Documente Academic
Documente Profesional
Documente Cultură
On
Cyber Crime
1. INTRODUCTION
2. WHAT IS CYBER CRIME
2.1 REASONS FOR CYBER CRIME
2.2 WHO ARE CYBER CRIMINALS
2.3 CATEGORIES OF CYBER CRIME
2.4 VARIOUS CATEGORIES OF CYBER CRIME
3. TYPES OF CYBER CRIMES
4. PRECAUTIONS TO PREVENT CYBER CRIME
5. ADVANTAGES AND DISADVANTAGES
6. CONCLUSION
7. REFERENCES
Introduction
• Today an increasing number of companies are connecting to the Internet to
support sales activities or to provide their employees and customers with
faster information and services.
• The virtual world has taken over the real one, E-business and E-commerce,
which are the new mantras and electronic transactions and dominate the
overall business paradigm. In this rapidly evolving e-world that depends on
free flowing information, security is the major problem to be considered.
History
• It is difficult to determine when the first crime involving a computer actually took
place. The computer has been around in some form since the abacus, which is
known to exist in 3500BC in Japan, China, and India.
• In 1801, profit motives encouraged Joseph Jacquard, a textile manufacturer in
France, to design the forerunner of the computer card. This device allowed the
repetition of services of stamps in the weaving of special fabrics.
• However Jacquard’s employees were committed to discourage further use of new
technology.
• The first recorded cyber crime took place in the year 1820.
History
• In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced
the loom. This device allowed the repetition of a series of steps in the weaving
of special fabrics.
• This resulted in a fear amongst Jacquard‘s employees that their traditional
employment and livelihood were being threatened.
• They committed acts of sabotage to discourage Jacquard from further use of
the new technology. This is the first recorded cyber crime.
What is Cybercrime
"Offences that are committed against individuals or groups of individuals with a
criminal motive to intentionally harm the reputation of the victim or cause physical
or mental harm, or loss, to the victim directly or indirectly, using modern
telecommunication networks such as Internet (networks including chat rooms,
emails, notice boards and groups) and mobile phones (SMS/MMS)"
Categories Cyber crimes
• Cyber crimes can be basically divided into 3 major
categories:
• Never send your credit card number to any site which is not secured.
• Use of firewall
Disadvantages:
• Improved hacker speed and ability.
• Interconnected computers.
• Improved viruses, malware and worms.
• Increase in “cyber warfare” possibly.
• More anonymity between hackers
Conclusion
The issue of network and Internet security has become increasingly more
important as more and more business and people go on-line. To avoid the
information from hackers we use the passwords secretly and we change
the passwords regularly. We cannot use our names, initials as passwords
that are easily traced. We should not download any executable files from
unknown sources, information from any sources without checking for
virus. We have to use licensed anti-virus software. Also teams like CERT
and FIRST assist in solving hacker attacks and to disseminate information
on security.
Reference
1.Gordon, Sarah (July 25, 2006). "On the definition and classification of
cybercrime" (PDF). Retrieved January 14, 2018.