SlideShare a Scribd company logo
1 of 16
The Genesis of Cyber
Crimes
Dr Sapna Deo
“Unlawful acts wherein the
computer is either a tool or
target or both
Tool Target
•CYBER DEFAMATION
•FORGERY
•ONLINE GAMBLING
•INTERNET TIME THEFT
• FINANCIAL CRIMES
•INTELLECTUAL PROPERTY
CRIMES
•SALE OF ILLEGAL ARTICLES
TROJANS AND KEYLOGGERS
•EMAIL BOMBING
•DENIAL OF SERVICE ATTACK
•WEB DEFACEMENT
•SALAMI ATTACK
•LOGIC BOMBS
•CYBER STALKING
•EMAIL SPOOFING
Dr Sapna Deo
the Internet
e-mail, or
other electronic
communications devices
to stalk another person
CYBER STALKING
Cyber stalking refers to the use of
Dr Sapna Deo
• Stalking generally involves
harassing or threatening
behaviour that an
• individual engages in
repeatedly, such as
following a person,
appearing
• at a person's home or
• place of business,
• making harassing phone
calls,
• leaving written messages or
objects, or vandalizing a
person's property. Dr Sapna Deo
• Cyberstalking does not have
any one definition but it can
be defined to mean
threatening, unwarranted
behaviour or advances
directed by one net user to
another user using the
medium of Internet and other
forms of online
communication
Dr Sapna Deo
Cyber stalking is a new form of computer related
crime occurring in our society. Cyber stalking is
when a person is followed and pursued online.
Their privacy is invaded, their every move
watched.
It is a form of harassment that can disrupt the
life of the victim and leave them feeling very
afraid and threatened.
Cyber Stalking usually occurs with women, who
are stalked by men, or children who are stalked
by adult predators or pedophiles. Not all stalking
is done by total strangers.
Cyber stalkers need not have to leave their home
to find, or harass their targets, and has no fear of
physical violence since they believe that they
cannot be physically touched in cyberspace
Dr Sapna Deo
An honours graduate from the University of San
Diego in USA terrorized five female university
students over the Internet for more than a
year.
The victims received hundreds of violent and
threatening e-mails,
sometimes receiving four or five messages a day.
The student, who pleaded guilty, told the police
that he had committed the crimes because he
thought the women were laughing at him and
causing others to ridicule him.
In reality, the victims had never met him.
Dr Sapna Deo
EMAIL SPOOFING
A spoofed email is one that appears to
originate from one source but
actually has been sent from another source:
pooja@yahoo.com
Her ex-boyfriend, Sameer spoofs her e-
mail and sends obscene
messages to all her acquaintances. Since
the e-mails appear to have
originated from Pooja, her friends may take
offence and relationships may be spoiled
for life
Dr Sapna Deo
Virus / Worm Attacks
• Computer viruses are small software programs
• A virus might corrupt or delete data on the victim’s
computer
• Use the victim’s e-mail program to spread itself to
other computers
• Even erase everything on the victim’s hard disk.
• Viruses are most easily spread by attachments in e-
mail messages or instant messaging messages.
• Attachments of funny images, greeting cards, or
audio and video files.
Dr Sapna Deo
• Viruses can also spread through downloads on
the Internet.
• They can be hidden in illicit software or other
files or programs.
• Worms
• Worms, unlike viruses do not need the host to
attach themselves to.
They merely make functional copies of
themselves and do this repeatedly till they eat
up all the available space on a computer’s
memory
Dr Sapna Deo
List of Ten of the Worst
Computer Viruses
1. LoveLetter :targeted users through email, chat clients and peer to peer networks.
2. Melissa:. inserted Simpons's quotes into documents and corrupted or deleted Windows
system files.
3. Chernobyl Virus: It could remain undetected in your computer's memory until the
damage was done, s the fact that once it reached its trigger date, it erased all files on the
user's hard drive and overwrote the system's BIOS.
4. Slammer: didn't affect personal computers, but did wreak havoc with servers. Slammer
overloaded servers and routers, causing outages. Within ten minutes, Slammer had
already infected 75,000 computers.
5. MSBlast:is worm displayed a message on infected machines stating the computer would
shut down in after a few minute
6. MyDoom : is worm displayed a message on infected machines stating the computer
would shut down in after a few minute
7. Sasser:The Remote Procedure Call vulnerability in Windows 2000 and Windows XP was
Sasser's target.
8. Sobig.F:Internet gateways and email servers to crash
9. Code Red:Code Red attacked computers running IIS, or Internet Information Server.
10. Conficker:allows its creators to install software on infected computers
Dr Sapna Deo
Data Diddling
• illegal or unauthorized data alteration
• These changes can occur before and during
• data input or before output.
• Data diddling cases have affected
• banks, payrolls, inventory records, credit
records, school transcripts and
• virtually all other forms of data processing
known. Dr Sapna Deo
The NDMC Electricity Billing
Fraud Case
• He misappropriated huge amount of funds by
manipulating data files to show less receipt and
bank remittance.
Dr Sapna Deo
Keyloggers
• are regularly used were to log all the strokes a
victim makes on the keyboard. This assumes
sinister proportions,
• if a key logger is installed on a computer which is
regularly used for online banking and other
financial transactions. Key-loggers are most
commonly found in public computers such as those
in cyber cafes, hotels etc. Unsuspecting victims
also end up downloading spyware when they click
on “friendly” offers for free software.Dr Sapna Deo
Dr Sapna Deo
in next slides
THANK
YOU
Dr Sapna Deo

