SlideShare a Scribd company logo
Computer Crime and Security
Measures
Presented by:- Group ‘C’
Saurav Basnet
Rakshya Bhusal
Mohak Shrestha
Sailesh Bariya
Sabin Kafle
1Saurav, Rakshya,Mohak, Sailesh, Sabin
• Any person commits computer crime who
knowingly accesses, attempts to access or uses, or
attempts to use, any computer, computer system,
computer network or any part thereof for the
purpose of:
(a) Devising or executing any scheme or artifice
to defraud;
(b) Obtaining money, property or services by
means of false or fraudulent pretenses,
representations or promises; or
• Any person who knowingly and without
authorization uses, accesses or attempts to access
any computer, computer system, computer
network, or any computer software, program,
documentation or data contained in such
computer, computer system or computer network,
commits computer crime.
Computer Crime
2Saurav, Rakshya,Mohak, Sailesh, Sabin
Who Commits Cyber Crime?
• Hackers
(who hacks others networks)
• Crackers
(are responsible of cracking
Software's)
• Untrustworthy insiders
(employers inside the organization
whom we cant have trust to)
• Sophisticated professionals
(the personals beyond ordinary)
3Saurav, Rakshya,Mohak, Sailesh, Sabin
4Saurav, Rakshya,Mohak, Sailesh, Sabin
Federal and State Laws defines
Computer Crime as:-
– Stealing or compromising data
– Gaining unauthorized computer access
– Violating data belonging to banks
– Intercepting communications
– Threatening to damage
computer systems
– Disseminating viruses
9-5Saurav, Rakshya,Mohak, Sailesh, Sabin
Types of computer crime
– Data diddling: modifying data
– Salami slicing: skimming small
amounts of money
– Phreaking: making free long
distance calls
– Cloning: cellular phone fraud
using scanners
– Carding: stealing credit card
numbers online
– Piggybacking: stealing credit
card numbers by spying
– Social engineering: tricking
employees to gain access
– Dumpster diving: finding private
info in garbage cans
– Spoofing: stealing passwords
through a false login page
9-6Saurav, Rakshya,Mohak, Sailesh, Sabin
Consequences of cyber crime
Saurav, Rakshya,Mohak, Sailesh, Sabin 7
8Saurav, Rakshya,Mohak, Sailesh, Sabin
Software Piracy
• Illegal distribution
or production of
the copies of
original
applications.
• The use of apps
without their
license.
• Punishable by law.
• Almost impossible
crime to stop.
• Commercial
programs that are
made available to
the public illegally.
9Saurav, Rakshya,Mohak, Sailesh, Sabin
10Saurav, Rakshya,Mohak, Sailesh, Sabin
Anti piracy
• It is against piracy.
• It prevents copyright
violation.
• It describes about the
different methods of
stooping piracy.
• It mainly focus on how
the original developer
can be prevented from
being cheated. 11Saurav, Rakshya,Mohak, Sailesh, Sabin
Cyber law
• The term refers to all the illegal aspect of internet
and the www.
• Regulation of the Information and
communication Technology (ITC) market.
• Protection of the intellectual property in the ICT
sector
• Electronic transactions
• Non contractual liability
• Privacy protection
• Computer related crime
12Saurav, Rakshya,Mohak, Sailesh, Sabin
Computer Ethics
• It is a branch of practical philosophy deals
with how computing professional should
make decisions regarding professional and
social conduct.
• The rules have been established as a result of
consensus in society and are often written
into laws.
13Saurav, Rakshya,Mohak, Sailesh, Sabin
Ten Commandments of computer ethics
1) Do not use computer to harm other people: it is unethical to
harm people by accessing and destroying their lives.
2) computers should not interfere with other people's computer
work: by developing Computer viruses
3) Computers should not snoop around in other people's
files: Obtaining other people’s non-public files should be judged
4) Computers should not use to steal: they should not be used In
robbery and should be judged with strict laws against it.
5)They should not be used in giving/providing wrong information.
6) Computers should not be used on copy software for which you
have not paid: copywriting right should be followed.
7) Computers should not use other people's computer resources
without authorization: Hacking a system to break and bypass the
authorization is unethical.
8) They should not appropriate other people's intellectual
output: Intellectual property is a form of ownership, and may be
protected by copyright laws.
14Saurav, Rakshya,Mohak, Sailesh, Sabin
Contd.
• 9) They should think about the social consequences
of the program you write:
The written program should not be harmful to the
society.
• 10) They can use a computer in ways that show
consideration and respect: thinking that they are the
integral part and we should be respectful to them.
15Saurav, Rakshya,Mohak, Sailesh, Sabin
Computer Viruses
• Program which can copy itself
and infect another computer,
often via shared media.
• Viruses are always embedded
