Top Banner
CYBER CRIME
21
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber crime

CYBER CRIME

Page 2: Cyber crime

Introduction History of Cyber Crime Categories of Cyber Crime Weapons of Cyber Crime Cyber Crimes in India Prevention

Page 3: Cyber crime

INTRODUCTION

Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs.

Computer is used as either a tool or a target or both.

Page 4: Cyber crime

HISTORY OF CYBER CRIME

The first recorded cyber crime took place in the year 1820!

The first spam email took place in 1978 when it was sent out over the Arpanet (Advanced Research Projects Agency Network).

The first virus was installed on an Apple computer in 1982.

Page 5: Cyber crime

CATEGORIES OF CYBER CRIME

Cyber crimes against persons Cyber crimes against property Cyber crimes against government

Page 6: Cyber crime

Cyber Crime against Persons

Harassment via E-mails Hacking Email / SMS Spoofing Carding Assault by Threats

Page 7: Cyber crime

Cyber Crime against Property

Intellectual Property Crimes Cyber Squatting Cyber Vandalism Transmitting Virus Internet Time Thefts

Page 8: Cyber crime

Cyber Crime against Government

Cyber Terrorism Military websites Govt. websites

Page 9: Cyber crime

WEAPONS OF CYBER CRIME Hacking Data Diddling Denial of Service Attack Email Bombing Phishing Tabnapping Cyber Stalking Cyber Terrorism Virus/Worms/Trojan Attacks

Page 10: Cyber crime

Hacking

Unauthorized access to any computer systems or networks. Accessing the information of others without proper authorization.

Page 11: Cyber crime

Data Diddling

Illegal or unauthorized data alteration. Changing of data before or during entry into

the computer system for fun and profit.

Page 12: Cyber crime

Denial of Service Attack

Flooding a computer resource with more requests than it can handle which cause it to crash.

Page 13: Cyber crime

Email Bombing

Sending large number of mails to the victim, which may be an individual or a company by ultimately resulting into crashing.

Page 14: Cyber crime

Phishing

Attempt to acquire sensitive information such as usernames, passwords and credit card details.

Typically carried out by Email Spoofing.

Page 15: Cyber crime

Tabnapping

Page 16: Cyber crime

Cyber Stalking

Use of the internet or other electronic means to

stalk someone. Known as online harassment or abuse.

Page 17: Cyber crime

Cyber Terrorism

Use of the internet or other electronic means for doing terrorist activities.

Page 18: Cyber crime

Virus/ Worms/ Trojan Attacks

Viruses are programs that attach themselves to a computer or a file.

Worms make functional copies of themselves repeatedly.

Trojan Horses cause serious damage by deleting files and destroying information.

Page 19: Cyber crime

CYBER CRIMES IN INDIA

India is the third-most targeted country for

phishing attacks after the US and the UK. 3 lakh cyber crime cases are registered in

2015.

Page 20: Cyber crime

PREVENTION Disable and log off a specific user account to

prevent access. Use antivirus software and firewalls –keep them

up to date. Keep your operating systems up to date with

critical security updates and patches. Read Privacy policy carefully when you submit

the data through internet. Don’t open emails or attachments from unknown

sources. Disable Remote Connectivity.

Page 21: Cyber crime