More Related Content

What's hot

Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavierMo Han
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...ABHAY PATHAK
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 

What's hot (19)

Computer crime
Computer crimeComputer crime
Computer crime
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Phishing
PhishingPhishing
Phishing
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

Similar to PART 2 TYPES OF CYBER CRIMES

Data Processing.pptx
Data Processing.pptxData Processing.pptx
Data Processing.pptxStephenJude3
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
GE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxGE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxMarlynLiagao
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxFroilan Cantillo
 
Dangers in the Internet
Dangers in the InternetDangers in the Internet
Dangers in the InternetTseAnRS
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptxGigibella4
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 

Similar to PART 2 TYPES OF CYBER CRIMES (20)

Types of cyber crimes
Types of cyber crimesTypes of cyber crimes
Types of cyber crimes
 
Cyber security
Cyber securityCyber security
Cyber security
 
Data Processing.pptx
Data Processing.pptxData Processing.pptx
Data Processing.pptx
 
Online reputation
Online reputationOnline reputation
Online reputation
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Online reputation
Online reputationOnline reputation
Online reputation
 
GE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxGE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptx
 
Untitled Presentation.pdf
Untitled Presentation.pdfUntitled Presentation.pdf
Untitled Presentation.pdf
 
WEB SECURITY.pdf
WEB SECURITY.pdfWEB SECURITY.pdf
WEB SECURITY.pdf
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
 
Dangers in the Internet
Dangers in the InternetDangers in the Internet
Dangers in the Internet
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 

Recently uploaded

如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 

Recently uploaded (20)

