Cyber crime refers to any criminal activity involving computers and networks. This document discusses the history of cyber crime, classifications, common types of cyber crimes like hacking and viruses, and approaches to cyber security and legal standards. It provides an overview of key topics relating to cyber crimes, security measures, and relevant laws.
This is a summary of what cyber crime is all about, the history of cyber crime; motivation behind cyber attack as well as the various techniques used in committing those crimes; Cybercrime groups starting to operate like the Mafia; how cyber crimes exploits Web2.0 opportunites and Top Computer Secuity Actions.
Cyber crime refers to criminal activities Carried out by means of computers Or the internet.
All cyber crimes are committed under an electronic communication medium or space known as cyber space.
This is a summary of what cyber crime is all about, the history of cyber crime; motivation behind cyber attack as well as the various techniques used in committing those crimes; Cybercrime groups starting to operate like the Mafia; how cyber crimes exploits Web2.0 opportunites and Top Computer Secuity Actions.
Cyber crime refers to criminal activities Carried out by means of computers Or the internet.
All cyber crimes are committed under an electronic communication medium or space known as cyber space.
cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.
Understanding Cyber Crime and Cyber Security by Sajibe Kanti SajibeKanti
Project : Understanding Cyber Crime and Cyber Security
Place : M. A. Aziz Stadium, Chittagong , Bangladesh
Organized by : Chittagong Division
Powered by : DC OF Lakshmipur
Furthermore other software programs known as password sniffers can undermine the security
safeguards of whole computer networks. ... Cybercriminals, like cybercrime itself, are marked by
a fundamental transformation in the way we think about the issue of crime and security...
Illustrations of the "History of Computer Art",
chap. II.1, URL: http://iasl.uni-muenchen.de/links/GCA-II.1e.html
chap. II.2, URL: http://iasl.uni-muenchen.de/links/GCA-II.2e.html
Intellectual Property in Social Networkinggarypierson
An overview of trademark, copyright, libel, defamation, FTC and other issues related to the use of social networking services such as MySpace, Facebook and twitter.
Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
Impact for Educational Institutions, Internet of things, Digital Enablers, New Age Production, Smart Factory, New digital industrial technology, Interdisciplinary Thinking, Digital Work Place, 3d printing,
Cybercrime is a type of crime done by the help of computer and internet. Brief about types of cyber crimes, Case studies and Cyber hygiene from cyber threats.
Be smart & creative in cyber world. #D3
Computer crime, or Cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.
The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively.
CYBER CRIME - A Threat To Internet UsersAman Sharma
the presentation include a description of what cyber crime is and what are the different methods of cyber crimes. in further slides it tells about the punishment for the cyber criminals and various methods to stop or reduce the chances of cyber crime.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
2. CONTENTS
What is cyber crime?
History
Classification of cyber crime
Types of cyber crime
Cyber Security
Cyber Security standards
Cyber Law
3. W HAT IS CYBER CRIME ?
Cyber crime refers to any crime that involves a
computer/mobile and a network. The computer may have
been used in the commission of a crime, or it may be the
target.
Cyber hackers apply all sorts of techniques (hacking, use
of malware for intercepting data, etc.) in stealing personal
or financial data from their victims, generally from their
computers.
4. HISTORY
The first spam email took place in 1978 when it was sent
out over the ARPANET (Advanced Research Projects Agency
Network).
The first virus was installed on an Apple computer by a high
school student, Rich Skrenta in the year 1982.
5. Cyber Crime refers to all activities done with criminal
intent in cyberspace. These fall into three slots.
Cyberspace is the electronic medium of computer
networks in which online communication takes place.
Those against persons.
Against Business and Non-business organizations.
Crime targeting the government.
6. C LASSIFICATION OF CYBER
CRIME
Computer as a tool
Computer as a target
Computer as an instrumentality
Crime associated with prevalence of computers
7. C OMPUTER AS A TOOL
When the individual is the main target of the crime the
computer can be considered as a tool rather than target.
These crimes are not done by technical experts.
Eg: Spam, cyber stalking , cyber theft etc.
8. C OMPUTER AS A TARGET
These crimes are committed by a selected group of
people with technical knowledge.
