Cyber crime in WORLD
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Cyber crime in WORLD

on

  • 1,062 views

info about all types of crime and how to prevent it

info about all types of crime and how to prevent it

Statistics

Views

Total Views
1,062
Views on SlideShare
1,062
Embed Views
0

Actions

Likes
0
Downloads
92
Comments
1

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • love it
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Cyber crime in WORLD Presentation Transcript

  • 1. CYBER CRIMECYBER CRIME
  • 2. WHAT IS CYBER CRIMEWHAT IS CYBER CRIMECOMPUTER CRIMECOMPUTER CRIMErefers to any crimerefers to any crimethat involves athat involves acomputer and acomputer and anetwork where thenetwork where thecomputers may or maycomputers may or maynot have played annot have played aninstrumental part ininstrumental part inthe commission of athe commission of acrime.crime.
  • 3. DEFINITION(CONT)DEFINITION(CONT)A computer can be a source of evidence.A computer can be a source of evidence.Even though the computer is not directlyEven though the computer is not directlyused for criminal purposes. It is anused for criminal purposes. It is anexcellent device for record keeping , andexcellent device for record keeping , andcan be of great value to criminalcan be of great value to criminalinvestigationsinvestigationsTechnological advancements have createdTechnological advancements have creatednew possibilities for criminal activity innew possibilities for criminal activity inparticular the criminal misuse ofparticular the criminal misuse ofinformation technologies.information technologies.
  • 4. TYPES OF CRIMETYPES OF CRIME1. Unauthorized access and hacking1. Unauthorized access and hackingIt means any kind of access without the permission of eitherIt means any kind of access without the permission of eitherthe rightful owner or the person in charge of a computer ,the rightful owner or the person in charge of a computer ,computer system , computer network.computer system , computer network.2. Trojan attack2. Trojan attackThe program that act like something useful but do the thingsThe program that act like something useful but do the thingsthat are quiet damaging . The programs of this kind arethat are quiet damaging . The programs of this kind arecalled as Trojanscalled as Trojansthe name Trojan is very popularthe name Trojan is very popular
  • 5. TYPES (CONT.)TYPES (CONT.)3.3. Virus and worm attackVirus and worm attackA program that has capability to inject other programsA program that has capability to inject other programsand make copies of itself and spread into other programs isand make copies of itself and spread into other programs iscalled virus.called virus.4.4. E-mail and IRL related crimesE-mail and IRL related crimes(i) Email spoofing(i) Email spoofingIt refers to email that appears to have been originated fromIt refers to email that appears to have been originated fromone source when it was actually sent from another sourceone source when it was actually sent from another source
  • 6. TYPES (CONT.)TYPES (CONT.)(ii) Email spamming(ii) Email spammingIt refers to sending email to thousands and thousands ofIt refers to sending email to thousands and thousands ofusers similar to a chain letterusers similar to a chain letter(iii) Sending malicious order through email(iii) Sending malicious order through emailEmails are used to send virus Trojan etc through emails asEmails are used to send virus Trojan etc through emails asan attachmentan attachmentEmail bombingEmail bombing(iv)(iv) It is characterized by abuses repeatedly sending an identicalIt is characterized by abuses repeatedly sending an identicalemail message to a particular addressemail message to a particular address
  • 7. TYPES (CONTD)TYPES (CONTD)(v)(v) Sending threatening emailsSending threatening emails(vi) Defamatory emails(vi) Defamatory emails(vii) Email frauds(vii) Email frauds(viii) IRC related(viii) IRC related5. Denial of service attack5. Denial of service attackflooding a computer resource with more requestsflooding a computer resource with more requests thanthanit can handle. This causes the resourceit can handle. This causes the resource to crash therebyto crash therebydenying access of service to authorized users.denying access of service to authorized users.
  • 8. TYPES(CONT)TYPES(CONT)6.6. ForgeryForgeryCounterfeit currency notes postage and revenue stampsCounterfeit currency notes postage and revenue stampsmark sheets etc can be forged using sophisticatedmark sheets etc can be forged using sophisticatedcomputers printers and scannerscomputers printers and scanners7.7. IPR violationsIPR violationsThese include software piracy copyright infringementThese include software piracy copyright infringementtrademark violation theft of computer source code etc.trademark violation theft of computer source code etc.
