• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Seminar on Cyber Crime
 

Seminar on Cyber Crime

on

  • 17,445 views

cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing ...

cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.

Statistics

Views

Total Views
17,445
Views on SlideShare
17,445
Embed Views
0

Actions

Likes
8
Downloads
1,314
Comments
2

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

12 of 2 previous next

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Seminar on Cyber Crime Seminar on Cyber Crime Presentation Transcript

    • SEMINAR ON CYBER CRIME
    • Introduction History of cyber crime Definition Categories of cyber crime Types of cyber crime Cyber criminals Prevention conclusion
    • INTRODUCTION The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
    • History of Cyber Crime The first recorded cyber crime took place in the year 1820! In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
    • Defining Cyber Crime It’s an unlawful act wherein the computer is either a tool or a target or both. Acts that are punishable by the Information Technology Act. Cyber space is a virtual space that has become as important as real space for business, politics, and communities .
    • CATEGORIES OF CYBER CRIME: Cyber crimes can be basically divided into 3 major categories: 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government
    • FIRST CATEGORY Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other.
    • SECOND CATEGORY These crimes include computer vandalism (destruction of others' property), transmission of harmful programs, unauthorized trespassing through cyber space, unauthorized possession of computer information.
    • THIRD CATEGORY Cyber terrorism is one distinct kind of crime in this category. The growth of internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.
    • Types Of Cyber Crime Modification of a conventional crime by using computers. Frequently Used Cyber Crimes.
    • Modification of a conventional crime by using computers. Financial crimes Cyber pornography Sale of illegal articles Online gambling BACK
    • Intellectual Property crime Email spoofing Forgery Cyber Defamation Cyber stalking
    • Frequently Used Cyber Crimes. Unauthorized access to computer systems or networks Theft of information contained in electronic form Email bombing Data diddling Salami attacks Denial of Service attack BACK
    • Virus / worm attacks Logic bombs Trojan attacks Internet time thefts Web jacking Theft of computer system Physically damaging a computer system
    • Cyber Criminals Kids (age group 9-16 etc.) Organized hacktivists Disgruntled employees Professional hackers (corporate espionage)
    • PREVENTION Disable and log off a specific user account to prevent access. Disable and log off a group of user accounts which access a particular service that is being attacked. Disable and dismount specific (network) devices, for instance disk devices that are being swamped.
    • Disable specific applications, for example, an e-mail system subjected to a SPAM attack. Close down an entire system, and divert processing to an alternative or backup service on a secondary network.
    • conclusion within the law enforcement agencies, a set of rules must be developed to address the various categories of computer crime. As such, investigators will know what and which materials to search and seize, the electronic evidence to recover, and the chain of custody to maintain .
    • THANK YOU.