SlideShare a Scribd company logo
1 of 32
CONTENTS
• Definition
• First Occurrence of cyber crime
• Evolution of cyber crimes
• Categories of Cyber Crime
• Types of Cyber Crime
• Target of cyber crime
• Cyber Security
• Safety tips to avoid Cyber Crime
• Concluding remarks
Cyberspace is the electronic medium
of computer networks in which
online communication takes place.
Cyber Crime refers to all activities
done with criminal intent in
cyberspace.
 The Computer as a Target
 The computer as a weapon
Categories of cyber crime
• Computer as a target
• Computer used as a target in which we use
computer to attack other computers.
E.g ,hack someone computer ,virus launching
and worm attack
• Computer as a weapon
• Computer used a weapon means using
computer to commit real crime of world
• pornography, cyber terrorism and credit card
fraud.
Target Of Cyber Crime
• Cyber crimes against persons.
• Cyber crimes against property.
• Cyber crimes against government
• Cyber crimes against society.
CYBER CRIMES AGAINST PERSONS
Harassment via E-Mails
Hacking
E-Mail bombing
Assault by Threat
CYBER CRIMES AGAINST PROPERTY
Cyber Vandalism
Transmitting Virus
Thefts data ,records ,
files etc.
Cyber crimes against government
large-scale disruption of computer
networks, and use computer in terrorism
activities
Examples of Cyber Terrorism
• Hacking into computer systems.
• Introducing viruses to vulnerable
networks.
• Website Defacing.
• Terroristic threats made via e-mail.
History of cyber crime
• Internet origin in 1969 with USA government
experiment .
• 1st cyber crime is spam email took place in
1976 when it was sent out over the Arpanet
(Advanced Research Projects Agency
Network).
• 2nd cyber-crime occurs in 1982 when virus
installed in Apple computer
Evolution of cyber crime
Cyber Threat Evolution
Virus
Breaking
Web Sites
Malicious
Code
(Melissa)
Advanced Worm /
Trojan (I LOVE
YOU)
Identity Theft
(Phishing)
Organised Crime
Data Theft, DoS /
DDoS
1995 2000 2003-04 2005-06 2007-081977
Evolution of cyber threat
• 1969 internet origin and within
next 7 year a 1st cyber crime occur
• 1st cyber-crime that was spam email
that was sent in 1976
• top 3 countries that is most popular
in spam email crime are involved is
USA ,UK ,INDIA
• 2nd cyber-crime occurs in
1982 when a virus installed in
apple computer
• In 1993 1st website developed
and then internet used become
friendly
• 1996 website was hacked
• In 2000 coding started
through which we can apply
code and password to all kind
of data
• 2001 code cracking started
• Advanced worm launched in
2003
• Phishing crime started in
2005.
• Child Pornography
• Virus Dissemination
• Computer Vandalism
• Cyberterrorism
• Software Piracy
• Credit Card Fraud
• Mobile Hacking
Different Types of Cybercrimes
Cyber crimes
Hacking
Information
Theft
E-mail
bombing
Salami
attacks
Phishing
Trojan
attacks
Web jacking
• Email bombing
It refers to sending large numbers of mail
to the victim, which may be an individual
or a company by ultimately resulting into
crashing.
• Trojan attacks /Trojan horse
In software field this means an
unauthorized program, which passively
gains control over another’s computer by
representing itself as an authorized
program. The most common form of
installing a Trojan is through e-mail.
• Web jacking
This term is derived from the term hi
jacking. In these kinds of offences the
hacker gains access and control over the
website of another. He may even
manipulate or change the information of
the website. This may be done for
fulfilling political objectives or for
• Virus Attacks
Viruses are programs that attach themselves
to a computer or a file and then circulate
themselves to other files and to other
computers on a network. They usually affect
the data on a computer, either by altering or
deleting it.
Worm Attacks
Worms unlike viruses do not need the host to
attach themselves to. They merely make
functional copies of themselves and do this
repeatedly till they eat up all the available
space on the computer’s memory.
– Salami attacks
This kind of crime is normally prevalent in
the financial institutions or for the purpose of
committing financial crimes. An important
feature of this type of offence is that the
alteration is so small that it would normally
go unnoticed.
• Phishing
Unsolicited emails by
customers of Financial
Institutions, requesting them to
enter their Username,
Password or other personal
information to access their
Account for some reason..
Spamming
Electronic spamming is the use
of electronic messaging
systems to send unsolicited
bulk messages (spam),
VIRUS DISSEMINATION
• Malicious software that attaches
itself to other software. (virus,
worms, Trojan Horse, web jacking,
e-mail bombing etc.)
HACKING
• Hacking in simple terms means an illegal
intrusion into a computer system and/or
network.
COMPUTER VANDALISM
• Damaging or destroying data rather
than stealing.
• Transmitting virus
SOFTWARE PIRACY
• Theft of software through the illegal
copying of genuine programs.
Use of Internet based attacks
in terrorist activities.
Theft of software through the illegal copying of
genuine programs.
Distribution of products intended to pass for the
original.
 Cyber security is a branch of computer security
specifically related to the Internet.
 It's objective is to establish rules and measure to use
against attacks over the Internet.
1.Install OS/Software Updates
2.Run Anti-virus Software
3. Prevent Identity Theft
5. Avoid Spyware/Adware
7. Back up Important Files
6. Turn on Personal Firewalls
4. Protect Passwords
An Instance of Cyber terrorism
 Ahmedabad Bomb Blast(26-07-08)
o A mail with id alarbi_gujrat@
yahoo.com was being sent by a group of
Terrorists.
o Person named Kenneth Haywood’s
unsecured WIFI router in his house was
being misused by terrorists.
o 3 more mails were sent after the blast
with the same misuse of unsecured WIFI
routers.
aashir980@gmail.com

