Computer CrimeBy Inqilab Ruknuddin Patel (MCS)KN Academy Malir
Cyber Crime   "Offences that are committed against individuals or   groups of individuals with a criminal motive to   inte...
Internet Terminology
Cyber Crimes
HackingDefinition                                      Protection       Hacking is unauthorized use of                 Ma...
Phishing(fishing)Disguising as a trustworthy source                                 Phishing is the act of attempting to  ...
PhishingPhishing Protection • The most powerful weapon against phishing is common sense and   the following rules that eve...
PharmingDNS Poisoning                Pharming in Simple Steps:                Hacker creates a fake website which appears ...
Pharmin                                        DNS                                        g                               ...
PharmingProtection from Pharming1   Check the URL of       2   Use a trusted,      3   Check the    any site that asks    ...
Internet Business Scams   Dear Friend, as you read this, I dont want you to feel sorry for me, because, I   believe everyo...
Most Common Business Scams                       First and foremost, let me make it clear. There is some  Get Paid Program...
THANK YOU!inqilab@ruknuddin.com
Computer crime by inqilab patel
Upcoming SlideShare
Loading in...5
×

Computer crime by inqilab patel

522

Published on

"Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)“

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
522
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
16
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Computer crime by inqilab patel

  1. 1. Computer CrimeBy Inqilab Ruknuddin Patel (MCS)KN Academy Malir
  2. 2. Cyber Crime "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)“
  3. 3. Internet Terminology
  4. 4. Cyber Crimes
  5. 5. HackingDefinition Protection Hacking is unauthorized use of Make your passwords long and complicated, and with a good mix of computer and network letters and numbers, as well as utilizing resources. case-sensitive letters. Dont use anything familiar, such as your birthday, your The activity of breaking into a childrens names or anything like that. If a computer system to gain an hacker wants to attempt to break into your unauthorized access is known as email accounts, at least make him work hacking. The act of defeating the for it. Dont ever allow your browser to security capabilities of a computer remember your passwords. True, it may system in order to obtain an illegal be a bit of an inconvenience to enter your access to the information stored on password every time you log in. the computer system is called hacking. Activate Firewall
  6. 6. Phishing(fishing)Disguising as a trustworthy source Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source. Phishing is carried out through emails or by luring the users to enter personal information through fake websites. Criminals often use websites that have a look and feel of some popular website, which makes the users feel safe to enter their details there.
  7. 7. PhishingPhishing Protection • The most powerful weapon against phishing is common sense and the following rules that every user should oblige to. • If you are not a customer of the site delete the email immediatly. Don´t click on the link or reply. • If you are a customer and you are not sure if the email is legit do one of the following: • Contact the institute by phone or contact at the official website ( do not use the email link of course) and ask if the mail is official. • Instead of using the link provided open the website by typing in the official link there. The site should have news about the email on their starting page. (most of the time). If not, use 2a to verify the email.
  8. 8. PharmingDNS Poisoning Pharming in Simple Steps: Hacker creates a fake website which appears similar to the original website. Hacker poisons the DNS servers thus domain names are resolved into fake IP address. User types the URL of the original website in the browser. The DNS server directs User to the fake website designed by hacker. User not knowing that it is a fake website, shares his confidential information such as login, password... etc. Hacker gets the user confidential information from his fake web site and uses it to access the original website. Hacker exploits users confidential information to his liking.
  9. 9. Pharmin DNS g PoisoningPharming in Simple Steps:Hacker creates a fake website which appearssimilar to the original website.Hacker poisons the DNS servers thus domainnames are resolved into fake IP address.User types the URL of the original website inthe browser.The DNS server directs User to the fakewebsite designed by hacker.User not knowing that it is a fake website,shares his confidential information such aslogin, password... etc.Hacker gets the user confidential informationfrom his fake web site and uses it to accessthe original website.Hacker exploits users confidential informationto his liking.
  10. 10. PharmingProtection from Pharming1 Check the URL of 2 Use a trusted, 3 Check the any site that asks legitimate certificate. It you to provide Internet Service takes just a few personal Provider. seconds to tell if information. Make sure your session Rigorous a site you land begins at the security at the on is legitimate. known authentic ISP level is your Block suspicious address of the site, first line of Websites with no additional defense against automatically characters pharming. appended to it.
  11. 11. Internet Business Scams Dear Friend, as you read this, I dont want you to feel sorry for me, because, I believe everyone will die someday. My name is Mr Adada Muhammadu, a Crude Oil merchant in Nigeria and I have been diagnosed with Esophageal cancer. It has defied all forms of medical treatment, and right now I have only about a few months to live, according to medical experts. I want God to be merciful to me and accept my soul so, I have decided to give alms to charity organizations, as I want this to be one of the last good deeds I do on earth. So far, I have distributed money to some charity organizations in Austria, Cameroon, Liberia, Algeria and Malaysia. Now that my health has deteriorated badly, I cannot do it myself anymore. The last of my money which no one knows of is the huge cash deposit of Eighty million dollars $80,000,000 that I have with a finance/Security Company abroad. I will want you to help me collect this deposit and dispatched it to charity organizations. I have set aside 20% for you and for your time. God be with you. ~ Mr Adada Muhammadu"
  12. 12. Most Common Business Scams First and foremost, let me make it clear. There is some Get Paid Programs good news for all you get paid program enthusiasts. Not all get paid programs are fake but 99%. They Cheat by demanding a subscription fee or a membership fee Once again, a majority of these programs are downright fake. Most of them promise home based business opportunities and jobs involvingWork From Home Scams typing, data entry, etc. However, all of them vanish from existence once theyve managed to lay their hands on the small subscription fee that you pay them. Its not what it sounds like. The banks havent started getting into Internet crime (and thank God for that!). Its just that some cunning Bank Scams: fraudsters create duplicate (read FAKE) websites which are complete with the banks logo, hyperlink, etc. Then they send fake emails on behalf of the bank, asking you to visit the bank website (obviously the fake one) and enter your account details as well as other sensitive information.
  13. 13. THANK YOU!inqilab@ruknuddin.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×