SlideShare a Scribd company logo
Cyber Crime:
As Internet usage is growing daily the world is coming closer. The World Wide Web sounds like
a vast phenomenon but surprisingly one of its qualities is bringing the world closer making it a
smaller place to live in for its users. However, it has also managed to create another problem for
people who spend long hours browsing the Cyber World – which is cyber crimes. While law
enforcement agencies are trying to tackle this problem, it is growing steadily and many people
have become victims of hacking, theft, identity theft and malicious software. One of the best
ways to avoid being a victim of cyber crimes and protecting your sensitive information is by
making use of impenetrable security that uses a unified system of software and hardware to
authenticate any information that is sent or accessed over the Internet. However, before you can
understand more about this system, let us find out more about cyber crimes.
Types of Cyber Crimes:
When any crime is committed over the Internet it is referred to as a cyber crime. There are many
types of cyber crimes and the most common ones are explained below:
1.Hacking: This is a type of crime wherein a person’s computer is broken into so that his
personal or sensitive information can be accessed. In the United States, hacking is classified as a
felony and punishable as such. This is different from ethical hacking, which many organizations
use to check their Internet security protection. In hacking, the criminal uses a variety of software
to enter a person’s computer and the person may not be aware that his computer is being
accessed from a remote location.
2.Theft: This crime occurs when a person violates copyrights and downloads music, movies,
games and software. There are even peer sharing websites which encourage software piracy and
many of these websites are now being targeted by the FBI. Today, the justice system is
addressing this cyber crime and there are laws that prevent people from illegal downloading.
3.Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage
of online messages and emails. Typically, these stalkers know their victims and instead of
resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber
stalking is not having the desired effect, they begin offline stalking along with cyber stalking to
make the victims’ lives more miserable.
4.Identity Theft: This has become a major problem with people using the Internet for cash
transactions and banking services. In this cyber crime, a criminal accesses data about a person’s
bank account, credit cards, Social Security, debit card and other sensitive information to siphon
money or to buy things online in the victim’s name. It can result in major financial losses for the
victim and even spoil the victim’s credit history.
5.Malicious Software: These are Internet-based software or programs that are used to disrupt a
network. The software is used to gain access to a system to steal sensitive information or data or
causing damage to software present in the system.
6.Child soliciting and Abuse: This is also a type of cyber crime wherein criminals solicit minors
via chat rooms for the purpose of child pornography. The FBI has been spending a lot of time
monitoring chat rooms frequented by children with the hopes of reducing and preventing child
abuse and soliciting.
Causes of Cyber Crime:
Wherever the rate of return on investment is high and the risk is low, you are bound to find
people willing to take advantage of the situation. This is exactly what happens in cyber crime.
Accessing sensitive information and data and using it means a rich harvest of returns and
catching such criminals is difficult. Hence, this has led to a rise in cyber crime across the world.
Categories of Cyber Crime:
Cyber crimes are broadly categorized into three categories, namely crime against
Each category can use a variety of methods and the methods used vary from one criminal to
another.
1.Individual: This type of cyber crime can be in the form of cyber stalking, distributing
pornography, trafficking and “grooming”. Today, law enforcement agencies are taking this
category of cyber crime very seriously and are joining forces internationally to reach and arrest
the perpetrators.
2.Property: Just like in the real world where a criminal can steal and rob, even in the cyber world
criminals resort to stealing and robbing. In this case, they can steal a person’s bank details and
siphon off money; misuse the credit card to make numerous purchases online; run a scam to get
naïve people to part with their hard earned money; use malicious software to gain access to an
organization’s website or disrupt the systems of the organization. The malicious software can
also damage software and hardware, just like vandals damage property in the offline world.
3.Government: Although not as common as the other two categories, crimes against a
government are referred to as cyber terrorism. If successful, this category can wreak havoc and
cause panic amongst the civilian population. In this category, criminals hack government
websites, military websites or circulate propaganda. The perpetrators can be terrorist outfits or
unfriendly governments of other nations.
