History of cyber crime
Categories of cyber crime
Role of computer in crime
The internet in India is growing rapidly. It has
given rise to new opportunities in every field
we can think of – be it entertainment,
business, sports or education.
There are two sides to a coin. Internet also has
its own disadvantages. One of the major
disadvantages is Cyber crime – illegal
activity committed on the internet.
HISTORY OF CYBER CRIME
THE FIRST RECORDED CYBER CRIME IN THE 1820.
In 1820, Joseph-Marie Jacquard, a textile
manufacturer in France, produced the loom. This
device allowed the repetition of a series of steps in
the weaving of special fabrics. This resulted in a
fear amongst Jacquard's employees that their
traditional employment and livelihood were being
threatened. They committed acts of sabotage to
discourage Jacquard from further use of the new
technology. This is the first recorded cyber crime!
DEFINING CYBER CRIME
It’s an unlawful act wherein the computer is either
a tool or a target or both.
Acts that are punishable by the Information
Cyber space is a virtual space that has become as
important as real space for business, politics, and
CATEGORIES OF CIBER CRIME
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government.
ROLE OF COMPUTER IN CRIME
(teenage thrill-seekers to
(overloads e-mail servers or hack
web sites to send political message)
(writes viruses to that infect
(alternative to military attacks)
(attack systems & steal
password for financial gain)
(sensitive information is
obtained via computer
(who have potential to disrupt
government systems with
(attack by sovereigns --- Crime or
Declaration of war)
Frequently Used Cyber Crimes
Unauthorized access to computer
systems or networks.
Theft of information contained in
Denial of Service attack.
Virus / worm attacks
Internet time thefts
Theft of computer system
Physically damaging a computer
(A GROWING PROBLEM)
A deception designed to steal valuable
personal data, such as credit card
numbers, passwords, account data, or
GLOBAL PHISHING SURVEY 2012
Location: Korea, Republic Of
Images from Anti-Phishing Working Group’s Phishing Archive
USE STRONG PASSWORDS
SECURE YOUR COMPUTER
ACTIVATE YOUR FIREWALL
BLOCK SPYWARE ATTACKS
BE SOCIAL –MEDIA SAVVY
SECURE YOUR MOBILR DEVICES.
INSTALL LATEST OS.
SECURE WIRELESS NETWORK.
PROTECT YOUR E-IDENTITY
“BYTES ARE REPLACING BULLETS IN
THE CRIME WORLD”
India needs a good combination of laws
and technology, in harmony with the
laws of other countries and keeping in
mind common security standards.