Passive Air Cooling System and Solar Water Heater.ppt
Cyber crime
1. Cyber Crime
Deogiri institute of engineering & management studies.
Aurangabad.
Academic year-2020-2021
Department of Third year computer science engineering
Submitted by Krishna Kakade(05)TE-B
Subject :-Mentormentee
Topic:-Cyber Crime
2. What is a cyber crime?
Cyber crime is an activity done using
computers and internet. We can say that
it is an unlawful acts done in the
computer towards the target.
3. History of cyber crime
1. The first recorded cyber crime took place in 1820.
2. That is not surprising considering the fact that the abacus, which is thought
to be the earliest from of a computer, has been around since 3500 B.c.
3. In India, Japan and China, the era of modern computer, however, began with
the analytical engine of Charles Babbage.
4. The first spam email took place in 1976(may 3) it was sent over the world.
5. The first virus was installed on an Apple computer in 1982 when a high
school student, Rich skrenta, developed the EIK Cloner.
4. Categories of cyber crime
We can categorize cyber crime in two ways.
● The computer as a target :- using a computer to attacks other computer, e.g.
Hacking, virus/worms attacks, Dos attack etc.
● The computer as a weapon :- using a computer to commit real world crime
e.g. cyber terrorism, credit card fraud and pornography(child) etc.
● Child pornography and mentally disturbing things operated on darkweb(Tor)
using onion sites on our own machine is server.
● Online drugs marketing (morphine) and illegal weapons contractors
operated by darkweb you can find hidden wiki links on Tor directory .
5. Major things in cyber crime
● Hacking in government websites.
● Child pornography
● Virus distribution
● Illegal Online drugs and hitman marketing
● Cyber terrorism (hate emails/hate website) Ex:- f** trump trending
● Software piracy
6. Final thoughts 💭
● No one is safe in this internet era (including all CEO’s)
● Below are some points to note or look at.
● Always use 8 digit or more includes all special symbols and words then it is
hard to brute force that password .
● Cover your camera manually or physically and turn off your microphone
when it is not necessary .
● Use good antivirus or official windows defender or use linux.
● Insert firewalls