within another file or program.
• Just like a human virus its
number goes on increasing.
• The cause of media being
corrupt.
• Damage to storage Devices.
16Saurav, Rakshya,Mohak, Sailesh, Sabin
Worms
• Self-reproducing program which propagates
via the network.
• Can fill the entire disk space with a copy of
files of it.
• It cause the harm to network by consuming
bandwidth.
17Saurav, Rakshya,Mohak, Sailesh, Sabin
Trojan horse
• Program which
purports to do one
thing, but secretly
does something
else
• Program having
obvious and
unexpected effect.
• Widely known as
part of computer
virus.
• Program where
malicious or
harmful code is
contained inside
apparently
harmless
programming or
data.
18Saurav, Rakshya,Mohak, Sailesh, Sabin
Root kit
• Set of programs designed to allow an adversary
to surreptitiously gain full control of a targeted
system
19Saurav, Rakshya,Mohak, Sailesh, Sabin
Malware
• Malware: an inclusive term for all of the
above -- "malicious software“
• malware is sometimes known as a computer
contaminant, as in the legal codes of
several U.S. states.
• Malware is different from defective software,
which is a legitimate software but contains
harmful bugs that were not corrected before
release.
20Saurav, Rakshya,Mohak, Sailesh, Sabin
Spyware
• Installed on the targeted system
without the involvement of the
user.
• Used to collect every keystrokes,
passwords, capturing screens in
real time display.
• May be browser based or report
based programs.
• Spyware can collect almost any
type of data, including personal
information like Internet
surfing habits, user logins, and
bank or credit account
information. 21Saurav, Rakshya,Mohak, Sailesh, Sabin
Defending Against The problem
• Rotation of employees with access to sensitive systems
• Unique ID and password
• Limit access to system
• Screening and background checks of employees
• Good security policies
• Hardware/Software
• Magnetic or digital finger printing
• Awareness of extent of problem
• Education of users
• Acceptance of responsibility
• Cryptography
• firewall
22Saurav, Rakshya,Mohak, Sailesh, Sabin
Computer Security
• Computer Security –
precautions taken to
keep computers and
the information they
contain safe from
unauthorized access.
• Security to
computers can be
maintained by using
different types of
antimalware,
antiviruses, windows
defender and so on.
9-23Saurav, Rakshya,Mohak, Sailesh, Sabin
Antivirus program
• Type of utility
software used to prevent,
detect and remove
malicious computer
viruses.
• They also enrich the
processing speed of the
processor by deleting,
repairing, cleaning and
blocking of the viruses or
the cookies or malwares.
• Provides security to the
system 24Saurav, Rakshya,Mohak, Sailesh, Sabin
Data and message security
• Confidentiality: This feature ensures that information does not go in to the wrong
hands when it travels from the sender to the receiver.
• Integrity: This feature ensures that the receiver of the message gets the same
information that the sender sent without any data tampering.
• Authentication: This feature verifies who the sender is and who the receiver is.
• Authorization: This feature verifies whether the user is authorized to perform the
action they are requesting from the application.
Saurav, Rakshya,Mohak, Sailesh, Sabin 25
Computer Security
• Recommended Safeguards
– Implement a security plan to prevent break-ins
– Use biometrics for access to computing resources
– Hire trustworthy employees
– Have a plan if break-ins do occur
– Make backups!
– Only allow access to key employees
– Change passwords frequently
– Keep stored information secure
– Use antivirus software
9-26Saurav, Rakshya,Mohak, Sailesh, Sabin
Network security
• The security introduced inside the network
• It is created by the network administrator
• It is for to prevent unauthorized entry of the
outsiders about theirs important data.
• Types:-
• Firewall
• Cryptography
27Saurav, Rakshya,Mohak, Sailesh, Sabin
Firewall• Hardware/Softwar
e component
designed to keep
unauthorized users
out of network
systems.
• Placed in between
the intranet and
internet.
• Checks the
incoming requests
of the internet
users about the
data stored in the
server computer.
• And also
allow/stopping the
data going out
from the intranet
to the internet. 28Saurav, Rakshya,Mohak, Sailesh, Sabin
Cryptography
• Encryption –the process of
encoding plain text to cipher
texts using cryptographic
algorithm and secret key.
• Decryption – the process of
decoding cipher text onto its
original text known as plain
text.
Types-
a. Symmetric key cryptography
Uses same key for encrypt and
decrypt.
a. Asymmetric key
cryptography
Uses the public key of the receiver
to encrypt and needs private key
of the receiver to decrypt.
9-29Saurav, Rakshya,Mohak, Sailesh, Sabin
30Saurav, Rakshya,Mohak, Sailesh, Sabin
QnS
31
Q&S!!!!
Saurav, Rakshya,Mohak, Sailesh, Sabin
---Group C
32Saurav, Rakshya,Mohak, Sailesh, Sabin

