SlideShare a Scribd company logo
1 of 17
Business I Environment I Society - Rajesh K Satpathy
Social Issue
# 7
Cyber Crime
Cyber Crime
Definition:
Cyber Crime encompasses any criminal act dealing with computers
and networks (called hacking). Additionally, cyber crime also
includes traditional crimes conducted through the Internet.
For example: Hate crimes, Internet fraud, identity theft, and credit
card account thefts are considered to be cyber crimes when the
illegal activities are committed through the use of a computer and
the Internet.
The latest Definition…
Cybercrimes as: "Offences that are committed against individuals
or groups of individuals with a criminal motive to intentionally
harm the reputation of the victim or cause physical or mental
harm, or loss, to the victim directly or indirectly, using modern
telecommunication networks such as Internet (Chat rooms, emails,
notice boards and groups) and mobile phones (SMS/MMS)”.
Such crimes may threaten a nation’s security and the financial
health.Issues surrounding these types of crimes have become high-
profile, particularly those surrounding hacking, copyright
infringement, child pornography, and child grooming. There are
also problems of privacy when confidential information is
intercepted or disclosed, lawfully or otherwise.
- Dr. Debarati Halder and Dr. K. Jaishankar ( 2011)
What is Child Grooming ?
Child grooming is befriending and establishing an emotional
connection with a child, and sometimes the family, to lower the
child's inhibitions for child sexual abuse. It lures minors into
trafficking of children, illicit businesses such as child prostitution,
or the production of child pornography.
Cyber Crime
The rapid growth of the internet, smart phone and computer
technology over the past few years has led to the growth in new
forms of crime-dubbed cyber crime- throughout the world. Based
on statistics on the various forms of cyber crime and other
evidence which in form of cyber crime pose the most serious threat
to individuals and business today.
Cyber crime is the new breed of crime, which is either perpetrated
using computers, or is otherwise related to them. Its origin can be
traced to the growing dependence on computers in modern life.
Cyber crime has assumed sinister implications today as everything
from microwave ovens and refrigerators to nuclear power plants is
being run on computers.
Cyber Crime
Today, the world is moving towards a point where everything from
banking stock exchanges, are traffic control, telephones to electric
power, health care, welfare and education depends on software.
This exponential growth, and the increase in the capacity and
accessibility of computers coupled with the decrease in cost, has
brought about revolutionary changes in every aspect of human
civilization, including crime.
Specific forms Cyber Crime…
1. Data Diddling:
Data diddling is one of the most common ways to perform a
computer crime. It involves altering key production data on the
computer system in some unauthorized way. Data diddlers often
are found changing grades in university files and falsifying input
records on bank transactions.
2. The Trojan Horse:
The Trojan horse is a procedure for adding concealed instructions
to a computer program so that it will still work but will also perform
unauthorized duties. For example, a bank worker can cleverly alter
a program that contains thousands of lines of code by adding a
small “patch” that instructs the program not to withdraw money
from a certain account !!!
Specific forms Cyber Crime…
3. Salami Shaving:
Salami shaving involves altering programs so that many small
rupees amounts- say, a few paise worth of interest payments/
withdrawals - are shaved from a large number of selected
transactions or accounts and deposited in another account.
The victims of a salami-shaving scheme generally are unaware that
their funds have been tapped, because the amount taken from
each individual is trivial. The recipient of the salami shaving,
however, benefits from the aggregation of these small amounts,
often substantially.
Specific forms Cyber Crime…
4.Super Zapping:
Super zapping is a technique made possible by a special program
available on most computer systems - a program that bypasses all
system controls when the computer crashes and cannot be
restarted with normal recovery procedures.
This program, in effect, is a “master key” that can provide access to
any part of the system. The super zap program is a highly privileged
“disaster aid” that very few computer system professionals are
authorized to use. In the wrong hands, it can be used to perform
almost any unauthorized task.
Specific forms Cyber Crime…
5.Trapdoors:
Trapdoors are diagnostic tools, used in the development of systems
programs, that enable programmers to gain access to various parts
of the computer system. Before the programs are marketed, these
tools are supposed to be removed.
Occasionally, however, some blocks of diagnostic code are
overlooked. Thus, a person using the associated systems program
may get unauthorized views of other parts of the computer system.
Classification
Fraud and financial crimes…
Computer fraud is any dishonest misrepresentation of fact
intended to let another to do or refrain from doing something
which causes loss. In this context, the fraud will result in obtaining
a benefit by altering in an unauthorized way.
This requires little technical expertise and is common form of theft
by employees altering the data before entry or entering false data,
or by entering unauthorized instructions or using unauthorized
processes.
Classification
Fraud and financial crimes…
Altering or deleting stored data:
Altering, destroying, suppressing, or stealing output, usually to
conceal unauthorized transactions. This is difficult to detect.
Other forms of fraud may be facilitated using computer systems,
including bank fraud, carding, identity theft, extortion, and theft of
classified information.
A variety of internet scams target consumers and businesses.
Classification
Cyber terrorism:
Government officials and Information Technology security
specialists have documented a significant increase in Internet
problems and server scans since early 2001. But there is a growing
concern among government officials that such intrusions are part
of an organized effort by cyber terrorists, foreign intelligence
services, or other groups to map potential security holes in critical
systems.
A cyber terrorist is someone who intimidates or coerces a
government or organization to advance his or her political or social
objectives by launching a computer-based attack against
computers, networks, or the information stored on them.
Classification
Cyber-extortion:
Cyber-extortion occurs when a website, e-mail server, or computer
system is subjected to or threatened with repeated denial of
service or other attacks by malicious hackers. These hackers
demand money in return for promising to stop the attacks and to
offer "protection".
According to the Federal Bureau of Investigation, cyber
extortionists are increasingly attacking corporate websites and
networks, crippling their ability to operate and demanding
payments to restore their service.
Classification
Obscene or offensive content:
The content of websites and other electronic communications may
be distasteful, obscene or offensive for a variety of reasons. In
some instances these communications may be legal !!!
The extent to which these communications are unlawful varies
greatly between countries, and even within nations. It is a sensitive
area in which the courts can become involved in arbitrating
between groups with strong beliefs !!!
Classification
Harassment:
Whereas content may be offensive in a non-specific way,
harassment directs obscenities and derogatory comments at
specific individuals focusing for example on gender, race, religion
and nationality. This often occurs in chat rooms, through
newsgroups, and by sending hate e-mail to interested parties.

