in social
engineering engagements.
Attack followed in this attack are creating a fake
website and when the victim opens the link a
page will appear saying that the website has
been moved and they need to click another link.
If the victim clicks the link he will be redirected to
fake website.
E-mail bombing
• In internet usage, an email bomb is a
form of net abuse consisting of sending
huge volumes of email to an address in
an attempt to overflow the
mailbox or overwhelm the server where
the email address is hosted in a denial of
service attack .
Cyber attack can be on following
categories
• Cyber crime against person.
• Cyber crime against individual property.
• Cyber crime against government
Against person
• Harassment via e-mails
• Cyber stalking:-Stalking is a form of mental assault, in which
the perpetrator repeatedly, unwantedly, and disruptively breaks into the
life-world of the victim, with whom he has no relationship (or no longer
has), with motives that are directly or indirectly traceable to the affective
sphere. Moreover, the separated acts that make up the intrusion cannot
by themselves cause the mental abuse, but do taken together .
• E-mail spoofing:-Email spoofing is the creation
of email messages with a forged sender address - something which is
simple to do because the core protocols do
no authentiction. spam and phishing emails typically use such spoofing to
mislead the recipient about the origin of the message.
Against individual property
• Computer vandalism – it is a program that performs
malicious function such as extracting a user's password or other
data or erasing the hard disk. A vandal differs from a virus, which
attaches itself to an existing executable program. The vandal is
the full executing entity itself which can be downloaded from the
Internet in the form of an ActiveX control, Java applet, browser
plug-in or e-mail attachment.
• Transmitting virus - this means intentionally
transmission of viruses into other computer to destroy important
files and folders .
Against government
• Cyber terrorism is the use of internet based
attacks in terror activities, including acts of
deliberate, large-scale disruption of
computer networks, especially of personal
computers attached to the Internet, by the
means of tools such as viruses . Example –
attack on usa defence academy in iraq war ,
by iraqui hackers .
Types
• Child pornography
• Cyber contraband
• Cyber laundering
• Cyber stalking
• Cyber theft
India stands 10th in the cyber crime in the world
cyber privacy
Cyber privacy involves the right or mandate of
personal privacy concerning the storing, repurposing,
provision to third-parties, and displaying of information
pertaining to oneself via the internet .
How to protect ?
• Keep software up to date
• Use good passwords
• Disable remote connectivity
• Antivirus and anti spyware :- software-
antivirus software consists of computer
programme that attempt to identify thwart and
eliminate computer virus and other malicious
softwares . Anti spywares are used to restrict
backdoor programme , trojan and other
spywares to be installed on the computer .
• Firewalls :- a firewall protects a computer
network from unauthorized access. Network
firewalls may be hardware devices , software
programme , or a combination of the two .
Message
• Indian laws are well drafted and are capable
of handling all kinds of challenges as posed by
cyber criminals , however the enforcement
agencies are required to be well versed with
the changing technology and laws .
• As internet technology advances so does the
threat of cyber crime . In times like these we
must protect ourselves from cyber crime .
Antivirus software , firewalls and security
patches are just the beginning . Never open
suspicious e-mails and only navigate through
trusted sites .
Thank YouThank You
1 sur 23

Recommandé

Cyber crime Cyber crime
Cyber crime Soreingam Ragui
16.8K vues54 diapositives
Computer EthicsComputer Ethics
Computer Ethicspoonam.rwalia
49.8K vues21 diapositives
Cyber CrimeCyber Crime
Cyber CrimeAvinash Rajput
6.4K vues49 diapositives
Cyber  crimeCyber  crime
Cyber crimeSanket Gogoi
6.5K vues55 diapositives
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
3.2K vues46 diapositives
Cyber securityCyber security
Cyber securityManjushree Mashal
3.1K vues41 diapositives

Contenu connexe

Tendances

Cyber crime Cyber crime
Cyber crime Jayant Raj
2.8K vues40 diapositives
Cyber crimeCyber crime
Cyber crimeHarendra Singh
2K vues17 diapositives
Cyber securityCyber security
Cyber securityHarsh verma
13.6K vues11 diapositives