More Related Content

What's hot

Need for cybersecurity
Need for cybersecurityNeed for cybersecurity
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
Suryaprakash Nehra
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
SumanPramanik7
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
Kabul Education University
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
AT-NET Services, Inc. - Charleston Division
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
isc2-hellenic
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
Aaron White
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
WPICPE
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
Saqib Raza
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
Ashish prashar
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
Sweta Kumari Barnwal
 
Cybersecurity service provider
Cybersecurity service providerCybersecurity service provider
Cybersecurity service provider
Vishvendra Saini
 
Cyber security
Cyber securityCyber security
Cyber security
Ankush Verma
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
Deepak Kumar (D3)
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
Hannah Jane del Castillo
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Knowledge Group
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
Chinatu Uzuegbu
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
Sonu Sunaliya
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Sahil Vashishtha
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
Rajat Kumar
 

What's hot (20)

Need for cybersecurity
Need for cybersecurityNeed for cybersecurity
Need for cybersecurity
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Cybersecurity service provider
Cybersecurity service providerCybersecurity service provider
Cybersecurity service provider
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 

Viewers also liked

Presentation1
Presentation1Presentation1
Presentation1
Rachel Lasotas
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
tawnygsu
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
Mar Soriano
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
Upekha Vandebona
 
Computer crime
 Computer crime Computer crime
Computer crime
Anika Rahman Orin
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
Alexander Zhuravlev
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Viewers also liked (7)

Presentation1
Presentation1Presentation1
Presentation1
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Computer Crime

2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
Raffa Learning Community
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
ANIKETKUMARSHARMA3
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
SohamChakraborty61
 
Cyber Security Introduction project comprehensive
Cyber Security Introduction project comprehensiveCyber Security Introduction project comprehensive
Cyber Security Introduction project comprehensive
sidraasif9090
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
Raffa Learning Community
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
parveen837153
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
Daniel Thomas
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
Nikki Shree
 
M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
imanuelantoniussohir
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Harendra Singh
 
