NAME: ABHISHEK VISWAM

CLASS: M.B.A.
SECTION: A
REG.NO: AC12MBF002
INSTITUTION: ADHIYAMAAN COLLEGE OF ENGINEERING,HOSUR
TO...
CYBER CRIME

CYBER CRIMES are defined as: "Offences that are committed against
individuals or groups of individuals with a...
DETAILS

Cyber crime encompasses a broad range of activities.
Generally, however, it may be divided into two categories: (...
Denial-of-service attacks
a denial-of-service attack (DoS attack) or distributed denial-ofservice attack (DDoS attack) is ...
MALWARE
Malware includes computer viruses, worms, trojan horses, spyware, adware,
and other malicious programs.
Malware is...
FRAUD AND IDENTITY THEFT
Computer fraud is any dishonest misrepresentation of fact intended to let another to
do or refrai...
Spam, or the unsolicited sending of bulk email for commercial purposes, is
unlawful in some jurisdictions. While anti-spam...
HARASSMENT

harassment directs obscenities and derogatory comments at specific
individuals focusing for example on gender,...
CYBER TERRORISM
Cyber terrorism in general, can be defined as an act of terrorism committed
through the use of cyberspace ...
As well there are also hacking activities directed towards individuals, families,
organized by groups within networks, ten...
According to the Federal Bureau of Investigation, cyberextortionists
are increasingly attacking corporate websites and net...
THANK YOU…
HTTPS://WWW.FACEBOOK.COM/ABHISHEK.VISWAM
Upcoming SlideShare
Loading in …5
×

Cyber crime (2)

471 views

Published on

description abt cyber crime

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
471
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
16
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cyber crime (2)

  1. 1. NAME: ABHISHEK VISWAM CLASS: M.B.A. SECTION: A REG.NO: AC12MBF002 INSTITUTION: ADHIYAMAAN COLLEGE OF ENGINEERING,HOSUR TOPIC: CYBER CRIME
  2. 2. CYBER CRIME CYBER CRIMES are defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". cyber crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
  3. 3. DETAILS Cyber crime encompasses a broad range of activities. Generally, however, it may be divided into two categories: (1) crimes that target computers directly; (2) crimes facilitated by computer networks or devices. Crimes that primarily target computer networks or devices include: Computer viruses A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
  4. 4. Denial-of-service attacks a denial-of-service attack (DoS attack) or distributed denial-ofservice attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a Dos attack may vary, it generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. The term is generally used relating to computer networks, but is not limited to this field; for example, it is also used in reference to CPU resource management.
  5. 5. MALWARE Malware includes computer viruses, worms, trojan horses, spyware, adware, and other malicious programs. Malware is a software that has a legitimate purpose but contains harmful bugs that were not corrected before release. Crimes that use computer networks or devices to advance other ends include: Cyberstalking Cyberstalking is a criminal offense that comes into play under state anti-stalking laws, slander laws, and harassment laws. A cyberstalking conviction can result in a restraining order, probation, or even criminal penalties against the assailant, including jail.
  6. 6. FRAUD AND IDENTITY THEFT Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Information Warfare The term Information Warfare is primarily an American concept involving the use and management of information technology in pursuit of a competitive advantage over an opponent. Phishing scams Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication
  7. 7. Spam, or the unsolicited sending of bulk email for commercial purposes, is unlawful in some jurisdictions. While anti-spam laws are relatively new, limits on unsolicited electronic communications have existed for some time. Obscene or offensive content The content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons. The extent to which these communications are unlawful varies greatly between countries, and even within nations. It is a sensitive area in which the courts can become involved in arbitrating between groups with strong beliefs.
  8. 8. HARASSMENT harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms, through newsgroups, and by sending hate e-mail to interested parties (see cyber bullying, cyber stalking, hate crime, Online predator, and stalking). Any comment that may be found derogatory or offensive is considered harassment.
  9. 9. CYBER TERRORISM Cyber terrorism in general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources (Parker 1983). As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be considered cyber terrorism.
  10. 10. As well there are also hacking activities directed towards individuals, families, organized by groups within networks, tending to cause fear among people, demonstrate power, collecting information relevant for ruining peoples' lives, robberies, blackmailing etc. Cyberextortion is a form of cyberterrorism in which a website, e-mail server, or computer system is subjected to repeated denial of service or other attacks by malicious hackers, who demand money in return for promising to stop the attacks.
  11. 11. According to the Federal Bureau of Investigation, cyberextortionists are increasingly attacking corporate websites and networks, crippling their ability to operate and demanding payments to restore their service. More than 20 cases are reported each month to the FBI and many go unreported in order to keep the victim's name out of the public domain. Perpetrators typically use a distributed denial-of-service attack.
  12. 12. THANK YOU… HTTPS://WWW.FACEBOOK.COM/ABHISHEK.VISWAM

×