Solution
Cyber Crime:
As Internet usage is growing daily the world is coming closer. The World Wide Web sounds like
a vast phenomenon but surprisingly one of its qualities is bringing the world closer making it a
smaller place to live in for its users. However, it has also managed to create another problem for
people who spend long hours browsing the Cyber World – which is cyber crimes. While law
enforcement agencies are trying to tackle this problem, it is growing steadily and many people
have become victims of hacking, theft, identity theft and malicious software. One of the best
ways to avoid being a victim of cyber crimes and protecting your sensitive information is by
making use of impenetrable security that uses a unified system of software and hardware to
authenticate any information that is sent or accessed over the Internet. However, before you can
understand more about this system, let us find out more about cyber crimes.
Types of Cyber Crimes:
When any crime is committed over the Internet it is referred to as a cyber crime. There are many
types of cyber crimes and the most common ones are explained below:
1.Hacking: This is a type of crime wherein a person’s computer is broken into so that his
personal or sensitive information can be accessed. In the United States, hacking is classified as a
felony and punishable as such. This is different from ethical hacking, which many organizations
use to check their Internet security protection. In hacking, the criminal uses a variety of software
to enter a person’s computer and the person may not be aware that his computer is being
accessed from a remote location.
2.Theft: This crime occurs when a person violates copyrights and downloads music, movies,
games and software. There are even peer sharing websites which encourage software piracy and
many of these websites are now being targeted by the FBI. Today, the justice system is
addressing this cyber crime and there are laws that prevent people from illegal downloading.
3.Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage
of online messages and emails. Typically, these stalkers know their victims and instead of
resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber
stalking is not having the desired effect, they begin offline stalking along with cyber stalking to
make the victims’ lives more miserable.
4.Identity Theft: This has become a major problem with people using the Internet for cash
transactions and banking services. In this cyber crime, a criminal accesses data about a person’s
bank account, credit cards, Social Security, debit card and other sensitive information to siphon
money or to buy things online in the victim’s name. It can result in major financial losses for the
victim and even spoil the victim’s credit history.
5.Malicious Software: These are Internet-based software or programs that are used to disrupt a
network. The software is used to gain access to a system to steal sensitive information or data or
causing damage to software present in the system.
6.Child soliciting and Abuse: This is also a type of cyber crime wherein criminals solicit minors
via chat rooms for the purpose of child pornography. The FBI has been spending a lot of time
monitoring chat rooms frequented by children with the hopes of reducing and preventing child
abuse and soliciting.
Causes of Cyber Crime:
Wherever the rate of return on investment is high and the risk is low, you are bound to find
people willing to take advantage of the situation. This is exactly what happens in cyber crime.
Accessing sensitive information and data and using it means a rich harvest of returns and
catching such criminals is difficult. Hence, this has led to a rise in cyber crime across the world.
Categories of Cyber Crime:
Cyber crimes are broadly categorized into three categories, namely crime against
Each category can use a variety of methods and the methods used vary from one criminal to
another.
1.Individual: This type of cyber crime can be in the form of cyber stalking, distributing
pornography, trafficking and “grooming”. Today, law enforcement agencies are taking this
category of cyber crime very seriously and are joining forces internationally to reach and arrest
the perpetrators.
2.Property: Just like in the real world where a criminal can steal and rob, even in the cyber world
criminals resort to stealing and robbing. In this case, they can steal a person’s bank details and
siphon off money; misuse the credit card to make numerous purchases online; run a scam to get
naïve people to part with their hard earned money; use malicious software to gain access to an
organization’s website or disrupt the systems of the organization. The malicious software can
also damage software and hardware, just like vandals damage property in the offline world.
3.Government: Although not as common as the other two categories, crimes against a
government are referred to as cyber terrorism. If successful, this category can wreak havoc and
cause panic amongst the civilian population. In this category, criminals hack government
websites, military websites or circulate propaganda. The perpetrators can be terrorist outfits or
unfriendly governments of other nations.

