Cyber crime
Upcoming SlideShare
Loading in...5
×
 

Cyber crime

on

  • 4,291 views

 

Statistics

Views

Total Views
4,291
Slideshare-icon Views on SlideShare
4,291
Embed Views
0

Actions

Likes
5
Downloads
577
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Cyber crime Cyber crime Presentation Transcript

    • RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 1
    • RAJENDRA DANGWAL RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME B.TECH- IT 2
    • RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 3
    •  Cybercrime is nothing but where the computer used as an object or subject of crime. Cyber crime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, cyber crime has assumed rather sinister implications.  Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs. RAJENDRA DANGWAL, CYBER CRIME GEHU(BHIMTAL) 4
    •  In the early decades of modern information technology (IT), computer crimes were largely committed by individual disgruntled and dishonest employees.  Physical damage to computer systems was a prominent threat until the 1980s.  Programmers in the 1980s began writing malicious software, including self-replicating programs, to interfere with personal computers.  As the Internet increased access to increasing numbers of systems worldwide, criminals used unauthorized access to poorly protected systems for vandalism, political action and financial gain. RAJENDRA DANGWAL, CYBER CRIME GEHU(BHIMTAL) 5
    • Criminal activity involving  Information technology infrastructure  Illegal access  Data interference  Misuse of devices  Forgery and  Electronic fraud. RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 6
    • Types of Cyber Crime Hacking - Hacking in simple terms means an illegal intrusion into a computer system without permission of computer owner/user. Hackers write or use ready-made computer programs to attack the target computer. Software Piracy - Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. The unauthorized copying of software. RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 7
    • Email spoofing - A spoofed email is one that appears to originate from one source but actually has been sent from another source. Phishing - The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has . RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 8
    • CLASSIFICATION  Against Individuals  Against Organization  Against Society RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 9
    •  Harassment via e-mails  Email spoofing  Defamation. Unauthorized control/access over computer system  Cheating & Fraud  Phishing RAJENDRA DANGWAL, CYBER CRIME GEHU(BHIMTAL) 10
    • Unauthorized control/access over computer system. Possession of unauthorized information. Cyber terrorism against the government organization. Distribution of pirated software etc. RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 11
    •  Polluting the youth through indecent exposure.  Trafficking  Financial crimes  Sale of illegal articles  Online gambling  Forgery RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 12
    • RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 13
    • PREVENTION OF CYBER CRIME  Anti-virus software .  Frequent password changing.  Firewalls.  Safe surfing.  Frequent virus checks.  Email filters. RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 14
    •  User awareness is key to a secure computer/network  Do not open suspicious files/emails  Avoid using P2P programs  Avoid downloading freeware  If attacked, disconnect the network. Do not turn off the computer  So we must pay attention to all those issues and protect the World from Cyber Crime  “If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked. — White House Cybersecurity Advisor” ─ Richard Clarke RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 15
    • RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 16