More Related Content

What's hot

Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessJohann Lo
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Name parul
Name parulName parul
Name parulParul231
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Sooraj Maurya
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in IraqAyub Nuri
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.pptshaks9151
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiKnowledge Group
 

What's hot (20)

Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Name parul
Name parulName parul
Name parul
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber security
Cyber security Cyber security
Cyber security
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 

Viewers also liked

Viewers also liked (18)

18 cb perception 2015
18 cb perception 201518 cb perception 2015
18 cb perception 2015
 
26 business i environment i society mba 2016
26 business i environment i society mba 201626 business i environment i society mba 2016
26 business i environment i society mba 2016
 
11 business i environment i society mba 2016
11 business i environment i society mba 201611 business i environment i society mba 2016
11 business i environment i society mba 2016
 
21 cb learning 2015
21 cb learning 201521 cb learning 2015
21 cb learning 2015
 
Osm cooperatives mnc 2
Osm cooperatives mnc 2Osm cooperatives mnc 2
Osm cooperatives mnc 2
 
17 a cb personality theory 2015
17 a cb personality theory 201517 a cb personality theory 2015
17 a cb personality theory 2015
 
29 business i environment i society mba 2016
29 business i environment i society mba 201629 business i environment i society mba 2016
29 business i environment i society mba 2016
 