More Related Content

Similar to Cyber CrimeAs Internet usage is growing daily the world is coming.pdf

Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
Gaurav Patel
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
Aparajeeta Salu
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
BadarHossain
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
Best Online Paper Writing Service
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
jcgevana
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
IJARIIT
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
chrixymae
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
Write My Statistics Paper Vestal
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Fit Tri
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
CA.Kolluru Narayanarao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
Kolluru N Rao
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
Neeraj Ahirwar
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
Jody Sullivan
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Sibesh Singh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
cyber crime
 cyber crime  cyber crime
cyber crime
shobhapalpari123
 

Similar to Cyber CrimeAs Internet usage is growing daily the world is coming.pdf (20)

Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
 cyber crime  cyber crime
cyber crime
 

More from vichu19891

1. Copper is above silver in the activity series. Thus Cu metal will.pdf
1. Copper is above silver in the activity series. Thus Cu metal will.pdf1. Copper is above silver in the activity series. Thus Cu metal will.pdf
1. Copper is above silver in the activity series. Thus Cu metal will.pdf
vichu19891
 
using recursive method .pdf
  using recursive method .pdf  using recursive method .pdf
using recursive method .pdf
vichu19891
 
a. Population - families in the state of Florida b. Variable .pdf
 a. Population - families in the state of Florida b. Variable .pdf a. Population - families in the state of Florida b. Variable .pdf
a. Population - families in the state of Florida b. Variable .pdf
vichu19891
 
there is no reaction between HNO3 and KCl. S.pdf
                     there is no reaction between HNO3 and KCl.  S.pdf                     there is no reaction between HNO3 and KCl.  S.pdf
there is no reaction between HNO3 and KCl. S.pdf
vichu19891
 
The thickness of non-saturated zone and physico-c.pdf
                     The thickness of non-saturated zone and physico-c.pdf                     The thickness of non-saturated zone and physico-c.pdf
The thickness of non-saturated zone and physico-c.pdf
vichu19891
 
The folding process of proteins is hierarchical, .pdf
                     The folding process of proteins is hierarchical, .pdf                     The folding process of proteins is hierarchical, .pdf
The folding process of proteins is hierarchical, .pdf
vichu19891
 
Step1 ppt of PbCl2 are soluble in hot water. Ste.pdf
                     Step1 ppt of PbCl2 are soluble in hot water.  Ste.pdf                     Step1 ppt of PbCl2 are soluble in hot water.  Ste.pdf
Step1 ppt of PbCl2 are soluble in hot water. Ste.pdf
vichu19891
 
Should take off H from SH group, forming RS-Na+ s.pdf
                     Should take off H from SH group, forming RS-Na+ s.pdf                     Should take off H from SH group, forming RS-Na+ s.pdf
Should take off H from SH group, forming RS-Na+ s.pdf
vichu19891
 
Rest are okay but B) I think should be vanderwall.pdf
                     Rest are okay but B) I think should be vanderwall.pdf                     Rest are okay but B) I think should be vanderwall.pdf
Rest are okay but B) I think should be vanderwall.pdf
vichu19891
 
pH =4.217 pH = - log(concentration of H+) = -log .pdf
                     pH =4.217 pH = - log(concentration of H+) = -log .pdf                     pH =4.217 pH = - log(concentration of H+) = -log .pdf
pH =4.217 pH = - log(concentration of H+) = -log .pdf
vichu19891
 
Liquids may change to a vapor at temperatures bel.pdf
                     Liquids may change to a vapor at temperatures bel.pdf                     Liquids may change to a vapor at temperatures bel.pdf
Liquids may change to a vapor at temperatures bel.pdf
vichu19891
 
intra extra equilibrium potential mEqL mEqL 1.pdf
                     intra extra equilibrium potential  mEqL mEqL  1.pdf                     intra extra equilibrium potential  mEqL mEqL  1.pdf
intra extra equilibrium potential mEqL mEqL 1.pdf
vichu19891
 
Which of the following forms of DES is considered the most vulnerabl.pdf
Which of the following forms of DES is considered the most vulnerabl.pdfWhich of the following forms of DES is considered the most vulnerabl.pdf
Which of the following forms of DES is considered the most vulnerabl.pdf
vichu19891
 
This is actually pretty simple, so Ill help explain. Take a gi.pdf
This is actually pretty simple, so Ill help explain. Take a gi.pdfThis is actually pretty simple, so Ill help explain. Take a gi.pdf
This is actually pretty simple, so Ill help explain. Take a gi.pdf
vichu19891
 
There are many test IPv6 networks deployed across the world. For act.pdf
There are many test IPv6 networks deployed across the world. For act.pdfThere are many test IPv6 networks deployed across the world. For act.pdf
There are many test IPv6 networks deployed across the world. For act.pdf
vichu19891
 
