SlideShare a Scribd company logo
1 of 2
Download to read offline
ABSTRACT
โ€œCyberโ€ refers to imaginary space, which is created when the electronic devices
communicate, like network of computers. Cyber-crime refers to anything done in the cyber
space with a criminalintent. These could be either the criminal activities in the conventional
Sense or could be activities, newly evolved with the growth of the newmedium. Cyber-crime
includes acts such as hacking, uploading obscenecontent on the Internet, sending obscene e-
mails and hacking into aperson's e-banking account to withdraw money.
Computer crime, or cybercrime, refers to any crime that involves acomputer and a
network, where the computers played an instrumentalpart in the commission of a crime.
Cyber Crime has nowhere beendefined in any statute /Act passed or enacted by the Indian
Parliament.The concept of cyber-crime is not radically different from the concept
ofconventional crime. Both include conduct whether act or omission,which cause breach of
rules of law and counterbalanced by the sanctionof the state .particularly those surrounds
hacking, copyrightinfringement through wares, child pornography and child grooming.
There has been tremendous growth in use of Internet.Technology gives rise to Cyber
Crime. Cyber Crime is technologybased crime committed by technocrats. This paper deals
withvariants of cyber-crime like Salami Attack, Packet Sniffing,Tempest Attacks, and Bot
Networks. It also includes real worldcyber-crime cases their scenario and modus operandi.
The globalspam rate, malware rate and phishing rate is increasing rapidly.And there is a
potential impact of cyber-crime on economics,consumer trust and production time. The
counter measures likeGPRS Security architecture, Intrusion Detection and preventionSystem
and Agent Based Distributed Intrusion Detection Systemare used for security purposes.
Computer crime also referred as Cybercrime has increased in severity and frequency
in the recent years and because of this, it has become a major concern for companies,
universities and organizations. Worldwide governments, police departments and intelligence
units have started to react. In this paper, we provide an overview of Cybercrime and examine
the awareness among different respondents on the issue of Cyber Crime, to emphasize the
severity of this problem and the urgent need to limit its impact worldwide.
ACKOWLEDGEMENT
This report is spanned over a period of one week and the number of people who had helped
us is outstanding. To begin with, we would like to thank our seminar guide Mr. Mohammad
Asif who has helped us throughout the period and has helped us through the times of need.
Inspite of their busy schedules, it was very kind of them to spare some of their precious time
and give us valuable suggestions which ultimately formed heart of this report. Mr.
Mohammad Asif was a great source of inspiration and allowed us to work in the lab for
extended hours.
We also extend our thanks to all the professors of our department for their valuable
guidance. We would also like to thank our fellow students for their support and good wishes.
Finally we thank entire computer engineering department for excellent facilities and
encouragement given during the course of report.

More Related Content

What's hot

Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliAhtasham Ali
ย 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crimevivek sharma
ย 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
ย 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
ย 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
ย 
Cyber crime
Cyber crimeCyber crime
Cyber crimeDebayon Saha
ย 
Cyber crime
Cyber crime Cyber crime
Cyber crime Jayant Raj
ย 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
ย 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
ย 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
ย 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
ย 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber CrimeNikhil Chaudhary
ย 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime Maruti Nandan
ย 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismshaympariyar
ย 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
ย 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
ย 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)Siddharth Anand
ย 

What's hot (20)

Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
ย 
Cyber law
Cyber lawCyber law
Cyber law
ย 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
ย 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
ย 
Cyber crime
Cyber crimeCyber crime
Cyber crime
ย 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
ย 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
ย 
Cyber crime
Cyber crimeCyber crime
Cyber crime
ย 
Cyber crime
Cyber crime Cyber crime
Cyber crime
ย 
Cybercrime
CybercrimeCybercrime
Cybercrime
ย 
Computer crime
Computer crimeComputer crime
Computer crime
ย 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
ย 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
ย 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
ย 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
ย 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
ย 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
ย 
Cybercrime
CybercrimeCybercrime
Cybercrime
ย 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
ย 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
ย 

Similar to 3.abstract (cyber crime)

Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modifiedDebabrata Samanta
ย 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
ย 
Cybercrime
CybercrimeCybercrime
Cybercrimedhru shah
ย 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Skills Academy
ย 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
ย 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyCharles Mok
ย 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)Priyatham Kanigarla
ย 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
ย 
Cyber crime
Cyber crimeCyber crime
Cyber crimepraveen1792
ย 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
ย 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
ย 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
ย 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
ย 

Similar to 3.abstract (cyber crime) (18)

Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
ย 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
ย 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
ย 
Cybercrime
CybercrimeCybercrime
Cybercrime
ย 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
ย 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation
ย 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
ย 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
ย 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
ย 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
ย 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
ย 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
ย 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
ย 
Cyber crime
Cyber crimeCyber crime
Cyber crime
ย 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
ย 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
ย 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
ย 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
ย 

More from JIEMS Akkalkuwa

4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)JIEMS Akkalkuwa
ย 
3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)JIEMS Akkalkuwa
ย 
2.index (gi fi technology)
2.index (gi fi technology)2.index (gi fi technology)
2.index (gi fi technology)JIEMS Akkalkuwa
ย 
1.frontpage (gi fi technology)
1.frontpage (gi fi technology)1.frontpage (gi fi technology)
1.frontpage (gi fi technology)JIEMS Akkalkuwa
ย 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)JIEMS Akkalkuwa
ย 
3 (data security in local network using)
3 (data security in local network using)3 (data security in local network using)
3 (data security in local network using)JIEMS Akkalkuwa
ย 
2 (data security in local network using)
2 (data security in local network using)2 (data security in local network using)
2 (data security in local network using)JIEMS Akkalkuwa
ย 
1 (data security in local network using)
1 (data security in local network using)1 (data security in local network using)
1 (data security in local network using)JIEMS Akkalkuwa
ย 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
ย 
3.abstact (biometric security system)
3.abstact (biometric security system)3.abstact (biometric security system)
3.abstact (biometric security system)JIEMS Akkalkuwa
ย 
2.index (biometric security system)
2.index (biometric security system)2.index (biometric security system)
2.index (biometric security system)JIEMS Akkalkuwa
ย 
1.front page (biometric security system)
1.front page (biometric security system)1.front page (biometric security system)
1.front page (biometric security system)JIEMS Akkalkuwa
ย 
4 (mobile computing)
4 (mobile computing)4 (mobile computing)
4 (mobile computing)JIEMS Akkalkuwa
ย 
3 (mobile computing)
3 (mobile computing)3 (mobile computing)
3 (mobile computing)JIEMS Akkalkuwa
ย 
2 (mobile computing)
2 (mobile computing)2 (mobile computing)
2 (mobile computing)JIEMS Akkalkuwa
ย 
1 (mobile computing)
1 (mobile computing)1 (mobile computing)
1 (mobile computing)JIEMS Akkalkuwa
ย 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)JIEMS Akkalkuwa
ย 
3.abstract (stenography)
3.abstract (stenography)3.abstract (stenography)
3.abstract (stenography)JIEMS Akkalkuwa
ย 
2.index (stenography)
2.index (stenography)2.index (stenography)
2.index (stenography)JIEMS Akkalkuwa
ย 
1.front (stenography)
1.front (stenography)1.front (stenography)
1.front (stenography)JIEMS Akkalkuwa
ย 

More from JIEMS Akkalkuwa (20)

