Sunteți pe pagina 1din 16

St.

Ann’s
Engineering College,
Chirala.
 Cybercrime crimes
 Cyber security
 Cybercrime acts
 Reasons for cybercrime
 Cyber criminals
 Mode and manner of committing cybercrime
 Classification
 Acts for security
 Prevention of cybercrime
 Conclusion
Cybercrime Crimes
Crimes may be of many
types
 Criminals use internet
to steal personal
identity.
 Mostly phishing and
pharming use to fake
websites.
 For example they ask
user name, passwords,
credit card numbers
by creating fake
websites.
Cyber Security
 ISO/IEC 27002 started in 1995 consists of
two basic parts BS7799 part 1 and
BS7799 part 2 created by BSI.
 The NIST released some papers relevant to
cyber security. Three of them are
1. 800-12: Computer Security
Handbook.
2. 800-14: Generally Accepted
Principles for Security
Information Technology.
3. 800-26: Security Self Assessment
Guide for Information
Technology Systems
The first act “COMMON WEALTH
CYBERCRIME BILL 2001 was approved by
the parliament on 27 SEP 2001”.
 Capacity to store data in comparatively
small space.

 Easy to access

 Complex

 Negligence

 Loss of evidence
Cyber criminals

1. Adolescents of age 6-18 years.


2. Organised hackers.
3. Professional hackers/crackers.
4. Discontented employees.
A mode and manner of committing
Cyber Crime
• By unauthorized access • Salami attacks
to computer . • Denial of service attack
• Theft of information • Virus/worm attacks
contained in electronic • Logic bombs
form.
• Trojan attacks
• Email bombing
• Internet time thefts
• Data diddling
Classification

Against
individuals

Against
organization

Against society
Cyber acts for Security
Information technology act 2000 is a welcome step
when cyber crime came into progress. The various
loop holes in the act are
1. Passing act without public debate.
2. Cyber torts.
3. It is neither comprehensive nor exhaustive.
4. Ambiguity in definitions.
5. Uniform law.
6. Lack of awareness
Prevention of cybercrime
 By disclosing your identity to protect from strangers.
 Avoid sending photographs.
 Always use latest and update anti virus.
 Never give your identities to fake websites.
 Always keep backup volumes.
 Use of firewalls may be beneficial.
 Keep watch on the sites that children accessing to
prevent harassment in children
Conclusion

Capacity of human mind is unfathomable.Elimination of


cyber crime is impossible in cyber space . A main
witness is its history . The main possible step is
creating awareness in its duties and rights. I would
like to conclude with a word of caution for the
prolegislation school that provisions of cyber law are
not made stringent that it would effect the growth
of industry .
Queries ????

S-ar putea să vă placă și