Tendances(20)

Cyber crime Cyber crime
Cyber crime
Jayant Raj2.8K vues
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas47.8K vues
Cyber crimeCyber crime
Cyber crime
Harendra Singh2K vues
Cyber securityCyber security
Cyber security
Harsh verma13.6K vues
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
Dr Raghu Khimani14.7K vues
Computer crimeComputer crime
Computer crime
Uc Man1.3K vues
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
patelripal9911.5K vues
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid9K vues
Cyber securityCyber security
Cyber security
vishakha bhagwat4.5K vues
cyber securitycyber security
cyber security
BasineniUdaykumar3.2K vues
Cyber CrimeCyber Crime
Cyber Crime
Priyankush salouria582 vues
Cyber crimeCyber crime
Cyber crime
Md. Atiqur Rahman3K vues
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos15.2K vues
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire22.4K vues
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram1.7K vues
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur1.3K vues

En vedette

Cyber crime pptCyber crime ppt
Cyber crime pptGracy Joseph
5.6K vues28 diapositives
Cyber  LawCyber  Law
Cyber Lawfariez91
33.2K vues12 diapositives

En vedette(8)

Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
FCA - Future Chartered Accountants5.3K vues
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi3.6K vues
Cyber crime pptCyber crime ppt
Cyber crime ppt
Gracy Joseph5.6K vues
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani5.9K vues
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
Poonam Bhasin135.6K vues
Cyber  LawCyber  Law
Cyber Law
fariez9133.2K vues
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi216.8K vues
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera602.4K vues

Similaire à cyber crime and privacy issues by varun call for assistence 8003498888

Cyber CrimeCyber Crime
Cyber CrimeDivyank Jindal
733 vues16 diapositives
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
28.9K vues11 diapositives
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
4.9K vues17 diapositives

Similaire à cyber crime and privacy issues by varun call for assistence 8003498888(20)

Cyber CrimeCyber Crime
Cyber Crime
Divyank Jindal733 vues
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar28.9K vues
CYBERCRIME-WPS Office.pptxCYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptx
IrfanaRahim220 vues
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla4.9K vues
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
Roshan Kumar Bhattarai990 vues
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj846 vues
Cyber SpaceCyber Space
Cyber Space
Kashif Latif12.1K vues
Cyber securityCyber security
Cyber security
SaurabhKaushik5798 vues
Cyber crimeCyber crime
Cyber crime
Muhammad Osama Khalid2K vues
CYBER.pptxCYBER.pptx
CYBER.pptx
ssuser8b4eb218 vues
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace11.1K vues
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
Elsayed Muhammad257 vues
Cyber crimesCyber crimes
Cyber crimes
karanjohar625 vues
Cyber crimeCyber crime
Cyber crime
Muhammad Zeeshan Muzaffar1.7K vues
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
Ashish prashar350 vues
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel42.2K vues
Cyber terrorismCyber terrorism
Cyber terrorism
Hiren Selani899 vues

