2. CYBER CRIME !!
The expression ‘Crime’ is defined as an act, which subjects the doer to
legal punishment or any offence against morality, social order or any
unjust or shameful act. The “Offence" is defined in the Code of
Criminal Procedure to mean as an act or omission made punishable by
any law for the time being in force.
Cyber Crime is emerging as a serious threat. World wide
governments, police departments and intelligence units have started
to react.
3. “Cybercrime is criminal activity done using computers and the Internet.”
-Wikipedia
“Any criminal activity that uses a computer either as an instrumentality,
target or a means for perpetuating further crimes comes within the ambit
of cyber crime”(12)
-Indian Penal Code
One way of viewing cybercrimes is that they may be digital versions of
traditional, real world offenses. They could be considered traditional, or
“real world” crimes if not for the incorporated element of virtual or
cyberspace
-US Congressional View
6. HACKING
I.
Practice of modifying computer
hardware and software to
accomplish a goal outside of the
creator’s original purpose.
II. Modification of code intended by
the original programmer.
III. Identity Theft
7.
8. Phishing is a fraudulent
attempt, usually made through
email, to steal personal
information.
In order for Internet criminals
to successfully “phish” a
personal information, they
must go from an email to a
website.
11. It is the use of the Internet or
other electronic means to
stalk someone.
This term is used
interchangeably with online
harassment and online
abuse.
12.
13. SOFTWARE PIRACY
Theft of software
through the illegal
copying of genuine
programs or the
counterfeiting and
distribution of
products intended to
pass for the original
14.
15. SOFTWARE PIRACY
Software Piracy is done by:
I. End user copying
II. Hard disk loading
III.Counterfeiting
IV.Illegal downloads from the
internet etc
16. COMPUTER VIRUS
A. A computer virus is a computer program that
can copy itself and infect a computer without
permission or knowledge of the user.
B. The original may modify the copies or the copies
may modify themselves.
C. It can spread to other computers by infecting
files on a network file system or a file system
that is accessed by another computer.
18. ANTIVIRUS AND ANTISPYWARE PROGRAMS
Antivirus software consists of
computer programs that
attempt to identify and
eliminate computer viruses and
other malicious software. Anti
spy wares are used to restrict
backdoor program, Trojans and
other spy wares to be installed
on the computer.
19.
20. FIREWALLS
A firewall protects a
computer network from
unauthorized access.
A firewall establishes a
barrier between a
trusted, secure internal
network and another
network (e.g., the
Internet) that is not
assumed to be secure
and trusted
21.
22. CYBER LAWS
Cyber laws are being formulated to stop
cyber crimes.
Internet Service Providers should also
provide high level of security at their servers
in order to keep their clients secure from all
types of viruses and malicious programs.
23. If a computer virus or an invading hacker deletes
our files, or either one corrupts our files, the easiest
way to restore our computer may be to reformat the
hard drive(s) and then copy files from a recent
backup.
Backups also offer protection from more common
(and less exotic) threats such as accidental deletion
of a file by an authorized user or failure of a hard
disk drive.
24.
25. The most popular form
of security which
people rely on is
ENCRYPTION , the
process of encoding
information in such a
way that only the
person (or computer)
with the key can
decode it.
26. AWARENESS
Always keep a check that you do secure browsing
For example:
While browsing on some website, if “https” is written
in address bar instead of “http” that website
provides secure browsing.
27.
28. Awareness should be very important. We should treat very
cautiously when we use the public domain such as internet.
We should keep a check on how much we share on the new
to keep our self safe.
We should not fall for phishing schemes.
Its always good to remember the old saying --
“If its too good to be true, it probably is”