4. INTRODUCTION
Cyber crime is a term used broadly to
describe activity in which computers or
networks are a tool, a target, or a place
of criminal activity.
The first recorded cyber crime took
place in the year 1820 by Joseph-Marie
Jacquard
5. WHAT IS CYBER CRIME ?
It is a criminal activity committed on the internet.
This is a broad term that describes everything from
electronic cracking to denial of service attacks that
cause electronic commerce sites to lose money.
Cyber crime is just a combination of crime and
computer.
Any offence or crime in which a computer is used is
a cyber crime.
6. VARIOUS TYPES OF CYBERCRIME
HACKING PHISHING
DENIAL OF SERVICE ATTACK SPOOFING
VIRUS DISSEMINATION CYBER STALKING
SOFTWARE PIRACY CYBER DEFAMATION
PORNOGRAPHY THREATENING
IRC Crime SALAMI ATTACK
CREDIT CARD FRAUD NET EXTORTION
7. HACKING
The act of gaining unauthorized access to a computer system or
network (e.g., fraud, terrorism, etc.)
8. DENIAL OF SERVICE ATTACK:-
This is an act by the criminal, who floods the band width of
the victim’s network or fills his e-mail box with spam mail
depriving him of the services he is entitled to access or
provide.
9. VIRUS DISSEMINATION
Malicious software that attaches itself to other software.
(virus, worms, Trojan Horse, Time bomb, Logic
Bomb, Rabbit and Bacterium are the malicious soft wares)
10. SOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs
IRC CRIME
Internet Relay Chat (IRC) servers have chat rooms in which
people from anywhere the world can come together and chat
with each other
CREDIT CARD FRAUD:-
You simply have to type credit card number into www page off
the vendor for online transaction.
If electronic transactions are not secured the credit card
numbers can be stolen by the hackers who can
misuse this card by impersonating the credit card owner.
11. NET EXTORTION:-
Copying the company’s confidential data in order to extort
said company for huge amount.
SPOOFING
Getting one computer on a network to pretend to have the
identity of another computer, usually one with special access
privileges, so as to obtain access to the other computers on
the network.
12. PHISHING
It is technique of pulling out confidential
information from the bank/financial
institutional account holders by deceptive
means
13. CYBER STALKING
It refers to the use of the Internet, e-mail, or other
telecommunication technologies to harass or stalk another
person.
CYBER DEFAMATION:-
The criminals send e-mail containing defamatory
matters to all concerned of the victim or post the
defamatory matters on a website.
(divorced husband against wife)
14. THREATENING
The Criminal sends threatening email or comes
in contact in chat rooms with victim. (Any one
disgruntled may do this against boss, friend or
official
15. SALAMI ATTACK
In such crime criminal makes insignificant changes in such a
manner that such changes
would go unnoticed. Criminal makes such program that
deducts small amount like 2.50 per month from the account
of all the customer of the Bank and deposit the same in his
account. In this case no account holder will approach the
bank for such small amount but criminal gains huge amount.
16. WHO ARE CYBER CRIMINALS ??
Kids(age group 9-16)
Organized hackers
Disgruntled employees
Professional hackers
17. CONCLUSION:-
Technology is always a double-edged sword and can be used
for both the purposes – good or bad.
Hence, it should be the persistent efforts of rulers and law
makers to ensure that technology grows in a healthy manner
and is used for legal and ethical
business growth and not for committing crimes.