4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)
ย 
3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)3.acknowledgement (gi fi technology)
3.acknowledgement (gi fi technology)
ย 
2.index (gi fi technology)
2.index (gi fi technology)2.index (gi fi technology)
2.index (gi fi technology)
ย 
1.frontpage (gi fi technology)
1.frontpage (gi fi technology)1.frontpage (gi fi technology)
1.frontpage (gi fi technology)
ย 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)
ย 
3 (data security in local network using)
3 (data security in local network using)3 (data security in local network using)
3 (data security in local network using)
ย 
2 (data security in local network using)
2 (data security in local network using)2 (data security in local network using)
2 (data security in local network using)
ย 
1 (data security in local network using)
1 (data security in local network using)1 (data security in local network using)
1 (data security in local network using)
ย 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
ย 
3.abstact (biometric security system)
3.abstact (biometric security system)3.abstact (biometric security system)
3.abstact (biometric security system)
ย 
2.index (biometric security system)
2.index (biometric security system)2.index (biometric security system)
2.index (biometric security system)
ย 
1.front page (biometric security system)
1.front page (biometric security system)1.front page (biometric security system)
1.front page (biometric security system)
ย 
4 (mobile computing)
4 (mobile computing)4 (mobile computing)
4 (mobile computing)
ย 
3 (mobile computing)
3 (mobile computing)3 (mobile computing)
3 (mobile computing)
ย 
2 (mobile computing)
2 (mobile computing)2 (mobile computing)
2 (mobile computing)
ย 
1 (mobile computing)
1 (mobile computing)1 (mobile computing)
1 (mobile computing)
ย 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
ย 
3.abstract (stenography)
3.abstract (stenography)3.abstract (stenography)
3.abstract (stenography)
ย 
2.index (stenography)
2.index (stenography)2.index (stenography)
2.index (stenography)
ย 
1.front (stenography)
1.front (stenography)1.front (stenography)
1.front (stenography)
ย 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
ย 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
ย 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
ย 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
ย 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
ย 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
ย 
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
ย 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
ย 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
ย 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
ย 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
ย 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
ย 
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”soniya singh
ย 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
ย 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
ย 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
ย 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
ย 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
ย 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
ย 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
ย 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
ย 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
ย 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
ย 
โ˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
โ˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCRโ˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
โ˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
ย 
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
ย 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
ย 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
ย 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
ย 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
ย 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
ย 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
ย 
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
ย 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
ย 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
ย 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
ย 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
ย 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
ย 

3.abstract (cyber crime)

  • 1. ABSTRACT โ€œCyberโ€ refers to imaginary space, which is created when the electronic devices communicate, like network of computers. Cyber-crime refers to anything done in the cyber space with a criminalintent. These could be either the criminal activities in the conventional Sense or could be activities, newly evolved with the growth of the newmedium. Cyber-crime includes acts such as hacking, uploading obscenecontent on the Internet, sending obscene e- mails and hacking into aperson's e-banking account to withdraw money. Computer crime, or cybercrime, refers to any crime that involves acomputer and a network, where the computers played an instrumentalpart in the commission of a crime. Cyber Crime has nowhere beendefined in any statute /Act passed or enacted by the Indian Parliament.The concept of cyber-crime is not radically different from the concept ofconventional crime. Both include conduct whether act or omission,which cause breach of rules of law and counterbalanced by the sanctionof the state .particularly those surrounds hacking, copyrightinfringement through wares, child pornography and child grooming. There has been tremendous growth in use of Internet.Technology gives rise to Cyber Crime. Cyber Crime is technologybased crime committed by technocrats. This paper deals withvariants of cyber-crime like Salami Attack, Packet Sniffing,Tempest Attacks, and Bot Networks. It also includes real worldcyber-crime cases their scenario and modus operandi. The globalspam rate, malware rate and phishing rate is increasing rapidly.And there is a potential impact of cyber-crime on economics,consumer trust and production time. The counter measures likeGPRS Security architecture, Intrusion Detection and preventionSystem and Agent Based Distributed Intrusion Detection Systemare used for security purposes. Computer crime also referred as Cybercrime has increased in severity and frequency in the recent years and because of this, it has become a major concern for companies, universities and organizations. Worldwide governments, police departments and intelligence units have started to react. In this paper, we provide an overview of Cybercrime and examine the awareness among different respondents on the issue of Cyber Crime, to emphasize the severity of this problem and the urgent need to limit its impact worldwide.
  • 2. ACKOWLEDGEMENT This report is spanned over a period of one week and the number of people who had helped us is outstanding. To begin with, we would like to thank our seminar guide Mr. Mohammad Asif who has helped us throughout the period and has helped us through the times of need. Inspite of their busy schedules, it was very kind of them to spare some of their precious time and give us valuable suggestions which ultimately formed heart of this report. Mr. Mohammad Asif was a great source of inspiration and allowed us to work in the lab for extended hours. We also extend our thanks to all the professors of our department for their valuable guidance. We would also like to thank our fellow students for their support and good wishes. Finally we thank entire computer engineering department for excellent facilities and encouragement given during the course of report.