2. BIODATA:
Students name : Smruti Rekha Barik
Class : X Section : “B“
Roll no. : 07
Subject : Information technology (IT)
Guide teacher : Mrs.Kabita Hazra
Topic : Cyber Crime
School name : Kendriya Vidyalaya No-1,Bhubaneswar
1st Shift
3. ACKNOWLEDGEMENT:
I am very thankful to my respected teacher Mrs. Kabita
Hazra Mam who showed me the path to accomplish my
project work, also for her valuable guidance and precious
suggestions. Every word in this project reflects her
challenging assistance and tremendous command.I am
also highly grateful to my parents and our Principal
Mr.Bhupandra Singh Sir who helped me by providing all
the essentials required to bring out this project.I feel
obliged to be the students of this incomparable school
Kendriya Vidyalaya No-1,Bhubaneswar which has been a
source of strength, knowledge, inspiration and self
esteem for all of us.
5. INTRODUCTION :
Cybercrime is criminal activity that either targets or uses a
computer, a computer network or a networked device.
Most, but not all, cybercrime is committed by
cybercriminals or hackers who want to make money.
Cybercrime is carried out by individuals ororganizations.
Some cybercriminals are organized, use advancedtechniques
and are highly technically skilled. Others are novice
hackers.
Rarely, cybercrime aims to damage computers forreasons
other than profit. These could be political orpersonal.
6. The internet in India is growing rapidly.
It has given rise to new opportunities in
every field we can think of be it
entertainment, business, sports or
education.HACK THEF SPY FRALD
INFORMATION HACKING CRIMINAL
COMPUTER 383 CYBER CRIME BO
INTERNET.
There're two sides of a coin. Internet
also has it's own. disadvantages is
Cyber crime illegal activity committed
on the internet.
7. TYPES OF CYBER CRIME:
HACKING
DENIAL OF SERVICE
ATTACKSPROCESSING ATTEMPT
FAILED
VIRUS DISSEMINATION
CYBER TERRORISMUSCANUSER
SAFE
SOFTWARE PIRACY
8. HACKING:
Hacking in simple terms means an illegal
intrusion into a computer system and
network.
Hacking refers to activities that seek to
compromise digital devices, such as
computers, smartphones, tablets, and even
entire networks. And while hacking might
not always be for malicious purposes,
nowadays most references to hacking, and
hackers, characterize it/them as unlawful
activity by cybercriminals-motivated by
financial gain, protest, information
gathering (spying), and even just for the
"fun" of the challenge.
9. DENIAL OF SERVICE ATTACK:
In computing, a denial-of-service attack
(DoSattack) is a cyber-attack in which
theperpetrator seeks to make a machine
or network resource unavailable to its
intended users bytemporarily or
indefinitely disrupting services of a host
connected to the Internet.
Act by the criminal, who floods the
bandwidth of the victims network.
In his e-mail box with spam mail depriving
him of theservices.
10. VIRUS DISSEMINATION
Virus dissemination is a process of a
Malicious software that attaches to other
software that destroys the system of the
victim. They disrupt the computer
operation and affect the data store
bymodifying or deleting it.
Malicious software that attaches itself to
other software. (virus, worms,
TrojanHorse, web jacking, e-mail
bombingetc.)
11. CYBER TERRORISM :
Cyberterrorism is the use of the
Internet to conduct violent acts that
result in, or threaten, loss of life or
significant bodily harm, in order to
achieve political or ideological gains
through threat or intimidation.
Use of internet based attacks in
terroristactivities.
Technology savvy terrorists are using
512-bit encryption, which isimpossible
to decrypt.
12. SOFTWARE PIRACY:
Software piracy is a term used to
describethe act of illegally using,
copying ordistributing software without
ownership orlegal rights. The majority
of software todayis purchased as a
single-user license,meaning that only
one computer may have that software
installed on it at one time.
Theft of software through the illegal
copying of genuine programs.
Distribution of products intended to
pass for the original.
13. PREVENTION :
Use antivirus software’s.
Insert firewalls.
Uninstall unnecessary software
Maintain backup.
Check security settings
Stay anonymous - choose a genderless screen name
Never give your full name or address to strangers
Learn more about Internet privacy
14. CONCLUSION:
Cyber crime is indeed getting
the recognition it deserves.
However, it is not going to
restricted easily.
In fact, it is highly likely that
cyber crime and its hackers
will continue developing and
upgrading to stay ahead of the
law.