More Related Content

What's hot

Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and historygururaj lulkarni
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hackingAyush Upadhyay
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 

What's hot (20)

Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 

Similar to Cyber crime

Similar to Cyber crime (20)

cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
pravallika chowdary
pravallika chowdarypravallika chowdary
pravallika chowdary
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

Cyber crime

  • 1.
  • 2. CONTENTS • Definition • First Occurrence of cyber crime • Evolution of cyber crimes • Categories of Cyber Crime • Types of Cyber Crime • Target of cyber crime • Cyber Security • Safety tips to avoid Cyber Crime • Concluding remarks
  • 3. Cyberspace is the electronic medium of computer networks in which online communication takes place. Cyber Crime refers to all activities done with criminal intent in cyberspace.
  • 4.  The Computer as a Target  The computer as a weapon
  • 5. Categories of cyber crime • Computer as a target • Computer used as a target in which we use computer to attack other computers. E.g ,hack someone computer ,virus launching and worm attack • Computer as a weapon • Computer used a weapon means using computer to commit real crime of world • pornography, cyber terrorism and credit card fraud.
  • 6. Target Of Cyber Crime • Cyber crimes against persons. • Cyber crimes against property. • Cyber crimes against government • Cyber crimes against society.
  • 7. CYBER CRIMES AGAINST PERSONS Harassment via E-Mails Hacking E-Mail bombing Assault by Threat
  • 8. CYBER CRIMES AGAINST PROPERTY Cyber Vandalism Transmitting Virus Thefts data ,records , files etc.
  • 9. Cyber crimes against government large-scale disruption of computer networks, and use computer in terrorism activities Examples of Cyber Terrorism • Hacking into computer systems. • Introducing viruses to vulnerable networks. • Website Defacing. • Terroristic threats made via e-mail.
  • 10. History of cyber crime • Internet origin in 1969 with USA government experiment . • 1st cyber crime is spam email took place in 1976 when it was sent out over the Arpanet (Advanced Research Projects Agency Network). • 2nd cyber-crime occurs in 1982 when virus installed in Apple computer
  • 12. Cyber Threat Evolution Virus Breaking Web Sites Malicious Code (Melissa) Advanced Worm / Trojan (I LOVE YOU) Identity Theft (Phishing) Organised Crime Data Theft, DoS / DDoS 1995 2000 2003-04 2005-06 2007-081977
  • 13. Evolution of cyber threat • 1969 internet origin and within next 7 year a 1st cyber crime occur • 1st cyber-crime that was spam email that was sent in 1976 • top 3 countries that is most popular in spam email crime are involved is USA ,UK ,INDIA
  • 14. • 2nd cyber-crime occurs in 1982 when a virus installed in apple computer • In 1993 1st website developed and then internet used become friendly • 1996 website was hacked
  • 15. • In 2000 coding started through which we can apply code and password to all kind of data • 2001 code cracking started
  • 16. • Advanced worm launched in 2003 • Phishing crime started in 2005.
  • 17. • Child Pornography • Virus Dissemination • Computer Vandalism • Cyberterrorism • Software Piracy • Credit Card Fraud • Mobile Hacking
  • 18. Different Types of Cybercrimes Cyber crimes Hacking Information Theft E-mail bombing Salami attacks Phishing Trojan attacks Web jacking
  • 19. • Email bombing It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing. • Trojan attacks /Trojan horse In software field this means an unauthorized program, which passively gains control over another’s computer by representing itself as an authorized program. The most common form of installing a Trojan is through e-mail. • Web jacking This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the website of another. He may even manipulate or change the information of the website. This may be done for fulfilling political objectives or for
  • 20. • Virus Attacks Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worm Attacks Worms unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on the computer’s memory. – Salami attacks This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed.
  • 21. • Phishing Unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason.. Spamming Electronic spamming is the use of electronic messaging systems to send unsolicited bulk messages (spam),
  • 22. VIRUS DISSEMINATION • Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)
  • 23. HACKING • Hacking in simple terms means an illegal intrusion into a computer system and/or network.
  • 24. COMPUTER VANDALISM • Damaging or destroying data rather than stealing. • Transmitting virus
  • 25. SOFTWARE PIRACY • Theft of software through the illegal copying of genuine programs.
  • 26. Use of Internet based attacks in terrorist activities.
  • 27. Theft of software through the illegal copying of genuine programs. Distribution of products intended to pass for the original.
  • 28.
  • 29.  Cyber security is a branch of computer security specifically related to the Internet.  It's objective is to establish rules and measure to use against attacks over the Internet.
  • 30. 1.Install OS/Software Updates 2.Run Anti-virus Software 3. Prevent Identity Theft 5. Avoid Spyware/Adware 7. Back up Important Files 6. Turn on Personal Firewalls 4. Protect Passwords
  • 31. An Instance of Cyber terrorism  Ahmedabad Bomb Blast(26-07-08) o A mail with id alarbi_gujrat@ yahoo.com was being sent by a group of Terrorists. o Person named Kenneth Haywood’s unsecured WIFI router in his house was being misused by terrorists. o 3 more mails were sent after the blast with the same misuse of unsecured WIFI routers.