Top 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfTop 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdf
Dipak Tiwari
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
SonakshiMundra
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
dhumaletiku
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
Dr Raghu Khimani
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
afaque jaya
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
Mohamed Madar
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
perweeng31
 
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptxIntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
fuebf
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Bernad Bear
 

Similar to Computer Crime (20)

2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Cyber Security Introduction project comprehensive
Cyber Security Introduction project comprehensiveCyber Security Introduction project comprehensive
Cyber Security Introduction project comprehensive
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Top 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfTop 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdf
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
 
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptxIntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
 

More from sabin kafle

Unit 7 leadership
Unit 7 leadershipUnit 7 leadership
Unit 7 leadership
sabin kafle
 
Unit 8 communication
Unit  8  communicationUnit  8  communication
Unit 8 communication
sabin kafle
 
Understanding individual behaviour
Understanding individual behaviourUnderstanding individual behaviour
Understanding individual behaviour
sabin kafle
 
Total quality-system
Total quality-systemTotal quality-system
Total quality-system
sabin kafle
 
Production system in ai
Production system in aiProduction system in ai
Production system in ai
sabin kafle
 
Perception
PerceptionPerception
Perception
sabin kafle
 
Organizational Development
Organizational DevelopmentOrganizational Development
Organizational Development
sabin kafle
 
Linear programming
Linear programmingLinear programming
Linear programming
sabin kafle
 
analysis and design with uml
analysis and design with umlanalysis and design with uml
analysis and design with uml
sabin kafle
 
Bcg matrix
Bcg matrixBcg matrix
Bcg matrix
sabin kafle
 
Aggregate planning
Aggregate planningAggregate planning
Aggregate planning
sabin kafle
 
Merger and aquisition
Merger and aquisitionMerger and aquisition
Merger and aquisition
sabin kafle
 
Copyrights and trademarks
Copyrights and trademarksCopyrights and trademarks
Copyrights and trademarks
sabin kafle
 
Raabit and bacteria
Raabit and bacteriaRaabit and bacteria
Raabit and bacteria
sabin kafle
 
SAARC
SAARCSAARC
Staff use-of-internet
Staff use-of-internetStaff use-of-internet
Staff use-of-internet
sabin kafle
 
Websurfer
WebsurferWebsurfer
Websurfer
sabin kafle
 
Objectives of foreign direct investment
Objectives of foreign direct investmentObjectives of foreign direct investment
Objectives of foreign direct investment
sabin kafle
 
Introduction to web surfer communication
Introduction to web surfer communicationIntroduction to web surfer communication
Introduction to web surfer communication
sabin kafle
 
Dark sides of social networking
Dark sides of social networkingDark sides of social networking
Dark sides of social networking
sabin kafle
 

More from sabin kafle (20)

Unit 7 leadership
Unit 7 leadershipUnit 7 leadership
Unit 7 leadership
 
Unit 8 communication
Unit  8  communicationUnit  8  communication
Unit 8 communication
 
Understanding individual behaviour
Understanding individual behaviourUnderstanding individual behaviour
Understanding individual behaviour
 
Total quality-system
Total quality-systemTotal quality-system
Total quality-system
 
Production system in ai
Production system in aiProduction system in ai
Production system in ai
 
Perception
PerceptionPerception
Perception
 
Organizational Development
Organizational DevelopmentOrganizational Development
Organizational Development
 
Linear programming
Linear programmingLinear programming
Linear programming
 
analysis and design with uml
analysis and design with umlanalysis and design with uml
analysis and design with uml
 
Bcg matrix
Bcg matrixBcg matrix
Bcg matrix
 
Aggregate planning
Aggregate planningAggregate planning
Aggregate planning
 
Merger and aquisition
Merger and aquisitionMerger and aquisition
Merger and aquisition
 
Copyrights and trademarks
Copyrights and trademarksCopyrights and trademarks
Copyrights and trademarks
 
