• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Cyber crimes
 

Cyber crimes

on

  • 3,000 views

different cyber crimes

different cyber crimes

Statistics

Views

Total Views
3,000
Views on SlideShare
2,990
Embed Views
10

Actions

Likes
5
Downloads
432
Comments
2

2 Embeds 10

http://ndu.blackboard.com 9
http://darya-ld1.linkedin.biz 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

12 of 2 previous next

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • yeah its good
    Are you sure you want to
    Your message goes here
    Processing…
  • get some new
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Cyber crimes Cyber crimes Presentation Transcript

    • CYBER CRIMES…
    • WHAT ARE CYBER CRIMES….?? Cyber crime is crime committed on the Internet, using the Internet and by means of the Internet.
    • WHICH TYPES OF CRIMES REFERS CYBERCRIMES…?? Computer crime is a general term that embraces such crimes as phishing, credit card frauds, bank robbery, illegal downloading, industrial espionage, child pornography, kidnapping children via chat rooms, scams, cyber terrorism, creation and/or distribution of viruses, Spam and so on. All such crimes are computer related and facilitated crimes.
    • TYPES OFCYBER CRIME...
    • oHACKINGoDENIAL OF SERVICE ATTACKoVIRUS DISSEMINATIONoSOFTWARE PIRACYoPORNOGRAPHYoIRC CRIMEoCREDIT CARD FRAUDoPHISHINGoSPOOFINGoCYBER STALKINGoCYBER DEFAMATIONoTHREATENINGoSALAMI ATTACKoNET EXTORTION
    • HACKING… The act of gaining unauthorized access to a computer system or network and in some cases making unauthorized use of this access. Hacking is also the act by which other forms of cyber-crime (e.g., fraud, terrorism, etc.) are committed. Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
    • DENIAL OF SERVICE ATTACK..This is an act by thecriminal, who floodsthe band width of thevictim’s network orfills his e-mail boxwith spam maildepriving him of theservices he is entitledto access or provide.
    • VIRUS DISSEMINATION… Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious soft wares)
    • SOFTWARE PIRACY…Theft of software through theillegal copying of genuineprograms or the counterfeitingand distribution of productsintended to pass for the original.Retail revenue losses world wideare ever increasing due to thiscrime Can be done in variousways such as end usercopying, hard diskloading, Counterfeiting, Illegaldownloads from the internet etc.
    • PRONOGRAPHY… Pornography is the first consistently successful ecommerce product. It was a deceptive marketing tactics and mouse trapping technologies. Pornography encourage customers to access their websites. Anybody including children can log on to the internet and access website with pornography contents with a click of a mouse.
    • IRC CRIME…Internet Relay Chat (IRC) servershave chat rooms in which peoplefrom anywhere the world cancome together and chat with eachother Criminals use it for meetingcoconspirators. Hackers use it fordiscussing their exploits / sharingthe techniquesPedophiles use chat rooms toallure small children.
    • CREDIT CARD FRAUD… You simply have to type credit card number into www page off the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
    • NET EXTORTION…Copying the company’s confidential datain order to extort said company for hugeamount.
    • Therefore there aremany crimes whichare done throughinternet…
    • PRECAUTIONS TO STOP CYBER CRIME… oEDUCATION oUSE AS FIREWALL oCLICK WITH CAUTION oPRACTICE SAFE SURFING oPRACTICE SAFE SHOPPING oSECURE YOUR WIRELESS NETWORK oUSE STRONG PASSWORDS oUSE COMMON SENSE oBE SUSPICIOUS
    • THANK YOU... Efforts by-Srishti jain VIII-A