Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber Crime

297 views

Published on

Cyber Crime

Published in: Engineering
  • Be the first to comment

  • Be the first to like this

Cyber Crime

  1. 1. CYBER CRIME D BY: NKUSH SALOURIA S/SL/14/1012 SUBMITTED TO: Lect. ASHISH GIRDHAR
  2. 2. DEFINITION  Harmful acts committed from or against a computer or network.  Unlawful acts wherein the computer is either a tool or target or both  Online or Internet-based illegal acts
  3. 3. TYPES OF CYBER CRIME  HACKING  VIRUS ATTACKS  CYBER THEFT  SOFTWARE PIRACY  E-MAIL BOMBS  CYBER TERRORISM  PASSWORD TRAFFICKING  IDENTITY THEFT  PHISHING  CREDIT CARD FRAUD
  4. 4.  Hacking is commonly referred as unauthorized access to computer systems or network without the permission of the computer owner/user  Hackers write or use ready-made computer programs to attack the target computer  Computer hacking includes breaking into a computer with the intent to steal, damage or modify the data within the system.
  5. 5. VIRUS ATTACKS  Malicious software that attaches itself to other software  Circulate themselves to other files and to other computers on a network  Affect the data on a computer, either by altering or deleting it
  6. 6. CYBER THEFT In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed  Criminals makes such program that deducts small amount like Rs. 2.50 per month from the account of all the customer of the bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount
  7. 7. SOFTWARE PIRACY  Theft of software through the illegal copying of genuine programs and distribution of products intended to pass for the original  Copying and using computer programs in violation of copyrights and trade secret laws  Retail revenue losses worldwide are ever increasing due to this crime
  8. 8. E-MAIL BOMBS  It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing.  E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address
  9. 9. CYBER TERRORISM  It is the actual use of computers and Internet technology to cause intimidation and destruction  Uses the Internet or network to destroy computers for political reasons  Cyber terrorist could hack into a pharmaceutical company’s computers, changing the formula of some essential medication and causing thousands to die.
  10. 10. PASSWORD TRAFFICKING  Misuse of other people’s passwords.  Break a company’s password and misuse the password or sale that password to another company or an individual.
  11. 11. IDENTITY THEFT  Identity theft occurs when somebody steals a personal name and other personal information for fraudulent purposes  Identity theft is a form of identity crime where somebody uses a false identity to commit a crime  It involves stealing victims’ personal information and credentials, often to make purchases
  12. 12. Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details etc.) by masquerading as a trusted entity.
  13. 13. CREDIT CARD FRAUD  If electronic transaction are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
  14. 14. Safety Tips to Cyber Crime  Use antivirus software’s.  Insert firewalls.  Maintain backup.  Check security settings.  Never give your full name or e-mail address to strangers.  Don't respond to harassing or negative messages (flames).  Get out of uncomfortable or hostile situations quickly .  Save offending messages.  Learn more about Internet privacy.
  15. 15. Thank You

×