Raabit and bacteria
Raabit and bacteriaRaabit and bacteria
Raabit and bacteria
 
SAARC
SAARCSAARC
SAARC
 
Staff use-of-internet
Staff use-of-internetStaff use-of-internet
Staff use-of-internet
 
Websurfer
WebsurferWebsurfer
Websurfer
 
Objectives of foreign direct investment
Objectives of foreign direct investmentObjectives of foreign direct investment
Objectives of foreign direct investment
 
Introduction to web surfer communication
Introduction to web surfer communicationIntroduction to web surfer communication
Introduction to web surfer communication
 
Dark sides of social networking
Dark sides of social networkingDark sides of social networking
Dark sides of social networking
 

Recently uploaded

RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 

Recently uploaded (20)

RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 

Computer Crime

  • 1. Computer Crime and Security Measures Presented by:- Group ‘C’ Saurav Basnet Rakshya Bhusal Mohak Shrestha Sailesh Bariya Sabin Kafle 1Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 2. • Any person commits computer crime who knowingly accesses, attempts to access or uses, or attempts to use, any computer, computer system, computer network or any part thereof for the purpose of: (a) Devising or executing any scheme or artifice to defraud; (b) Obtaining money, property or services by means of false or fraudulent pretenses, representations or promises; or • Any person who knowingly and without authorization uses, accesses or attempts to access any computer, computer system, computer network, or any computer software, program, documentation or data contained in such computer, computer system or computer network, commits computer crime. Computer Crime 2Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 3. Who Commits Cyber Crime? • Hackers (who hacks others networks) • Crackers (are responsible of cracking Software's) • Untrustworthy insiders (employers inside the organization whom we cant have trust to) • Sophisticated professionals (the personals beyond ordinary) 3Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 5. Federal and State Laws defines Computer Crime as:- – Stealing or compromising data – Gaining unauthorized computer access – Violating data belonging to banks – Intercepting communications – Threatening to damage computer systems – Disseminating viruses 9-5Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 6. Types of computer crime – Data diddling: modifying data – Salami slicing: skimming small amounts of money – Phreaking: making free long distance calls – Cloning: cellular phone fraud using scanners – Carding: stealing credit card numbers online – Piggybacking: stealing credit card numbers by spying – Social engineering: tricking employees to gain access – Dumpster diving: finding private info in garbage cans – Spoofing: stealing passwords through a false login page 9-6Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 7. Consequences of cyber crime Saurav, Rakshya,Mohak, Sailesh, Sabin 7
  • 9. Software Piracy • Illegal distribution or production of the copies of original applications. • The use of apps without their license. • Punishable by law. • Almost impossible crime to stop. • Commercial programs that are made available to the public illegally. 9Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 11. Anti piracy • It is against piracy. • It prevents copyright violation. • It describes about the different methods of stooping piracy. • It mainly focus on how the original developer can be prevented from being cheated. 11Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 12. Cyber law • The term refers to all the illegal aspect of internet and the www. • Regulation of the Information and communication Technology (ITC) market. • Protection of the intellectual property in the ICT sector • Electronic transactions • Non contractual liability • Privacy protection • Computer related crime 12Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 13. Computer Ethics • It is a branch of practical philosophy deals with how computing professional should make decisions regarding professional and social conduct. • The rules have been established as a result of consensus in society and are often written into laws. 13Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 14. Ten Commandments of computer ethics 1) Do not use computer to harm other people: it is unethical to harm people by accessing and destroying their lives. 2) computers should not interfere with other people's computer work: by developing Computer viruses 3) Computers should not snoop around in other people's files: Obtaining other people’s non-public files should be judged 4) Computers should not use to steal: they should not be used In robbery and should be judged with strict laws against it. 5)They should not be used in giving/providing wrong information. 6) Computers should not be used on copy software for which you have not paid: copywriting right should be followed. 7) Computers should not use other people's computer resources without authorization: Hacking a system to break and bypass the authorization is unethical. 