Internet
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
2,463
On Slideshare
2,463
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
121
Comments
0
Likes
2

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. CYBER CRIME
    MISS.JYOTI A. PATIL
    BCA-I, ROLL No.16.
    DR.B.M.N college of home science, matunga.
  • 2. INTERNET
    Parallel form of life and living.
    Dependence & reliance of mankind on this machines.
    Communication, net surfing, education, business, shopping , entertainment, etc.
  • 3. CYBER CRIME
    Cyber crime - Criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It also refers to criminal exploitation of Internet. It includes-
    Unauthorized access to computer systems,
    Data alteration,
    Data destruction,
    Theft of intellectual property,etc.
  • 4. Computer crime encompasses a broad range of potentially illegal activities.
    It can be divided into two broad activities:
    (1) Crimes that target computer networks or devices directly,
    Eg.- Computer viruses, Denial of service attacks.
    (2) Crimes facilitated by computer networks or devices, the primary target of which is independent of computer network or device.
    Eg. Cyber stalking, Fraud and identity theft, Phishing scams,etc.
  • 5. VARIANTS
    Cyber stalking
    Hacking
    Phishing
    Crosssite scripting
    Vishing
    Cyber Squatting
    Bot Networks
  • 6. 1. Cyber Stalking
    Cyber stalking is also called as Online harassment and Online abuse.
    It is use of the Internet or other electronic means to stalk someone. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property.
  • 7. 2. Phishing
    Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of financial institutions, requesting them to enter their username, password or other personal information to access their account for some reason.
  • 8. 3. Cross site scripting
    Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users.
  • 9. 4. Hacking
    Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 per cent increase this year.
  • 10. 5. Vishing
    Vishing is the criminal practice of using social engineering and Voice over IP (VoIP) to gain access to private, personal and financial information from the public for the purpose of financial reward. The term is a combination of "voice" and phishing
  • 11. 6. Cyber Squatting
    Cyber squatting is the act of registering a famous domain name and then selling it for a fortune. This is an issue that has not been tackled in IT act 2000.
  • 12. 7. Bot Networks
    A cyber crime called 'Bot Networks', wherein spamsters and other perpetrators of cyber crimes remotely take control of computers without the users realizing it. It is increasing at an alarming rate.
    Computers get linked to Bot Networks when users unknowingly download malicious codes such as Trojan horse sent as e-mail attachments.
  • 13. CYBER CRIME CASES
    On 7th Feb,2000 Yahoo! Website was attacked. Yahoo was pinged at a rate of 1gb/sec.
    In 26 March 1999, the Melissa worm infected a document on a victim's computer, then automatically sent that document and copy of the virus via e-mail to other people.
    On 2nd March 2010, Spanish investigators busted 3 infection of over 13 million computers around the world. The "botnet" of infected computers included PCs inside more than half of the Fortune 1,000 companies and more than 40 major banks.
  • 14. Anti Cyber Crime Initiatives
    Keep an electronic eye on the users of the various cyber cafes spread over the city.
    Establish Computer Emergency Response Teams (CERTs)
    To coordinate and respond during major security incidents/events.
    Identify and address existing and potential threats and vulnerabilities in the system and coordinate with stakeholders to address threats.
  • 15. CONCLUSION
    Net surfing by youngsters lures them into dangerous domain.
    The need for a conscious effort to checkmate the undesirable fallout of youngsters accessing and using the Internet is of concern.
    The print media has a duty to educate unwary parents and youngsters about the dangers inherent in treading dangerous areas in the cyber-world.
  • 16. * THANK YOU *