Documente Academic
Documente Profesional
Documente Cultură
CYBER CRIME
SUBMITTED TO- MR. BRIJESH YADAV SUBMITTED BY BHEEM RAO ROLL NO- 10 SECTION-B1 BRANCH -IT
PRESENTATION OVERVIEW
WHAT IS CYBER CRIME..??! TYPES OF CYBER CRIMES.. OCCURRENCE.. WHY LEARN ABOUT CYBER CRIME.. CYBER CRIMINALS.. MEASURES TO BE TAKEN..
NET EXTORTION
CYBER DEFAMATION
1..HACKING
Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
2..VIRUS DISSEMINATION
MALICIOUS SOFTWARE THAT ATTACHES ITSELF TO OTHER SOFTWARE.. (VIRUS,, WORMS,, TROJAN HORSE,, TIME BOMB, LOGIC BOMB, RABBIT AND BACTERIUM ARE THE MALICIOUS SOFTWARES )
victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.
This involves flooding computer resources with more requests than
3..SOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original..
If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
5..NET EXTORTION
Copying the companys confidential data in order to extort said company for huge amount..
6..CYBER DEFAMATION THE CRIMINAL SENDS EMAILS CONTAINING DEFAMATORY MATTERS TO ALL CONCERNED OFF THE VICTIM OR POST THE DEFAMATORY MATTERS ON A WEBSITE..
Pornography
Pornography is the first consistently successful e-commerce
product.
Pornography has deceptive marketing tactics and mouse trapping
lascivious or appeals to the prurient interest is an offence under the provisions of section 67 of I.T. Act -2000.
IRC crimes
Internet Relay Chat (IRC) servers have chat rooms in which
people from anywhere the world can come together and chat with each other Criminals use it for meeting coconspirators.
Hackers use it for discussing their exploits / sharing the
committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction.
If electronic transactions are not secured the credit card numbers
Phishing
In computing, phishing is the criminally fraudulent process of
attempting to acquire sensitive information such as usernames, password and credit card details, by masquerading as a trustworthy entity in an electronic communication.
Spoofing
The process of deception by which an individual or system alters its
of another computer, usually one with special access privileges, so as to obtain access to the other computers on the network.
Forgery
Counterfeit currency notes, postage and revenue stamps,
mark sheets etc., can be forged using sophisticated computers, printers and scanners.
Because Everybody is using COMPUTERS.. From white collar criminals to terrorist organizations And from Teenagers to Adults Conventional crimes like Forgery,, extortion,, kidnappiing etc.. are being committed with the help off computers New generation is growing up with computers MOST IMPORTANT - Monetary transactions are moving on to the IINTERNET
CYBER CRIMINALS:
Children and adolescents between the age
group of 18 years Business Rival.. Political Hacktivist.. Professional Hackers.. Disgruntled employees..
MEASURES TO BE TAKEN...
Use anti-virus software and
up to date with critical security updates and patches from unknown sources
Dont use words found in a dictionary. Remember that password cracking tools exist
CONTINUE
Don't share access to your computers
with strangers
not in use
basis
Make sure your employees and family members know this info too!
CONCLUSION...
Cyberspace has emerged as a national-level
concern through several events .. Therefore, this needs to be given equal concern as the other major crimes. we need to be aware and alert during our interaction with the computer.al recent events
BIBLIOGRAPHY.!!
http://www.ifccfbi.gov - operation web
THANK YOU!!