2. Outline
• Introduction to Cyber Crime
• Definition
• History of Cyber Crime
• Types of Cyber Crime
• Cyber Crime and Information Security
WWW.EDTECHNOLOGY.IN
3. Learning Outcome:
After successful completion of this course, student will be able to
• To identify and describe the major types of cybercrime.
WWW.EDTECHNOLOGY.IN
4. Cyber Crime :
• Computer crime or Cyber Crime is criminal activity that involves
unlawful access to computer systems.
• Cyber crime is an illegal activity committed on the internet.
WWW.EDTECHNOLOGY.IN
5. Definition:
Defining "Cyber Crimes"
• The term "cyber-crimes" is not defined in any statute or rulebook. The
word "cyber" is slang for anything relating to computers, information
technology, internet and virtual reality. Therefore, it stands to reason
that "cyber-crimes" are offences relating to computers, information
technology, internet and virtual reality.
• Crime committed using a computer and the internet to steal
data or information.
• Example:
• Stealing credit card information
• Breaking into government website
WWW.EDTECHNOLOGY.IN
6. History and Where it started
• The exact origin of cyber crime, the very first instance in which
someone committed a crime across a computer network, is
impossible to know.
• First case of use of computer for theft was in 1973, A teller at a
local New York bank used a computer to embezzle over $2
million dollars.
• The first spam email took place in the year 1978.
• The first virus was installed on Apple Computer in the year
1982.
WWW.EDTECHNOLOGY.IN
7. History and Where it started
• In 1981, Ian Murphy, known as Captain Zap to his fans, was
the first person convicted of a cyber crime.
• He hacked into the AT&T network and changed the internal
clock to charge off-hours rates at peak times.
• He received 1,000 hours of community service and 2.5 years of
probation, a mere slap on the wrist compared to today’s
penalties, and was the inspiration for the movie Sneakers.
WWW.EDTECHNOLOGY.IN
9. Cyber Crime and Information Security
• Information security is a potential activity by which information
and other communication systems are protected from and/or
defended against the unauthorized use or modification or
exploitation or even theft.
WWW.EDTECHNOLOGY.IN