8 psychological fields 2015
8 psychological fields 20158 psychological fields 2015
8 psychological fields 2015
 
10 business i environment i society mba 2016
10 business i environment i society mba 201610 business i environment i society mba 2016
10 business i environment i society mba 2016
 
7 business i environment i society mba 2016
7 business i environment i society mba 20167 business i environment i society mba 2016
7 business i environment i society mba 2016
 
11 cb consumer decision making 2015
11 cb consumer decision making 201511 cb consumer decision making 2015
11 cb consumer decision making 2015
 
24 cb culture 2015
24 cb culture 201524 cb culture 2015
24 cb culture 2015
 
2 business i environment i society mba 2016
2 business i environment i society mba 20162 business i environment i society mba 2016
2 business i environment i society mba 2016
 
19 cb attitude 2015
19 cb attitude 201519 cb attitude 2015
19 cb attitude 2015
 
6 business i environment i society mba 2016
6 business i environment i society mba 20166 business i environment i society mba 2016
6 business i environment i society mba 2016
 
8 business i environment i society mba 2016
8 business i environment i society mba 20168 business i environment i society mba 2016
8 business i environment i society mba 2016
 
32 business i environment i society mba 2016
32 business i environment i society mba 201632 business i environment i society mba 2016
32 business i environment i society mba 2016
 
27 business i environment i society mba 2016
27 business i environment i society mba 201627 business i environment i society mba 2016
27 business i environment i society mba 2016
 

Similar to 12 c business i environment i society mba 2016

Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
Lesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxLesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxadnis1
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 

Similar to 12 c business i environment i society mba 2016 (20)

Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Lesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxLesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptx
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

More from Rajesh Satpathy, Regional College of Management (RCM), Bhubaneswar

More from Rajesh Satpathy, Regional College of Management (RCM), Bhubaneswar (20)

19 Strategic Product Management - Strategy making & New Product Development (...
19 Strategic Product Management - Strategy making & New Product Development (...19 Strategic Product Management - Strategy making & New Product Development (...
19 Strategic Product Management - Strategy making & New Product Development (...
 
18 Strategic Product Management - Strategies for Promoting a New Product or ...
18 Strategic Product Management - Strategies for Promoting  a New Product or ...18 Strategic Product Management - Strategies for Promoting  a New Product or ...
18 Strategic Product Management - Strategies for Promoting a New Product or ...
 
17 Strategic Product Management - Strategy Making & Strategic Alternatives
17 Strategic Product Management - Strategy Making & Strategic Alternatives17 Strategic Product Management - Strategy Making & Strategic Alternatives
17 Strategic Product Management - Strategy Making & Strategic Alternatives
 
16 Strategic Product Management - Element of Product Strategy
16 Strategic Product Management -  Element of Product Strategy16 Strategic Product Management -  Element of Product Strategy
16 Strategic Product Management - Element of Product Strategy
 
15 Strategic Product Management - Exploiting Product Life Cycle (PLC)
15 Strategic Product Management - Exploiting Product Life Cycle (PLC)15 Strategic Product Management - Exploiting Product Life Cycle (PLC)
15 Strategic Product Management - Exploiting Product Life Cycle (PLC)
 
14 Strategic Product Management - Arthur D Little Strategic Condition Matrix
14 Strategic Product Management - Arthur D Little Strategic Condition Matrix14 Strategic Product Management - Arthur D Little Strategic Condition Matrix
14 Strategic Product Management - Arthur D Little Strategic Condition Matrix
 
12A Strategic Product Management - Shell's Directional Policy Matrix
12A Strategic Product Management - Shell's Directional Policy Matrix12A Strategic Product Management - Shell's Directional Policy Matrix
12A Strategic Product Management - Shell's Directional Policy Matrix
 
12 Strategic Product Management - GE-McKinsey Matrix
12 Strategic Product Management -  GE-McKinsey Matrix12 Strategic Product Management -  GE-McKinsey Matrix
12 Strategic Product Management - GE-McKinsey Matrix
 