  • 9. TYPES (CONT)TYPES (CONT)8. Cyber terrorism8. Cyber terrorismTargeted attacks on militaryTargeted attacks on militaryinstallations, power plants, air traffic control, banks,installations, power plants, air traffic control, banks,telecommunications networks are the most likely targets.telecommunications networks are the most likely targets.99.. Banking/Credit card related crimesBanking/Credit card related crimesUse of stolen card information or fake credit/debit cards areUse of stolen card information or fake credit/debit cards arecommon.common.1010.. Theft of Internet hoursTheft of Internet hoursUnauthorized use of internet hours paid for by anotherUnauthorized use of internet hours paid for by anotherperson.person.
  • 10. TYPES (CONT)TYPES (CONT)11. Defamation11. DefamationWhen someone publishes defamatory matter about someoneWhen someone publishes defamatory matter about someoneon a website or sends e-mails containing defamatoryon a website or sends e-mails containing defamatoryinformation to all of that persons friends.information to all of that persons friends.12. Cyber stalking12. Cyber stalkingIt involves following a persons movement across the internetIt involves following a persons movement across the internetby posting messages on the bulletins board frequented by theby posting messages on the bulletins board frequented by thevictim , constantly bombarding the victim with emails etcvictim , constantly bombarding the victim with emails etc13. Identity theft13. Identity theftIt occurs when someone appropriates another’s personalIt occurs when someone appropriates another’s personalinformation without their knowledge to commit theft.information without their knowledge to commit theft.
  • 11. IT ACT OF INDIA 2000IT ACT OF INDIA 2000In May 2000 both the houses of the Indian Parliament passedIn May 2000 both the houses of the Indian Parliament passedthe Information Technology Bill.the Information Technology Bill.This act deals with the various cyber crimes in Chapter IX andThis act deals with the various cyber crimes in Chapter IX andXI, Sections 43 in particular deals with the unauthorizedXI, Sections 43 in particular deals with the unauthorizedaccess, unauthorized downloading, virus attacks, denial ofaccess, unauthorized downloading, virus attacks, denial ofaccess, distributions. This section provide for a fine up to Rs.access, distributions. This section provide for a fine up to Rs.one crore by way of remedy. Sec 65 deals with tampering withone crore by way of remedy. Sec 65 deals with tampering withcomputer source documents and provides for imprisonmentcomputer source documents and provides for imprisonmentupto 3 years or fine which may extend upto 2 years or both.upto 3 years or fine which may extend upto 2 years or both.Section 66 deals with hacking with computer system andSection 66 deals with hacking with computer system andprovides for imprisonment upto 3 years or fine which mayprovides for imprisonment upto 3 years or fine which mayextend upto 2 years or both.extend upto 2 years or both.
  • 12. PREVENTION OF CYBER CRIMEPREVENTION OF CYBER CRIMEPrevention is better than cure. It is always better to takePrevention is better than cure. It is always better to takecertain precaution while operating the net. One should keep incertain precaution while operating the net. One should keep inmind the following:-mind the following:-1. To prevent cyber stalking avoid disclosing any information1. To prevent cyber stalking avoid disclosing any informationpertaining to oneself.pertaining to oneself.2. Always use latest and update antivirus software to guard2. Always use latest and update antivirus software to guardagainst virus attacks.against virus attacks.3. Always avoid sending any photograph online particularly to3. Always avoid sending any photograph online particularly tostrangers and chat friends.strangers and chat friends.4. Never send your credit card numbers to any site that is not4. Never send your credit card numbers to any site that is notsecured to guard against frauds.secured to guard against frauds.5. Use of firewalls may be beneficial.5. Use of firewalls may be beneficial.
  • 13. PREVENTION (CONT)PREVENTION (CONT)6. Always keep a watch on the sides that your children are6. Always keep a watch on the sides that your children areaccessing to prevent any kind of harrassmentaccessing to prevent any kind of harrassment7. It is better to use a security programme that gives7. It is better to use a security programme that givescontrol over the cookies.control over the cookies.
  • 14. CONCLUSIONCONCLUSIONCapacity of human mind is unfathomable.Capacity of human mind is unfathomable.It is not possible to eliminate cyber crimeIt is not possible to eliminate cyber crimefrom the cyber space. The only possiblefrom the cyber space. The only possiblestep is to make people aware of their rightsstep is to make people aware of their rightsand duties and further making theand duties and further making theapplication of the laws more stringent toapplication of the laws more stringent tocheck crime.check crime.
  • 15. THANKSTHANKSA POWERPOINT PRESENTATIONA POWERPOINT PRESENTATIONBYBYAVASYU GUPTAAVASYU GUPTAIX DIX D