Various cyber crime

1,008 views

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,008
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
65
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Various cyber crime

  1. 1. Submitted to-Mr.Neeraj PratiharLecturer of I.T.Presented by-Miss Asha MaliVIII Sem. I.T.09eimit010ASEMINARONCYBER CRIME
  2. 2. CYBER CRIME
  3. 3. AGENDAINTRODUCTIONWHAT IS CYBER CRIME ??VARIOUS CYBERCRIMEWHO ARE CYBER CRIMINALS??CONCLUSION.REFERENCES.
  4. 4. INTRODUCTIONCyber crime is a term used broadly todescribe activity in which computers ornetworks are a tool, a target, or a placeof criminal activity.The first recorded cyber crime tookplace in the year 1820 by Joseph-MarieJacquard
  5. 5. WHAT IS CYBER CRIME ? It is a criminal activity committed on the internet.This is a broad term that describes everything fromelectronic cracking to denial of service attacks thatcause electronic commerce sites to lose money. Cyber crime is just a combination of crime andcomputer. Any offence or crime in which a computer is used isa cyber crime.
  6. 6. VARIOUS TYPES OF CYBERCRIMEHACKING PHISHINGDENIAL OF SERVICE ATTACK SPOOFINGVIRUS DISSEMINATION CYBER STALKINGSOFTWARE PIRACY CYBER DEFAMATIONPORNOGRAPHY THREATENINGIRC Crime SALAMI ATTACKCREDIT CARD FRAUD NET EXTORTION
  7. 7. HACKINGThe act of gaining unauthorized access to a computer system ornetwork (e.g., fraud, terrorism, etc.)
  8. 8. DENIAL OF SERVICE ATTACK:-This is an act by the criminal, who floods the band width ofthe victim’s network or fills his e-mail box with spam maildepriving him of the services he is entitled to access orprovide.
  9. 9. VIRUS DISSEMINATIONMalicious software that attaches itself to other software.(virus, worms, Trojan Horse, Time bomb, LogicBomb, Rabbit and Bacterium are the malicious soft wares)
  10. 10. SOFTWARE PIRACYTheft of software through the illegal copying of genuine programsIRC CRIMEInternet Relay Chat (IRC) servers have chat rooms in whichpeople from anywhere the world can come together and chatwith each otherCREDIT CARD FRAUD:-You simply have to type credit card number into www page offthe vendor for online transaction.If electronic transactions are not secured the credit cardnumbers can be stolen by the hackers who canmisuse this card by impersonating the credit card owner.
  11. 11. NET EXTORTION:-Copying the company’s confidential data in order to extortsaid company for huge amount.SPOOFINGGetting one computer on a network to pretend to have theidentity of another computer, usually one with special accessprivileges, so as to obtain access to the other computers onthe network.
  12. 12. PHISHINGIt is technique of pulling out confidentialinformation from the bank/financialinstitutional account holders by deceptivemeans
  13. 13. CYBER STALKINGIt refers to the use of the Internet, e-mail, or othertelecommunication technologies to harass or stalk anotherperson.CYBER DEFAMATION:-The criminals send e-mail containing defamatorymatters to all concerned of the victim or post thedefamatory matters on a website.(divorced husband against wife)
  14. 14. THREATENINGThe Criminal sends threatening email or comesin contact in chat rooms with victim. (Any onedisgruntled may do this against boss, friend orofficial
  15. 15. SALAMI ATTACKIn such crime criminal makes insignificant changes in such amanner that such changeswould go unnoticed. Criminal makes such program thatdeducts small amount like 2.50 per month from the accountof all the customer of the Bank and deposit the same in hisaccount. In this case no account holder will approach thebank for such small amount but criminal gains huge amount.
  16. 16. WHO ARE CYBER CRIMINALS ??Kids(age group 9-16)Organized hackersDisgruntled employeesProfessional hackers
  17. 17. CONCLUSION:-Technology is always a double-edged sword and can be usedfor both the purposes – good or bad.Hence, it should be the persistent efforts of rulers and lawmakers to ensure that technology grows in a healthy mannerand is used for legal and ethicalbusiness growth and not for committing crimes.
  18. 18. REFERNCES www.cisco.com www.berbee.com www.ibm.com www.microsoft.com www.rsa.com www.gocsi.com www.sans.org www.nist.gov

×