SlideShare a Scribd company logo
1 of 13
By: 
ZEESHAN ALAM KHAN 
(MCA AMU)
๏ฝ Distinguishing Cybercrimes from Cyber related 
Crimes
Cyber Piracy 
Using cyber-technology in unauthorized ways to reproduce copies of 
proprietary software and proprietary information or distribute proprietary 
information across a computer network. 
Cyber Trespass 
Using cyber-technology to gain unauthorized access to an individual's or 
an organization's computer system or a password-protectedWeb site.
Cyber Vandalism 
Using cyber-technology to unleash one or more 
programs that disrupt the transmission of electronic 
information across one or more computer networks, 
including the Internet or destroy data resident in a 
computer or damage a computer system's 
resources or both.
Hacking means unauthorized attempts to bypass the security 
mechanisms of an information system or network. Also, in 
simple words Hacking is the unauthorized access to a 
computer system, programs, data and network resources. The 
person whose identity is used can suffer various consequences 
when they are held responsible for the perpetratorโ€™s actions
E-mail bombing refers to sending a large amount of e-mails to 
the victim resulting in interruption in the victimsโ€™ e-mail account 
or mail servers. 
Data Diddling 
This kind of an attack involves altering the raw data just before 
it is processed by a computer and then changing it back after 
the processing is completed.
Cyber Stalking is use of the Internet or other electronic means to 
stalk someone. This term is used interchangeably with online 
harassment and online abuse. Stalking generally involves 
harassing or threatening behaviour that an individual engages in 
repeatedly, such as following a person, appearing at a person's 
home or place of business, making harassing phone calls, 
leaving written messages or objects, or vandalizing a person's 
property.
E-mail spoofing is e-mail activity in which the sender addresses 
and other parts of the e-mail header are altered to appear as 
though the e-mail originated from a different source. E-mail 
spoofing is sending an e-mail to another person in such a way 
that it appears that the e-mail was sent by someone else 
Denial Of Service 
This involves flooding computer resources with more requests 
than it can handle. This causes the resources to crash thereby 
denying authorized users the service offered by the resources.
Identity theft is a form of fraud or cheating of another personโ€™s 
identity in which someone pretends to be someone else by 
assuming that personโ€™s identity, typically in order to access 
resources or obtain credit and other benefits in that personโ€™s 
name. 
Salami Attacks 
These attacks are used for the commission of financial crimes. 
The key here is to make the alteration so insignificant that in a 
single case it would go completely unnoticed e.g. a bank 
employee inserts a program into bankโ€™s servers, that deducts a 
small amount from the account of every customer
โ‡› Many crimes that involve the use of cyber-technology are not genuine 
cyber crimes. 
โ‡› Crimes involving stalking can each be carried with or without the use 
of cyber technology. 
โ‡› Hence, there is nothing about these kinds of crimes that is unique to 
cyber technology. 
โ‡› These and similar crimes are better understood as instances of cyber 
related crimes.
Cyber crime
Cyber crime

More Related Content

What's hot

Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
Whitney Bolton
ย 

What's hot (20)

Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
ย 
Cyber crime
Cyber crimeCyber crime
Cyber crime
ย 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
ย 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
ย 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
ย 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
ย 
Cyber attack
Cyber attackCyber attack
Cyber attack
ย 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
ย 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
ย 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
ย 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
ย 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
ย 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
ย 
cyber crime
cyber crimecyber crime
cyber crime
ย 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
ย 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
ย 
cyber crime
cyber crimecyber crime
cyber crime
ย 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
ย 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
ย 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
ย 

Viewers also liked

TYBSC IT SEM 6 IPR/CL
TYBSC IT SEM 6 IPR/CLTYBSC IT SEM 6 IPR/CL
TYBSC IT SEM 6 IPR/CL
WE-IT TUTORIALS
ย 
PPT on mind reading computer
 PPT on mind reading computer PPT on mind reading computer
PPT on mind reading computer
Anjali Agarwal
ย 
Blue brain project ppt
Blue brain project pptBlue brain project ppt
Blue brain project ppt
Lishita Shah
ย 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
Shwet Kamal
ย 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
harshhanu
ย 

Viewers also liked (10)

Respioratry system
Respioratry system Respioratry system
Respioratry system
ย 
Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000
ย 
HUMANOID ROBOTS
HUMANOID ROBOTSHUMANOID ROBOTS
HUMANOID ROBOTS
ย 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
ย 
TYBSC IT SEM 6 IPR/CL
TYBSC IT SEM 6 IPR/CLTYBSC IT SEM 6 IPR/CL
TYBSC IT SEM 6 IPR/CL
ย 
PPT on mind reading computer
 PPT on mind reading computer PPT on mind reading computer
PPT on mind reading computer
ย 
Blue brain project ppt
Blue brain project pptBlue brain project ppt
Blue brain project ppt
ย 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
ย 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
ย 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
ย 

Similar to Cyber crime

Chapter 3
Chapter 3Chapter 3
Chapter 3
anas_desa
ย 
Computer crime
Computer crimeComputer crime
Computer crime
Vishesh Dalal
ย 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Alisha Jain
ย 