Destruction of information in the computer by spreading
virus.
Eg : Defacement, cyber terrorism etc.
9. C OMPUTER AS AN
INSTRUMENTALITY
The crime is committed by manipulating the contents of
computer systems.
With the advent of computer the criminal have started
using the technology as an aid for its perpetuation.
Eg: Drug trafficking, money laundering etc.
10. C RIME ASSOCIATED WITH
PREVALENCE OF COMPUTERS
Copyright violation
Material copied from sources that are not public domain
or compatibly licensed without the permission of
copyright holder.
Copyright violation causes legal issues.
11. T YPES OF CYBER CRIME
Financial crimes
Sale of illegal articles
Online gambling
Intellectual Property crimes
Theft of information contained in electronic form
Email bombing
Key loggers
13. C ONTD .
Hacking
Denial of Service attack
Virus/worm attacks
Logic bombs
Trojan attacks
Internet time theft
Web jacking
14. Financial crime includes credit card frauds, money
laundering, Forgery etc
Money laundering is the process by which large amount
of illegally obtained money is given the appearance of
having originated from a legitimate source
15. Sale of illegal articles includes selling of narcotic
drugs, weapons, wildlife etc to terrorists.
Email bombing refers to sending a large amount of e-
mails to the victim resulting in crashing of victims e-mail
account or mail servers.
Data diddling is a kind of an attack which involves
altering of raw data just before it is processed by a
computer and then changing it back after the processing
is completed.
16. Intellectual Property Crimes includes software piracy,
copyright infringement, trademarks violations etc.
Theft of information contained in electronic from-This
includes information stored in computer hard disks,
removable storage media etc.
Web defacement is usually the substitution of the
original home page of a website with another page
(usually pornographic or defamatory in nature) by a
hacker.
17. Cyber Defamation occurs when defamation takes place
with the help of computers and or the Internet e.g. e-mail
containing defamatory information about that person.
What is defamation?
Defamation is the act of harming the reputation of person
by making a false statement to another.
18. Cyber Stalking refers to the use of the Internet, e-mail, or
other electronic communications devices to stalk another
person.
Stalking generally involves harassing or threatening
behavior that an individual engages in repeatedly, such as
following a person, appearing at a person's home or place
of business, making harassing phone calls, leaving written
messages or objects, or vandalizing a person's property.
19. Denial of Service involves flooding computer resources
with more requests than it can handle. This causes the
resources to crash thereby denying authorized users the
service offered by the resources.
Virus/worm are programs that attach themselves to a
computer or a file and then circulate themselves to other
files and to other computers on a network. They usually
affect the data on a computer, either by altering or
deleting it. Worms, unlike viruses don not need the host
to attach themselves to.
20. Trojan Horse-A Trojan as this program is aptly called, is an
unauthorized program which functions from inside what
seems to be an authorized program, thereby concealing
what it is actually doing.
Internet Time Theft-This connotes the usage by
unauthorized persons of the Internet hours paid for by
another person.
Web jacking-This occurs when someone forcefully takes
control of a website (by cracking the password ). The
actual owner of the website does not have any more
control over what appears on that website.
21. Logic bombs are dependent programs. This implies that
these programs are created to do something only when a
certain event occurs, e.g. some viruses may be termed
logic bombs because they lie dormant all through the year
and become active only on a particular date.
E-Mail spoofing-A spoofed email is one that appears to
originate from one source but actually has been sent from
another source. This can also be termed as E-Mail forging.
22. Salami attacks are used for the commission of financial
crimes. The key here is to make the alteration so
insignificant that in a single case it would go completely
unnoticed e.g. A bank employee inserts a program into
bank’s servers, that deducts a small amount from the
account of every customer.
Clickjacking is a form of cyber attack where the hacker
uses an invisible layer over the embedded web content
(this could be an image, video or button) to intercept and
‘hijack’ you to a mirror website and mine information
from you.
23. Cyber terrorism is the premeditated use of disruptive
activities, or the threat thereof, in cyber space, with the
intention to further social, ideological, religious, political
or similar objectives, or to intimidate any person in
furtherance of such objectives.
