Documente Academic
Documente Profesional
Documente Cultură
Ann’s
Engineering College,
Chirala.
Cybercrime crimes
Cyber security
Cybercrime acts
Reasons for cybercrime
Cyber criminals
Mode and manner of committing cybercrime
Classification
Acts for security
Prevention of cybercrime
Conclusion
Cybercrime Crimes
Crimes may be of many
types
Criminals use internet
to steal personal
identity.
Mostly phishing and
pharming use to fake
websites.
For example they ask
user name, passwords,
credit card numbers
by creating fake
websites.
Cyber Security
ISO/IEC 27002 started in 1995 consists of
two basic parts BS7799 part 1 and
BS7799 part 2 created by BSI.
The NIST released some papers relevant to
cyber security. Three of them are
1. 800-12: Computer Security
Handbook.
2. 800-14: Generally Accepted
Principles for Security
Information Technology.
3. 800-26: Security Self Assessment
Guide for Information
Technology Systems
The first act “COMMON WEALTH
CYBERCRIME BILL 2001 was approved by
the parliament on 27 SEP 2001”.
Capacity to store data in comparatively
small space.
Easy to access
Complex
Negligence
Loss of evidence
Cyber criminals
Against
individuals
Against
organization
Against society
Cyber acts for Security
Information technology act 2000 is a welcome step
when cyber crime came into progress. The various
loop holes in the act are
1. Passing act without public debate.
2. Cyber torts.
3. It is neither comprehensive nor exhaustive.
4. Ambiguity in definitions.
5. Uniform law.
6. Lack of awareness
Prevention of cybercrime
By disclosing your identity to protect from strangers.
Avoid sending photographs.
Always use latest and update anti virus.
Never give your identities to fake websites.
Always keep backup volumes.
Use of firewalls may be beneficial.
Keep watch on the sites that children accessing to
prevent harassment in children
Conclusion