My presentation

420 views
387 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
420
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

My presentation

  1. 1. The most critical and increasingproblem.
  2. 2. What is Cyber Crime? Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where the computer used as an object or subject of crime .
  3. 3. HISTORY:The first recorded cyber crime took place in theyear 1820 That is not surprising considering thefact that the abacus, which is thought to be theearliest form of a computer, has been around since3500 B.C.
  4. 4. TYPES OF CYBER CRIME:Hacking.Denial of serviceAttacks.IRC CrimeCredit Card FraudPhishingSpoofingSalami AttacksPornographyNet ExtortionSoftware Piracy
  5. 5. HACKING:Hacking in simple termsmeans an illegal intrusioninto a computer systemand/or network. It is alsoknown as CRACKING.Government websites arethe hot targets of thehackers due to the presscoverage, it receives.Hackers enjoy the mediacoverage..
  6. 6. DENIAL OF SERVICE ATTACKS:This is an act by thecriminal, who floodsthe band width ofthe victim’s networkor fills his e-mail boxwith spam maildepriving him of theservices he is entitledto access or provide.
  7. 7. IRC (INTERNET RELAYCHAT):Internet Relay Chat (IRC) servers have chat rooms inwhich people from anywhere the world can come togetherand chat with each other .Criminals use it for meetingcoconspirators. Hackers use it for discussing their exploits/ sharing the techniquesPedophiles use chat rooms to allure small children.
  8. 8. CREDIT CARD FRAUD: You simply have to type credit card number into www page off the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
  9. 9. PHISHING:Phishing is the act of attempting to acquire informationsuch as usernames, passwords, and credit card details(and sometimes, indirectly, money) by masquerading as atrustworthy entity in an electronic communication.Communications purporting to be from popular social websites, auction sites, online payment processors or ITadministrators are commonly used to lure theunsuspecting public. Phishing emails may contain links towebsites that are infected with malware. Phishing istypically carried out by e-mail spoofing or instantmessaging, and it often directs users to enter details at afake website whose look and feel are almost identical tothe legitimate one.
  10. 10. SOFTWARE PIRACY: Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Retail revenue losses world wide are ever increasing due to this crime Can be done in various ways such as end user copying, hard disk loading, Counterfeiting, Illega l downloads from the internet etc
  11. 11. PORNOGRAPHY: Pornography is the first consistently successful ecommerce product. It was a deceptive marketing tactics and mouse trapping technologies. Pornography encourage customers to access their websites. Anybody including children can log on to the internet and access website with pornography contents with a click of a mouse.
  12. 12. VIRUS:In computers, a virus is a program or programming code thatreplicates by being copied or initiating its copying to anotherprogram, computer boot sector or document. Viruses can betransmitted as attachments to an e-mail note or in a downloadedfile, or be present on a diskette or CD. The immediate source of thee-mail note, downloaded file, or diskette youve received is usuallyunaware that it contains a virus. Some viruses wreak their effectas soon as their code is executed; other viruses lie dormant untilcircumstances cause their code to be executed by the computer.(virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbitand Bacterium are the malicious softwares)
  13. 13. THEREFORE THERE AREMANY CRIMES WHICH AREDONE THROUGH INTERNET.
  14. 14. PRECAUTION TO STOP CYBER CRIMES:Update your virusprotection software oftenat least once a week.Change your passwordfrequently and nevergive them out toanyone! Use passwordthat are at least 6characters and do notcontain words in the
  15. 15. Back Up your files veryregularly.Don’t open suspiciousattachments. Always look atthe three letter file extension.Don’t leave yourcomputer unattendedafter logging in (Andalways log out whenyou are finished).
  16. 16. Devashri Balinge.Priyanka Deshpande. Presented By:
  17. 17. THANK YOU!
  18. 18. QUESTIONS:

×