11 Strategic Product Management - BCG Matrix
11 Strategic Product Management -  BCG Matrix11 Strategic Product Management -  BCG Matrix
11 Strategic Product Management - BCG Matrix
 
10 Strategic Product Management - Market Potential
10 Strategic Product Management - Market Potential10 Strategic Product Management - Market Potential
10 Strategic Product Management - Market Potential
 
9 Strategic Product Management - 7 O’s framework
9 Strategic Product Management - 7 O’s framework9 Strategic Product Management - 7 O’s framework
9 Strategic Product Management - 7 O’s framework
 
8C Strategic Product Management - Competitors Present & Future Objectives
8C Strategic Product Management - Competitors Present & Future Objectives8C Strategic Product Management - Competitors Present & Future Objectives
8C Strategic Product Management - Competitors Present & Future Objectives
 
8B Strategic Product Management - Competitors Present & Future Objectives
8B Strategic Product Management - Competitors Present & Future Objectives8B Strategic Product Management - Competitors Present & Future Objectives
8B Strategic Product Management - Competitors Present & Future Objectives
 
8A Strategic Product Management - Competitors Present & Future Objectives
8A Strategic Product Management - Competitors Present & Future Objectives8A Strategic Product Management - Competitors Present & Future Objectives
8A Strategic Product Management - Competitors Present & Future Objectives
 
7 Strategic Product Management - Product Category Analysis
7 Strategic Product Management - Product Category Analysis7 Strategic Product Management - Product Category Analysis
7 Strategic Product Management - Product Category Analysis
 
6 Strategic Product Management - Marketing Planning
6 Strategic Product Management - Marketing Planning6 Strategic Product Management - Marketing Planning
6 Strategic Product Management - Marketing Planning
 
5 Strategic Product Management - Understanding Product Management
5 Strategic Product Management - Understanding Product Management5 Strategic Product Management - Understanding Product Management
5 Strategic Product Management - Understanding Product Management
 
4 Strategic Product Management - Understanding Product Life Cycle
4 Strategic Product Management - Understanding Product Life Cycle4 Strategic Product Management - Understanding Product Life Cycle
4 Strategic Product Management - Understanding Product Life Cycle
 
3 Strategic Product Management - Understanding Product & Marketing Mix
3 Strategic Product Management - Understanding Product & Marketing Mix3 Strategic Product Management - Understanding Product & Marketing Mix
3 Strategic Product Management - Understanding Product & Marketing Mix
 
2 Strategic Product Management - Product Mix
2 Strategic Product Management - Product Mix2 Strategic Product Management - Product Mix
2 Strategic Product Management - Product Mix
 

Recently uploaded

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 

Recently uploaded (20)