如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 

PART 2 TYPES OF CYBER CRIMES

  • 1. The Genesis of Cyber Crimes Dr Sapna Deo
  • 2. “Unlawful acts wherein the computer is either a tool or target or both Tool Target •CYBER DEFAMATION •FORGERY •ONLINE GAMBLING •INTERNET TIME THEFT • FINANCIAL CRIMES •INTELLECTUAL PROPERTY CRIMES •SALE OF ILLEGAL ARTICLES TROJANS AND KEYLOGGERS •EMAIL BOMBING •DENIAL OF SERVICE ATTACK •WEB DEFACEMENT •SALAMI ATTACK •LOGIC BOMBS •CYBER STALKING •EMAIL SPOOFING Dr Sapna Deo
  • 3. the Internet e-mail, or other electronic communications devices to stalk another person CYBER STALKING Cyber stalking refers to the use of Dr Sapna Deo
  • 4. • Stalking generally involves harassing or threatening behaviour that an • individual engages in repeatedly, such as following a person, appearing • at a person's home or • place of business, • making harassing phone calls, • leaving written messages or objects, or vandalizing a person's property. Dr Sapna Deo
  • 5. • Cyberstalking does not have any one definition but it can be defined to mean threatening, unwarranted behaviour or advances directed by one net user to another user using the medium of Internet and other forms of online communication Dr Sapna Deo
  • 6. Cyber stalking is a new form of computer related crime occurring in our society. Cyber stalking is when a person is followed and pursued online. Their privacy is invaded, their every move watched. It is a form of harassment that can disrupt the life of the victim and leave them feeling very afraid and threatened. Cyber Stalking usually occurs with women, who are stalked by men, or children who are stalked by adult predators or pedophiles. Not all stalking is done by total strangers. Cyber stalkers need not have to leave their home to find, or harass their targets, and has no fear of physical violence since they believe that they cannot be physically touched in cyberspace Dr Sapna Deo
  • 7. An honours graduate from the University of San Diego in USA terrorized five female university students over the Internet for more than a year. The victims received hundreds of violent and threatening e-mails, sometimes receiving four or five messages a day. The student, who pleaded guilty, told the police that he had committed the crimes because he thought the women were laughing at him and causing others to ridicule him. In reality, the victims had never met him. Dr Sapna Deo
  • 8. EMAIL SPOOFING A spoofed email is one that appears to originate from one source but actually has been sent from another source: pooja@yahoo.com Her ex-boyfriend, Sameer spoofs her e- mail and sends obscene messages to all her acquaintances. Since the e-mails appear to have originated from Pooja, her friends may take offence and relationships may be spoiled for life Dr Sapna Deo
  • 9. Virus / Worm Attacks • Computer viruses are small software programs • A virus might corrupt or delete data on the victim’s computer • Use the victim’s e-mail program to spread itself to other computers • Even erase everything on the victim’s hard disk. • Viruses are most easily spread by attachments in e- mail messages or instant messaging messages. • Attachments of funny images, greeting cards, or audio and video files. Dr Sapna Deo
  • 10. • Viruses can also spread through downloads on the Internet. • They can be hidden in illicit software or other files or programs. • Worms • Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer’s memory Dr Sapna Deo
  • 11. List of Ten of the Worst Computer Viruses 1. LoveLetter :targeted users through email, chat clients and peer to peer networks. 2. Melissa:. inserted Simpons's quotes into documents and corrupted or deleted Windows system files. 3. Chernobyl Virus: It could remain undetected in your computer's memory until the damage was done, s the fact that once it reached its trigger date, it erased all files on the user's hard drive and overwrote the system's BIOS. 4. Slammer: didn't affect personal computers, but did wreak havoc with servers. Slammer overloaded servers and routers, causing outages. Within ten minutes, Slammer had already infected 75,000 computers. 5. MSBlast:is worm displayed a message on infected machines stating the computer would shut down in after a few minute 6. MyDoom : is worm displayed a message on infected machines stating the computer would shut down in after a few minute 7. Sasser:The Remote Procedure Call vulnerability in Windows 2000 and Windows XP was Sasser's target. 8. Sobig.F:Internet gateways and email servers to crash 9. Code Red:Code Red attacked computers running IIS, or Internet Information Server. 10. Conficker:allows its creators to install software on infected computers Dr Sapna Deo
  • 12. Data Diddling • illegal or unauthorized data alteration • These changes can occur before and during • data input or before output. • Data diddling cases have affected • banks, payrolls, inventory records, credit records, school transcripts and • virtually all other forms of data processing known. Dr Sapna Deo
  • 13. The NDMC Electricity Billing Fraud Case • He misappropriated huge amount of funds by manipulating data files to show less receipt and bank remittance. Dr Sapna Deo
  • 14. Keyloggers • are regularly used were to log all the strokes a victim makes on the keyboard. This assumes sinister proportions, • if a key logger is installed on a computer which is regularly used for online banking and other financial transactions. Key-loggers are most commonly found in public computers such as those in cyber cafes, hotels etc. Unsuspecting victims also end up downloading spyware when they click on “friendly” offers for free software.Dr Sapna Deo
  • 15. Dr Sapna Deo in next slides