The three ways of presenting the changes in the balance of the Compr.pdf
The three ways of presenting the changes in the balance of the Compr.pdfThe three ways of presenting the changes in the balance of the Compr.pdf
The three ways of presenting the changes in the balance of the Compr.pdf
vichu19891
 
The RASopathies are a group of genetic syndromes caused by germline .pdf
The RASopathies are a group of genetic syndromes caused by germline .pdfThe RASopathies are a group of genetic syndromes caused by germline .pdf
The RASopathies are a group of genetic syndromes caused by germline .pdf
vichu19891
 
ThanksSolutionThanks.pdf
ThanksSolutionThanks.pdfThanksSolutionThanks.pdf
ThanksSolutionThanks.pdf
vichu19891
 
Step1 In O2 ; we have 2 unpaired electrons which occupy pi 2p Anti.pdf
Step1 In O2 ; we have 2 unpaired electrons which occupy pi 2p  Anti.pdfStep1 In O2 ; we have 2 unpaired electrons which occupy pi 2p  Anti.pdf
Step1 In O2 ; we have 2 unpaired electrons which occupy pi 2p Anti.pdf
vichu19891
 
Quartzite is sandstone that has been converted to a solid quartz roc.pdf
Quartzite is sandstone that has been converted to a solid quartz roc.pdfQuartzite is sandstone that has been converted to a solid quartz roc.pdf
Quartzite is sandstone that has been converted to a solid quartz roc.pdf
vichu19891
 

More from vichu19891 (20)

1. Copper is above silver in the activity series. Thus Cu metal will.pdf
1. Copper is above silver in the activity series. Thus Cu metal will.pdf1. Copper is above silver in the activity series. Thus Cu metal will.pdf
1. Copper is above silver in the activity series. Thus Cu metal will.pdf
 
using recursive method .pdf
  using recursive method .pdf  using recursive method .pdf
using recursive method .pdf
 
a. Population - families in the state of Florida b. Variable .pdf
 a. Population - families in the state of Florida b. Variable .pdf a. Population - families in the state of Florida b. Variable .pdf
a. Population - families in the state of Florida b. Variable .pdf
 
there is no reaction between HNO3 and KCl. S.pdf
                     there is no reaction between HNO3 and KCl.  S.pdf                     there is no reaction between HNO3 and KCl.  S.pdf
there is no reaction between HNO3 and KCl. S.pdf
 
The thickness of non-saturated zone and physico-c.pdf
                     The thickness of non-saturated zone and physico-c.pdf                     The thickness of non-saturated zone and physico-c.pdf
The thickness of non-saturated zone and physico-c.pdf
 
The folding process of proteins is hierarchical, .pdf
                     The folding process of proteins is hierarchical, .pdf                     The folding process of proteins is hierarchical, .pdf
The folding process of proteins is hierarchical, .pdf
 
Step1 ppt of PbCl2 are soluble in hot water. Ste.pdf
                     Step1 ppt of PbCl2 are soluble in hot water.  Ste.pdf                     Step1 ppt of PbCl2 are soluble in hot water.  Ste.pdf
Step1 ppt of PbCl2 are soluble in hot water. Ste.pdf
 
Should take off H from SH group, forming RS-Na+ s.pdf
                     Should take off H from SH group, forming RS-Na+ s.pdf                     Should take off H from SH group, forming RS-Na+ s.pdf
Should take off H from SH group, forming RS-Na+ s.pdf
 
Rest are okay but B) I think should be vanderwall.pdf
                     Rest are okay but B) I think should be vanderwall.pdf                     Rest are okay but B) I think should be vanderwall.pdf
Rest are okay but B) I think should be vanderwall.pdf
 
pH =4.217 pH = - log(concentration of H+) = -log .pdf
                     pH =4.217 pH = - log(concentration of H+) = -log .pdf                     pH =4.217 pH = - log(concentration of H+) = -log .pdf
pH =4.217 pH = - log(concentration of H+) = -log .pdf
 