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 

12 c business i environment i society mba 2016

  • 1. Business I Environment I Society - Rajesh K Satpathy
  • 3. Cyber Crime Definition: Cyber Crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example: Hate crimes, Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.
  • 4. The latest Definition… Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)”. Such crimes may threaten a nation’s security and the financial health.Issues surrounding these types of crimes have become high- profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is intercepted or disclosed, lawfully or otherwise. - Dr. Debarati Halder and Dr. K. Jaishankar ( 2011)
  • 5. What is Child Grooming ? Child grooming is befriending and establishing an emotional connection with a child, and sometimes the family, to lower the child's inhibitions for child sexual abuse. It lures minors into trafficking of children, illicit businesses such as child prostitution, or the production of child pornography.
  • 6. Cyber Crime The rapid growth of the internet, smart phone and computer technology over the past few years has led to the growth in new forms of crime-dubbed cyber crime- throughout the world. Based on statistics on the various forms of cyber crime and other evidence which in form of cyber crime pose the most serious threat to individuals and business today. Cyber crime is the new breed of crime, which is either perpetrated using computers, or is otherwise related to them. Its origin can be traced to the growing dependence on computers in modern life. Cyber crime has assumed sinister implications today as everything from microwave ovens and refrigerators to nuclear power plants is being run on computers.
  • 7. Cyber Crime Today, the world is moving towards a point where everything from banking stock exchanges, are traffic control, telephones to electric power, health care, welfare and education depends on software. This exponential growth, and the increase in the capacity and accessibility of computers coupled with the decrease in cost, has brought about revolutionary changes in every aspect of human civilization, including crime.
  • 8. Specific forms Cyber Crime… 1. Data Diddling: Data diddling is one of the most common ways to perform a computer crime. It involves altering key production data on the computer system in some unauthorized way. Data diddlers often are found changing grades in university files and falsifying input records on bank transactions. 2. The Trojan Horse: The Trojan horse is a procedure for adding concealed instructions to a computer program so that it will still work but will also perform unauthorized duties. For example, a bank worker can cleverly alter a program that contains thousands of lines of code by adding a small “patch” that instructs the program not to withdraw money from a certain account !!!
  • 9. Specific forms Cyber Crime… 3. Salami Shaving: Salami shaving involves altering programs so that many small rupees amounts- say, a few paise worth of interest payments/ withdrawals - are shaved from a large number of selected transactions or accounts and deposited in another account. The victims of a salami-shaving scheme generally are unaware that their funds have been tapped, because the amount taken from each individual is trivial. The recipient of the salami shaving, however, benefits from the aggregation of these small amounts, often substantially.
  • 10. Specific forms Cyber Crime… 4.Super Zapping: Super zapping is a technique made possible by a special program available on most computer systems - a program that bypasses all system controls when the computer crashes and cannot be restarted with normal recovery procedures. This program, in effect, is a “master key” that can provide access to any part of the system. The super zap program is a highly privileged “disaster aid” that very few computer system professionals are authorized to use. In the wrong hands, it can be used to perform almost any unauthorized task.
  • 11. Specific forms Cyber Crime… 5.Trapdoors: Trapdoors are diagnostic tools, used in the development of systems programs, that enable programmers to gain access to various parts of the computer system. Before the programs are marketed, these tools are supposed to be removed. Occasionally, however, some blocks of diagnostic code are overlooked. Thus, a person using the associated systems program may get unauthorized views of other parts of the computer system.
  • 12. Classification Fraud and financial crimes… Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. In this context, the fraud will result in obtaining a benefit by altering in an unauthorized way. This requires little technical expertise and is common form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes.
  • 13. Classification Fraud and financial crimes… Altering or deleting stored data: Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions. This is difficult to detect. Other forms of fraud may be facilitated using computer systems, including bank fraud, carding, identity theft, extortion, and theft of classified information. A variety of internet scams target consumers and businesses.
  • 14. Classification Cyber terrorism: Government officials and Information Technology security specialists have documented a significant increase in Internet problems and server scans since early 2001. But there is a growing concern among government officials that such intrusions are part of an organized effort by cyber terrorists, foreign intelligence services, or other groups to map potential security holes in critical systems. A cyber terrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching a computer-based attack against computers, networks, or the information stored on them.
  • 15. Classification Cyber-extortion: Cyber-extortion occurs when a website, e-mail server, or computer system is subjected to or threatened with repeated denial of service or other attacks by malicious hackers. These hackers demand money in return for promising to stop the attacks and to offer "protection". According to the Federal Bureau of Investigation, cyber extortionists are increasingly attacking corporate websites and networks, crippling their ability to operate and demanding payments to restore their service.
  • 16. Classification Obscene or offensive content: The content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons. In some instances these communications may be legal !!! The extent to which these communications are unlawful varies greatly between countries, and even within nations. It is a sensitive area in which the courts can become involved in arbitrating between groups with strong beliefs !!!
  • 17. Classification Harassment: Whereas content may be offensive in a non-specific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion and nationality. This often occurs in chat rooms, through newsgroups, and by sending hate e-mail to interested parties.