Its a power point on cyber crime. This slides presentation contains the Basic information about cyber crime.Its a Critical analysis. The definition, History, Categories , Types, Solution to get back from cyber crime is stated here.
2. Presented ByPresented By
Name :Depankar Chakraborty
Identification No: 14-1-21-0011
Batch :21st
(A)
Department of Law, ASA University Bangladesh
3. ContentsContents
Definition of cyber crimeDefinition of cyber crime
History of cyber crimeHistory of cyber crime
Categories of Cyber CrimeCategories of Cyber Crime
Types of Cyber CrimeTypes of Cyber Crime
How we make secured our computer orHow we make secured our computer or
other devices from Cyber Crime?other devices from Cyber Crime?
Combating computer crimeCombating computer crime
ConclusionConclusion
4.
5. History of cyber crimeHistory of cyber crime
Cybercrime first started with hackers trying toCybercrime first started with hackers trying to
break into computer networks. Some did it justbreak into computer networks. Some did it just
for the thrill of accessing high-level securityfor the thrill of accessing high-level security
networks, but others sought to gain sensitive,networks, but others sought to gain sensitive,
classified material. Eventually, criminalsclassified material. Eventually, criminals
started to infect computer systems withstarted to infect computer systems with
computer viruses, which led to breakdowns oncomputer viruses, which led to breakdowns on
personal and business computers.personal and business computers.
6. What is Cyber Crime?What is Cyber Crime?
Cybercrime, also called computer crime, isCybercrime, also called computer crime, is
any illegal activity that involves a computerany illegal activity that involves a computer
or network-connected device, such as aor network-connected device, such as a
mobile phone.mobile phone.
7. Categories of Cyber CrimeCategories of Cyber Crime
We can categorizeWe can categorize
Cyber Crime Into TwoCyber Crime Into Two
Categories:Categories:
1.1. The Computer as a target:-The Computer as a target:-
Using a Computer to attackUsing a Computer to attack
other computer.other computer.
e.g. Hacking, virus attack,e.g. Hacking, virus attack,
DOS attackDOS attack
2. The Computer as a2. The Computer as a
Weapon:- Using aWeapon:- Using a
computer to commit realcomputer to commit real
world crime, e.g. Cyberworld crime, e.g. Cyber
terrorism, Credit cardterrorism, Credit card
fraud, pornography .fraud, pornography .
8. Types of Cyber CrimeTypes of Cyber Crime
1. Hacking1. Hacking:-In simple words, hacking is an act:-In simple words, hacking is an act
committed by an intruder by accessing yourcommitted by an intruder by accessing your
computer system without your permission.computer system without your permission.
SQL Injections:SQL Injections: An SQL injection is aAn SQL injection is a
technique that allows hackers to play upon thetechnique that allows hackers to play upon the
security vulnerabilities of the software thatsecurity vulnerabilities of the software that
runs a web site.runs a web site.
9. Types of Cyber CrimeTypes of Cyber Crime
Theft of FTP Passwords:Theft of FTP Passwords: This is another veryThis is another very
common way to tamper with web sites.common way to tamper with web sites.
10. Types of Cyber CrimeTypes of Cyber Crime
Virus disseminationVirus dissemination:-:-
Viruses are computerViruses are computer
programs that attachprograms that attach
themselves to or infect athemselves to or infect a
system or files, andsystem or files, and
have a tendency tohave a tendency to
circulate to othercirculate to other
computers on a network.computers on a network.
11. Types of Cyber CrimeTypes of Cyber Crime
Child Pornography: The internet is being highly usedChild Pornography: The internet is being highly used
by it abusers to reach and abuse children sexually,by it abusers to reach and abuse children sexually,
Worldwide.Worldwide.
Cyber-bullying.Cyber-bullying.
Email spam and phishing.Email spam and phishing.
Identity theft.Identity theft.
Prohibited offensive and illegal content.Prohibited offensive and illegal content.
Online scams or fraud.Online scams or fraud.
Online trading issues.Online trading issues.
12. How we make secured ourHow we make secured our
computer or other devices fromcomputer or other devices from
Cyber Crime?Cyber Crime?
We need to keep our computer current with the latestWe need to keep our computer current with the latest
patches and updates.patches and updates.
We need to Make sure our computer is configuredWe need to Make sure our computer is configured
securely.securely.
Choose strong passwords and keep them safe.Choose strong passwords and keep them safe.
We need to protect our computer with securityWe need to protect our computer with security
software.software.
WE need to Protect our personal information.WE need to Protect our personal information.
Review bank and credit card statements regularly.Review bank and credit card statements regularly.
13. Combating computer crimeCombating computer crime
InvestigationInvestigation
&&
LegislationLegislation
AwarenessAwareness
Diffusion of cybercrimeDiffusion of cybercrime
PenaltiesPenalties
14. ConclusionConclusion
Cyber Crime is indeedCyber Crime is indeed
getting the recognitiongetting the recognition
deserves. However, it is notdeserves. However, it is not
going to rusticated thatgoing to rusticated that
easily. In fact, it is highlyeasily. In fact, it is highly
likely that cyber crime andlikely that cyber crime and
its hackers will continueits hackers will continue
developing and upgrading todeveloping and upgrading to
stay ahead of the law.stay ahead of the law.
So to make us safe ,we mustSo to make us safe ,we must
need cyber security.need cyber security.