Liquids may change to a vapor at temperatures bel.pdf
                     Liquids may change to a vapor at temperatures bel.pdf                     Liquids may change to a vapor at temperatures bel.pdf
Liquids may change to a vapor at temperatures bel.pdf
 
intra extra equilibrium potential mEqL mEqL 1.pdf
                     intra extra equilibrium potential  mEqL mEqL  1.pdf                     intra extra equilibrium potential  mEqL mEqL  1.pdf
intra extra equilibrium potential mEqL mEqL 1.pdf
 
Which of the following forms of DES is considered the most vulnerabl.pdf
Which of the following forms of DES is considered the most vulnerabl.pdfWhich of the following forms of DES is considered the most vulnerabl.pdf
Which of the following forms of DES is considered the most vulnerabl.pdf
 
This is actually pretty simple, so Ill help explain. Take a gi.pdf
This is actually pretty simple, so Ill help explain. Take a gi.pdfThis is actually pretty simple, so Ill help explain. Take a gi.pdf
This is actually pretty simple, so Ill help explain. Take a gi.pdf
 
There are many test IPv6 networks deployed across the world. For act.pdf
There are many test IPv6 networks deployed across the world. For act.pdfThere are many test IPv6 networks deployed across the world. For act.pdf
There are many test IPv6 networks deployed across the world. For act.pdf
 
The three ways of presenting the changes in the balance of the Compr.pdf
The three ways of presenting the changes in the balance of the Compr.pdfThe three ways of presenting the changes in the balance of the Compr.pdf
The three ways of presenting the changes in the balance of the Compr.pdf
 
The RASopathies are a group of genetic syndromes caused by germline .pdf
The RASopathies are a group of genetic syndromes caused by germline .pdfThe RASopathies are a group of genetic syndromes caused by germline .pdf
The RASopathies are a group of genetic syndromes caused by germline .pdf
 
ThanksSolutionThanks.pdf
ThanksSolutionThanks.pdfThanksSolutionThanks.pdf
ThanksSolutionThanks.pdf
 
Step1 In O2 ; we have 2 unpaired electrons which occupy pi 2p Anti.pdf
Step1 In O2 ; we have 2 unpaired electrons which occupy pi 2p  Anti.pdfStep1 In O2 ; we have 2 unpaired electrons which occupy pi 2p  Anti.pdf
Step1 In O2 ; we have 2 unpaired electrons which occupy pi 2p Anti.pdf
 
Quartzite is sandstone that has been converted to a solid quartz roc.pdf
Quartzite is sandstone that has been converted to a solid quartz roc.pdfQuartzite is sandstone that has been converted to a solid quartz roc.pdf
Quartzite is sandstone that has been converted to a solid quartz roc.pdf
 