Similar to Cyber crime (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
ย 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
ย 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
ย 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
ย 
8.Information Security
8.Information Security8.Information Security
8.Information Security
ย 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
ย 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
ย 
Chapter 3
Chapter 3Chapter 3
Chapter 3
ย 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
ย 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
ย 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
ย 
Cybe Crime & Its Type
Cybe Crime & Its TypeCybe Crime & Its Type
Cybe Crime & Its Type
ย 
Computer crime
Computer crimeComputer crime
Computer crime
ย 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
ย 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
ย 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
ย 
phishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptxphishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptx
ย 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
ย 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
ย 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
ย 

More from Zeeshan Khan

More from Zeeshan Khan (12)

Apache kafka
Apache kafkaApache kafka
Apache kafka
ย 
Spring security4.x
Spring security4.xSpring security4.x
Spring security4.x
ย 
Micro services overview
Micro services overviewMicro services overview
Micro services overview
ย 
XML / WEB SERVICES & RESTful Services
XML / WEB SERVICES & RESTful ServicesXML / WEB SERVICES & RESTful Services
XML / WEB SERVICES & RESTful Services
ย 
Manual Testing
Manual TestingManual Testing
Manual Testing
ย 
Collection framework (completenotes) zeeshan
Collection framework (completenotes) zeeshanCollection framework (completenotes) zeeshan
Collection framework (completenotes) zeeshan
ย 
JUnit with_mocking
JUnit with_mockingJUnit with_mocking
JUnit with_mocking
ย 
OOPS in Java
OOPS in JavaOOPS in Java
OOPS in Java
ย 
Java
JavaJava
Java
ย 
Introduction to BIG DATA
Introduction to BIG DATA Introduction to BIG DATA
Introduction to BIG DATA
ย 
Big data
Big dataBig data
Big data
ย 
Android application development
Android application developmentAndroid application development
Android application development
ย 

Recently uploaded

VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
SUHANI PANDEY
ย 
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men ๐Ÿ”mehsana๐Ÿ” Escorts...
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men  ๐Ÿ”mehsana๐Ÿ”   Escorts...โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men  ๐Ÿ”mehsana๐Ÿ”   Escorts...
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men ๐Ÿ”mehsana๐Ÿ” Escorts...
nirzagarg
ย 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
SUHANI PANDEY
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
SUHANI PANDEY
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
singhpriety023
ย 
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
nirzagarg
ย 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
ย 
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
ย 

Recently uploaded (20)

Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
ย 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
ย 
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men ๐Ÿ”mehsana๐Ÿ” Escorts...
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men  ๐Ÿ”mehsana๐Ÿ”   Escorts...โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men  ๐Ÿ”mehsana๐Ÿ”   Escorts...
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men ๐Ÿ”mehsana๐Ÿ” Escorts...
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
ย 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
ย 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
ย 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
ย 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
ย 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
ย 
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹ Bilaspur Escort Service Call Girls, 9352852248 โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
ย 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
ย 
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
ย 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
ย 
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
ย 

Cyber crime

  • 1. By: ZEESHAN ALAM KHAN (MCA AMU)
  • 2. ๏ฝ Distinguishing Cybercrimes from Cyber related Crimes
  • 3.
  • 4. Cyber Piracy Using cyber-technology in unauthorized ways to reproduce copies of proprietary software and proprietary information or distribute proprietary information across a computer network. Cyber Trespass Using cyber-technology to gain unauthorized access to an individual's or an organization's computer system or a password-protectedWeb site.
  • 5. Cyber Vandalism Using cyber-technology to unleash one or more programs that disrupt the transmission of electronic information across one or more computer networks, including the Internet or destroy data resident in a computer or damage a computer system's resources or both.
  • 6. Hacking means unauthorized attempts to bypass the security mechanisms of an information system or network. Also, in simple words Hacking is the unauthorized access to a computer system, programs, data and network resources. The person whose identity is used can suffer various consequences when they are held responsible for the perpetratorโ€™s actions
  • 7. E-mail bombing refers to sending a large amount of e-mails to the victim resulting in interruption in the victimsโ€™ e-mail account or mail servers. Data Diddling This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed.
  • 8. Cyber Stalking is use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property.
  • 9. E-mail spoofing is e-mail activity in which the sender addresses and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source. E-mail spoofing is sending an e-mail to another person in such a way that it appears that the e-mail was sent by someone else Denial Of Service This involves flooding computer resources with more requests than it can handle. This causes the resources to crash thereby denying authorized users the service offered by the resources.
  • 10. Identity theft is a form of fraud or cheating of another personโ€™s identity in which someone pretends to be someone else by assuming that personโ€™s identity, typically in order to access resources or obtain credit and other benefits in that personโ€™s name. Salami Attacks These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed e.g. a bank employee inserts a program into bankโ€™s servers, that deducts a small amount from the account of every customer
  • 11. โ‡› Many crimes that involve the use of cyber-technology are not genuine cyber crimes. โ‡› Crimes involving stalking can each be carried with or without the use of cyber technology. โ‡› Hence, there is nothing about these kinds of crimes that is unique to cyber technology. โ‡› These and similar crimes are better understood as instances of cyber related crimes.