8) They should not appropriate other people's intellectual output: Intellectual property is a form of ownership, and may be protected by copyright laws. 14Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 15. Contd. • 9) They should think about the social consequences of the program you write: The written program should not be harmful to the society. • 10) They can use a computer in ways that show consideration and respect: thinking that they are the integral part and we should be respectful to them. 15Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 16. Computer Viruses • Program which can copy itself and infect another computer, often via shared media. • Viruses are always embedded within another file or program. • Just like a human virus its number goes on increasing. • The cause of media being corrupt. • Damage to storage Devices. 16Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 17. Worms • Self-reproducing program which propagates via the network. • Can fill the entire disk space with a copy of files of it. • It cause the harm to network by consuming bandwidth. 17Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 18. Trojan horse • Program which purports to do one thing, but secretly does something else • Program having obvious and unexpected effect. • Widely known as part of computer virus. • Program where malicious or harmful code is contained inside apparently harmless programming or data. 18Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 19. Root kit • Set of programs designed to allow an adversary to surreptitiously gain full control of a targeted system 19Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 20. Malware • Malware: an inclusive term for all of the above -- "malicious software“ • malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states. • Malware is different from defective software, which is a legitimate software but contains harmful bugs that were not corrected before release. 20Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 21. Spyware • Installed on the targeted system without the involvement of the user. • Used to collect every keystrokes, passwords, capturing screens in real time display. • May be browser based or report based programs. • Spyware can collect almost any type of data, including personal information like Internet surfing habits, user logins, and bank or credit account information. 21Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 22. Defending Against The problem • Rotation of employees with access to sensitive systems • Unique ID and password • Limit access to system • Screening and background checks of employees • Good security policies • Hardware/Software • Magnetic or digital finger printing • Awareness of extent of problem • Education of users • Acceptance of responsibility • Cryptography • firewall 22Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 23. Computer Security • Computer Security – precautions taken to keep computers and the information they contain safe from unauthorized access. • Security to computers can be maintained by using different types of antimalware, antiviruses, windows defender and so on. 9-23Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 24. Antivirus program • Type of utility software used to prevent, detect and remove malicious computer viruses. • They also enrich the processing speed of the processor by deleting, repairing, cleaning and blocking of the viruses or the cookies or malwares. • Provides security to the system 24Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 25. Data and message security • Confidentiality: This feature ensures that information does not go in to the wrong hands when it travels from the sender to the receiver. • Integrity: This feature ensures that the receiver of the message gets the same information that the sender sent without any data tampering. • Authentication: This feature verifies who the sender is and who the receiver is. • Authorization: This feature verifies whether the user is authorized to perform the action they are requesting from the application. Saurav, Rakshya,Mohak, Sailesh, Sabin 25
  • 26. Computer Security • Recommended Safeguards – Implement a security plan to prevent break-ins – Use biometrics for access to computing resources – Hire trustworthy employees – Have a plan if break-ins do occur – Make backups! – Only allow access to key employees – Change passwords frequently – Keep stored information secure – Use antivirus software 9-26Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 27. Network security • The security introduced inside the network • It is created by the network administrator • It is for to prevent unauthorized entry of the outsiders about theirs important data. • Types:- • Firewall • Cryptography 27Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 28. Firewall• Hardware/Softwar e component designed to keep unauthorized users out of network systems. • Placed in between the intranet and internet. • Checks the incoming requests of the internet users about the data stored in the server computer. • And also allow/stopping the data going out from the intranet to the internet. 28Saurav, Rakshya,Mohak, Sailesh, Sabin
  • 29. Cryptography • Encryption –the process of encoding plain text to cipher texts using cryptographic algorithm and secret key. • Decryption – the process of decoding cipher text onto its original text known as plain text. Types- a. Symmetric key cryptography Uses same key for encrypt and decrypt. a. Asymmetric key cryptography Uses the public key of the receiver to encrypt and needs private key of the receiver to decrypt. 9-29Saurav, Rakshya,Mohak, Sailesh, Sabin