Top Banner
1 RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME
16
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber crime

RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME

1

Page 2: Cyber crime

RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME

2

Presented by :

RAJENDRA DANGWALB.TECH- IT

Page 3: Cyber crime

RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME

3

TABLE OF CONTENTS

INTRODUCTION

HISTROY

CYBER CRIME TYPES CLASSIFICATION

PREVENTION CONCLUSION

Page 4: Cyber crime

RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 4

INTRODUCTION Cybercrime is nothing but where the computer used as an object or subject of crime.

Cyber crime is an evil having its origin in the growingdependence on computers in modern life. In a day and age when everything from microwave ovens andrefrigerators to nuclear power plants is being run on computers, cyber crime has assumed rather sinister implications.

Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs.

Page 5: Cyber crime

RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 5

In the early decades of modern information technology (IT), computer crimes were largely committed by individual disgruntled and dishonest employees. Physical damage to computer systems was a prominent threat until the 1980s.

Programmers in the 1980s began writing malicious software, including self-replicating programs, to interfere with personal computers. As the Internet increased access to increasing numbers of systems worldwide, criminals used unauthorized access to poorly protected systems for vandalism, political action and financial gain.

HISTROY

Page 6: Cyber crime

RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 6

WHAT IS CYBER CRIME

Criminal activity involving

Information technology infrastructure Illegal access Data interference Misuse of devices Forgery and Electronic fraud.

Page 7: Cyber crime

RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME

7

Types of Cyber Crime

Hacking - Hacking in simple terms means an illegal intrusion into a computer system without permission of computer owner/user. Hackers write or use ready-made computer programs to attack the target computer. Software Piracy - Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. The unauthorized copying of software.

Page 8: Cyber crime

RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME

8

Email spoofing - A spoofed email is one that appears to originate from one source but actually has been sent from another source.

Phishing - The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has .

Page 9: Cyber crime

RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME

9

CLASSIFICATION

Against Individuals

Against Organization

Against Society

Page 10: Cyber crime

RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 10

AGAINST INDIVIDUAL

Harassment via e-mails

Defamation. Unauthorized control/access over computer system

Email spoofing

Cheating & Fraud

Phishing

Page 11: Cyber crime

RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 11

Unauthorized control/access over computer system.

Possession of unauthorized information.

Cyber terrorism against the government organization.

Distribution of pirated software etc.

AGAINST ORGANIZATION

Page 12: Cyber crime

RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME

12

AGAINST SOCIETY

Polluting the youth through indecent exposure. Trafficking Financial crimes Sale of illegal articles Online gambling Forgery

Page 13: Cyber crime

RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME

13

Page 14: Cyber crime

RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME

14

PREVENTION OF CYBER CRIME

Anti-virus software .

Frequent password changing.

Firewalls.

Safe surfing.

Frequent virus checks.

Email filters.

Page 15: Cyber crime

RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME

15

User awareness is key to a secure computer/network Do not open suspicious files/emails Avoid using P2P programs Avoid downloading freeware If attacked, disconnect the network. Do not turn off the

computer

So we must pay attention to all those issues and protect the World from Cyber Crime “If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked. — White House Cybersecurity Advisor” ─ Richard Clarke

CONCLUSION

Page 16: Cyber crime

RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME

16