Its the presentation about the basic idea of Cyber Crime.
Crimes that use computer networks or devices to advance other ends include: Fraud and identity theft (although this increasingly uses malware, hacking or phishing, making it an example of both "computer as target" and "computer as tool" crime) Information warfare. Phishing scams...
4. Cyber Piracy
Using cyber-technology in unauthorized ways to reproduce copies of
proprietary software and proprietary information or distribute proprietary
information across a computer network.
Cyber Trespass
Using cyber-technology to gain unauthorized access to an individual's or
an organization's computer system or a password-protectedWeb site.
5. Cyber Vandalism
Using cyber-technology to unleash one or more
programs that disrupt the transmission of electronic
information across one or more computer networks,
including the Internet or destroy data resident in a
computer or damage a computer system's
resources or both.
6. Hacking means unauthorized attempts to bypass the security
mechanisms of an information system or network. Also, in
simple words Hacking is the unauthorized access to a
computer system, programs, data and network resources. The
person whose identity is used can suffer various consequences
when they are held responsible for the perpetratorโs actions
7. E-mail bombing refers to sending a large amount of e-mails to
the victim resulting in interruption in the victimsโ e-mail account
or mail servers.
Data Diddling
This kind of an attack involves altering the raw data just before
it is processed by a computer and then changing it back after
the processing is completed.
8. Cyber Stalking is use of the Internet or other electronic means to
stalk someone. This term is used interchangeably with online
harassment and online abuse. Stalking generally involves
harassing or threatening behaviour that an individual engages in
repeatedly, such as following a person, appearing at a person's
home or place of business, making harassing phone calls,
leaving written messages or objects, or vandalizing a person's
property.
9. E-mail spoofing is e-mail activity in which the sender addresses
and other parts of the e-mail header are altered to appear as
though the e-mail originated from a different source. E-mail
spoofing is sending an e-mail to another person in such a way
that it appears that the e-mail was sent by someone else
Denial Of Service
This involves flooding computer resources with more requests
than it can handle. This causes the resources to crash thereby
denying authorized users the service offered by the resources.
10. Identity theft is a form of fraud or cheating of another personโs
identity in which someone pretends to be someone else by
assuming that personโs identity, typically in order to access
resources or obtain credit and other benefits in that personโs
name.
Salami Attacks
These attacks are used for the commission of financial crimes.
The key here is to make the alteration so insignificant that in a
single case it would go completely unnoticed e.g. a bank
employee inserts a program into bankโs servers, that deducts a
small amount from the account of every customer
11. โ Many crimes that involve the use of cyber-technology are not genuine
cyber crimes.
โ Crimes involving stalking can each be carried with or without the use
of cyber technology.
โ Hence, there is nothing about these kinds of crimes that is unique to
cyber technology.
โ These and similar crimes are better understood as instances of cyber
related crimes.