cyber crime and privacy issues by varun call for assistence 8003498888

  • 1. PRESENTED BY :- varun mathur mba 1st sem
  • 2. Cyber crimes and privacyCyber crimes and privacy issuesissues
  • 3. AGENDA • Introduction to cyber crime • Modes and manner • Categories • How to protect
  • 4. Cyber crime refers to any crime that involves a computer and a network . The computer may have been used in the commission of a crime, or it may be the target . Debarati Halder and Dr. K. Jaishankar defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet and mobile phones .
  • 5. Categorize of cyber crime We can categorize cyber crime in two ways. 1. The computer as a target- using a computer to attack other computers via hacking, virus , dos attack . 2. The computer as a weapon – using a computer to commit real world crimes . Ex- cyber terrorism , credit cards frauds, pornography etc .
  • 6. Cyber criminals:- Children between age of 12- 19 years Dissatisfied employees Professional hackers & crackers Organized hackers
  • 7. Modes and manners 1. Unauthorized access to computer system and network. 2.Theft of information stored in electronic form 3.Hacking 4.Trojan attacks 5.Web jacking 6.e-mail bombing
  • 8. Unauthorized access to computer system – Unauthorized access to a computer system entails approaching, trespassing within and retrieving data or otherwise intercepting and altering computer resources without consent. It broadly falls into the term 'computer hacking', because it attempts to bypass the security mechanisms of a system.
  • 9. Hacking • Computer hacking is when someone modifies computer hardware or software in a way that alters the creator's original intent. People who hack computers are known as hackers. Hackers are usually real technology buffs who enjoy learning all they can about computers and how they work. Hackers think that what they do is like an art form. They usually have expert-level skills in one specific program. For most hackers, hacking gives them the opportunity to use their problem-solving skills and a chance to show off their abilities. Most of them do not wish to harm others.
  • 10. Trojan attack • A Trojan horse, or Trojan, is a hacking program that is a non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the target's computer.These backdoors tend to be invisible to average users, but may cause the computer to run slow.
  • 11. Web jacking • The web jacking attack vector is another phishing technique that can be used in social engineering engagements. Attack followed in this attack are creating a fake website and when the victim opens the link a page will appear saying that the website has been moved and they need to click another link. If the victim clicks the link he will be redirected to fake website.
  • 12. E-mail bombing • In internet usage, an email bomb is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial of service attack .
  • 13. Cyber attack can be on following categories • Cyber crime against person. • Cyber crime against individual property. • Cyber crime against government
  • 14. Against person • Harassment via e-mails • Cyber stalking:-Stalking is a form of mental assault, in which the perpetrator repeatedly, unwantedly, and disruptively breaks into the life-world of the victim, with whom he has no relationship (or no longer has), with motives that are directly or indirectly traceable to the affective sphere. Moreover, the separated acts that make up the intrusion cannot by themselves cause the mental abuse, but do taken together . • E-mail spoofing:-Email spoofing is the creation of email messages with a forged sender address - something which is simple to do because the core protocols do no authentiction. spam and phishing emails typically use such spoofing to mislead the recipient about the origin of the message.
  • 15. Against individual property • Computer vandalism – it is a program that performs malicious function such as extracting a user's password or other data or erasing the hard disk. A vandal differs from a virus, which attaches itself to an existing executable program. The vandal is the full executing entity itself which can be downloaded from the Internet in the form of an ActiveX control, Java applet, browser plug-in or e-mail attachment. • Transmitting virus - this means intentionally transmission of viruses into other computer to destroy important files and folders .
  • 16. Against government • Cyber terrorism is the use of internet based attacks in terror activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as viruses . Example – attack on usa defence academy in iraq war , by iraqui hackers .
  • 17. Types • Child pornography • Cyber contraband • Cyber laundering • Cyber stalking • Cyber theft
  • 18. India stands 10th in the cyber crime in the world
  • 19. cyber privacy Cyber privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third-parties, and displaying of information pertaining to oneself via the internet .
  • 20. How to protect ? • Keep software up to date • Use good passwords • Disable remote connectivity
  • 21. • Antivirus and anti spyware :- software- antivirus software consists of computer programme that attempt to identify thwart and eliminate computer virus and other malicious softwares . Anti spywares are used to restrict backdoor programme , trojan and other spywares to be installed on the computer . • Firewalls :- a firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices , software programme , or a combination of the two .
  • 22. Message • Indian laws are well drafted and are capable of handling all kinds of challenges as posed by cyber criminals , however the enforcement agencies are required to be well versed with the changing technology and laws . • As internet technology advances so does the threat of cyber crime . In times like these we must protect ourselves from cyber crime . Antivirus software , firewalls and security patches are just the beginning . Never open suspicious e-mails and only navigate through trusted sites .