Eg: A simple propaganda in the Internet/SMS, that there
will be bomb attacks during the holidays
Mobile pickpocketing (SMS/call fraud), or the ability to
charge a phone bill via SMS billing and phone calls.
Malware uses these mechanisms to steal directly from
user accounts.
24. Keyloggers are regularly used in computers to log all the
strokes a victim makes on the keyboard.
Eg: If a key logger is installed on a computer which is
regularly used for online banking and other financial
transactions then their passwords can be taken without
the knowledge of the user
25.
26.
27. C YBER SECURITY
It is not possible to eliminate cyber crime from the cyber
space. It is quite possible to check them.
Awareness is the first step in protecting yourself.
Invest in Anti-virus, Firewall, and SPAM blocking software
for your PC.
Change passwords on a regular basis
Use complex passwords (include numbers and special
characters)
28. C ONTD .
Do not automatically check boxes before reading the
contents of any agreement of the software.
Avoiding use of unauthorized software.
Avoid opening of unknown emails.
Use internet filtering software.
Data Level Security Using encrypting softwares
Disable remote connectivity (such as Bluetooth)
29. C YBER SECURITY STANDARDS
Cyber security standards are security standards which
enable organizations to practice safe security techniques
to minimize the number of successful cyber security
attacks.
It provides general outlines as well as specific techniques
for implementing cyber security.
Some of the standards are ISO 27002,NERC, NIST,ISO
15408,RFC 2196,ISA-99.
30. L EGAL ACTS
• The Computer Fraud and Abuse Act
• The Digital Millennium Copyright Act
• The Electronic Communications Privacy Act
• The Stored Communications Act
• Identity Theft and Aggravated Identity Theft
• Identity Theft and Assumption Deterrence Act
• Gramm-Leach-Bliley Act
• Internet Spyware Prevention Act
31. C ONTD .
Stored Communications Act which is passed in 1986 is
focused on protecting the confidentiality, integrity and
availability of electronic communications that are
currently in some form of electronic storage
Digital Millennium Copyright Act which is passed in
1998 is a United States copyright law that criminalizes
the production and dissemination of technology,
devices
Electronic Communications Privacy Act of 1986
extends the government restrictions on wiretaps from
telephones.
32. C ONTD .
Internet Spyware Prevention Act (I-SPY) prohibits the
implementation and use of spyware.
Gramm-Leach-Bliley Act (GLBA) requires financial
institutions and credit agencies increase the security of
systems that contain their customers’ personal
information.
Identity Theft and Aggravated Identity Theft defines
the conditions under which an individual has violated
identity theft laws.
33. C YBER LAW
Cyberlaw is a generic term which refers to all the legal
and regulatory aspects of Internet and the World Wide
Web. Anything concerned with or related to or
emanating from any legal aspects or issues concerning
any activity of netizens in and concerning Cyberspace
comes within the ambit of Cyberlaw.
34. C YBERLAW P ROVISIONS IN
I NDIA
Offence Section under act
Tampering with Computer source Sec.65
documents
Hacking with Computer systems, Sec.66
Data alteration
Publishing obscene information Sec.67
Un-authorized access to Sec.70
protected system
Breach of Confidentiality and Sec.72
Privacy
Publishing false digital signature Sec.73
certificates
35. C ONTD .
Offence Section under act
Sending threatening messages Sec 503 IPC
by email
Sending defamatory messages Sec 499 IPC
by email
Forgery of electronic records Sec 463 IPC
Bogus websites, cyber frauds Sec 420 IPC
Email spoofing Sec 463 IPC
Web-Jacking Sec 383 IPC
E-Mail Abuse Sec 500 IPC
Online sale of Drugs NDPS Act
Online sale of Arms Arms Act
36. Though we have so many methods to protect from
cyber crime, only awareness will help us to get rid of
this problem.
In case of emergency to complaint about cyber crime
contact the following email ids and phone numbers.
cbcyber@tn.nic.in ,cop@vsnl.net , cidap@cidap.gov.in
, info@cidap.gov.in
0422-23452350, 98414-94329,22201026 ,22943050 .