Recently uploaded

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 

Cyber CrimeAs Internet usage is growing daily the world is coming.pdf

  • 1. Cyber Crime: As Internet usage is growing daily the world is coming closer. The World Wide Web sounds like a vast phenomenon but surprisingly one of its qualities is bringing the world closer making it a smaller place to live in for its users. However, it has also managed to create another problem for people who spend long hours browsing the Cyber World – which is cyber crimes. While law enforcement agencies are trying to tackle this problem, it is growing steadily and many people have become victims of hacking, theft, identity theft and malicious software. One of the best ways to avoid being a victim of cyber crimes and protecting your sensitive information is by making use of impenetrable security that uses a unified system of software and hardware to authenticate any information that is sent or accessed over the Internet. However, before you can understand more about this system, let us find out more about cyber crimes. Types of Cyber Crimes: When any crime is committed over the Internet it is referred to as a cyber crime. There are many types of cyber crimes and the most common ones are explained below: 1.Hacking: This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed. In the United States, hacking is classified as a felony and punishable as such. This is different from ethical hacking, which many organizations use to check their Internet security protection. In hacking, the criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location. 2.Theft: This crime occurs when a person violates copyrights and downloads music, movies, games and software. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI. Today, the justice system is addressing this cyber crime and there are laws that prevent people from illegal downloading. 3.Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims’ lives more miserable. 4.Identity Theft: This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history. 5.Malicious Software: These are Internet-based software or programs that are used to disrupt a
  • 2. network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system. 6.Child soliciting and Abuse: This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography. The FBI has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting. Causes of Cyber Crime: Wherever the rate of return on investment is high and the risk is low, you are bound to find people willing to take advantage of the situation. This is exactly what happens in cyber crime. Accessing sensitive information and data and using it means a rich harvest of returns and catching such criminals is difficult. Hence, this has led to a rise in cyber crime across the world. Categories of Cyber Crime: Cyber crimes are broadly categorized into three categories, namely crime against Each category can use a variety of methods and the methods used vary from one criminal to another. 1.Individual: This type of cyber crime can be in the form of cyber stalking, distributing pornography, trafficking and “grooming”. Today, law enforcement agencies are taking this category of cyber crime very seriously and are joining forces internationally to reach and arrest the perpetrators. 2.Property: Just like in the real world where a criminal can steal and rob, even in the cyber world criminals resort to stealing and robbing. In this case, they can steal a person’s bank details and siphon off money; misuse the credit card to make numerous purchases online; run a scam to get naïve people to part with their hard earned money; use malicious software to gain access to an organization’s website or disrupt the systems of the organization. The malicious software can also damage software and hardware, just like vandals damage property in the offline world. 3.Government: Although not as common as the other two categories, crimes against a government are referred to as cyber terrorism. If successful, this category can wreak havoc and cause panic amongst the civilian population. In this category, criminals hack government websites, military websites or circulate propaganda. The perpetrators can be terrorist outfits or unfriendly governments of other nations. Solution Cyber Crime: As Internet usage is growing daily the world is coming closer. The World Wide Web sounds like
  • 3. a vast phenomenon but surprisingly one of its qualities is bringing the world closer making it a smaller place to live in for its users. However, it has also managed to create another problem for people who spend long hours browsing the Cyber World – which is cyber crimes. While law enforcement agencies are trying to tackle this problem, it is growing steadily and many people have become victims of hacking, theft, identity theft and malicious software. One of the best ways to avoid being a victim of cyber crimes and protecting your sensitive information is by making use of impenetrable security that uses a unified system of software and hardware to authenticate any information that is sent or accessed over the Internet. However, before you can understand more about this system, let us find out more about cyber crimes. Types of Cyber Crimes: When any crime is committed over the Internet it is referred to as a cyber crime. There are many types of cyber crimes and the most common ones are explained below: 1.Hacking: This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed. In the United States, hacking is classified as a felony and punishable as such. This is different from ethical hacking, which many organizations use to check their Internet security protection. In hacking, the criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location. 2.Theft: This crime occurs when a person violates copyrights and downloads music, movies, games and software. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI. Today, the justice system is addressing this cyber crime and there are laws that prevent people from illegal downloading. 3.Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims’ lives more miserable. 4.Identity Theft: This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history. 5.Malicious Software: These are Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system. 6.Child soliciting and Abuse: This is also a type of cyber crime wherein criminals solicit minors
  • 4. via chat rooms for the purpose of child pornography. The FBI has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting. Causes of Cyber Crime: Wherever the rate of return on investment is high and the risk is low, you are bound to find people willing to take advantage of the situation. This is exactly what happens in cyber crime. Accessing sensitive information and data and using it means a rich harvest of returns and catching such criminals is difficult. Hence, this has led to a rise in cyber crime across the world. Categories of Cyber Crime: Cyber crimes are broadly categorized into three categories, namely crime against Each category can use a variety of methods and the methods used vary from one criminal to another. 1.Individual: This type of cyber crime can be in the form of cyber stalking, distributing pornography, trafficking and “grooming”. Today, law enforcement agencies are taking this category of cyber crime very seriously and are joining forces internationally to reach and arrest the perpetrators. 2.Property: Just like in the real world where a criminal can steal and rob, even in the cyber world criminals resort to stealing and robbing. In this case, they can steal a person’s bank details and siphon off money; misuse the credit card to make numerous purchases online; run a scam to get naïve people to part with their hard earned money; use malicious software to gain access to an organization’s website or disrupt the systems of the organization. The malicious software can also damage software and hardware, just like vandals damage property in the offline world. 3.Government: Although not as common as the other two categories, crimes against a government are referred to as cyber terrorism. If successful, this category can wreak havoc and cause panic amongst the civilian population. In this category, criminals hack government websites, military websites or circulate propaganda. The perpetrators can be terrorist outfits or unfriendly governments of other nations.