Published on

  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. CYBER CRIME<br />MISS.JYOTI A. PATIL<br />BCA-I, ROLL No.16.<br /> DR.B.M.N college of home science, matunga.<br />
  2. 2. INTERNET<br />Parallel form of life and living.<br />Dependence & reliance of mankind on this machines.<br />Communication, net surfing, education, business, shopping , entertainment, etc.<br />
  3. 3. CYBER CRIME<br />Cyber crime - Criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It also refers to criminal exploitation of Internet. It includes-<br />Unauthorized access to computer systems,<br />Data alteration, <br />Data destruction, <br />Theft of intellectual property,etc.<br />
  4. 4. Computer crime encompasses a broad range of potentially illegal activities.<br />It can be divided into two broad activities:<br /> (1) Crimes that target computer networks or devices directly,<br />Eg.- Computer viruses, Denial of service attacks.<br /> (2) Crimes facilitated by computer networks or devices, the primary target of which is independent of computer network or device.<br />Eg. Cyber stalking, Fraud and identity theft, Phishing scams,etc.<br />
  5. 5. VARIANTS<br />Cyber stalking<br />Hacking<br />Phishing<br />Crosssite scripting<br />Vishing<br />Cyber Squatting<br />Bot Networks<br />
  6. 6. 1. Cyber Stalking<br />Cyber stalking is also called as Online harassment and Online abuse.<br />It is use of the Internet or other electronic means to stalk someone. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property.<br />
  7. 7. 2. Phishing<br />Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of financial institutions, requesting them to enter their username, password or other personal information to access their account for some reason.<br />
  8. 8. 3. Cross site scripting<br />Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users.<br />
  9. 9. 4. Hacking<br />Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 per cent increase this year.<br />
  10. 10. 5. Vishing<br />Vishing is the criminal practice of using social engineering and Voice over IP (VoIP) to gain access to private, personal and financial information from the public for the purpose of financial reward. The term is a combination of "voice" and phishing<br />
  11. 11. 6. Cyber Squatting<br />Cyber squatting is the act of registering a famous domain name and then selling it for a fortune. This is an issue that has not been tackled in IT act 2000.<br />
  12. 12. 7. Bot Networks<br />A cyber crime called 'Bot Networks', wherein spamsters and other perpetrators of cyber crimes remotely take control of computers without the users realizing it. It is increasing at an alarming rate.<br />Computers get linked to Bot Networks when users unknowingly download malicious codes such as Trojan horse sent as e-mail attachments. <br />
  13. 13. CYBER CRIME CASES<br />On 7th Feb,2000 Yahoo! Website was attacked. Yahoo was pinged at a rate of 1gb/sec.<br />In 26 March 1999, the Melissa worm infected a document on a victim's computer, then automatically sent that document and copy of the virus via e-mail to other people.<br />On 2nd March 2010, Spanish investigators busted 3 infection of over 13 million computers around the world. The "botnet" of infected computers included PCs inside more than half of the Fortune 1,000 companies and more than 40 major banks.<br />
  14. 14. Anti Cyber Crime Initiatives<br />Keep an electronic eye on the users of the various cyber cafes spread over the city.<br />Establish Computer Emergency Response Teams (CERTs)<br />To coordinate and respond during major security incidents/events.<br />Identify and address existing and potential threats and vulnerabilities in the system and coordinate with stakeholders to address threats.<br />
  15. 15. CONCLUSION<br />Net surfing by youngsters lures them into dangerous domain. <br />The need for a conscious effort to checkmate the undesirable fallout of youngsters accessing and using the Internet is of concern. <br />The print media has a duty to educate unwary parents and youngsters about the dangers inherent in treading dangerous areas in the cyber-world. <br />
  16. 16. * THANK YOU *<br />