SlideShare a Scribd company logo
1 of 32
Introduction
History of cyber crime
What is cyber crime?
Classification
Types of cyber crime
Cyber criminals
Prevention
Conclusion
 Cyber crime is an “unlawful acts wherein the computer
is either a tool or target or both”
The term “cyber crime” was first coined by Barry
Collins in 1980’s.
Criminals simply devise different ways to undertake
standard criminal activities such as fraud theft, blackmail,
forgery using the new medium, often involving the
Internet.
 The first recorded cyber crime took place in the year
1820!
The first spam email took place in 1978 when it was
sent out over the Arpanet.
 The first virus was installed on an Apple computer in
1982.
Denial of Service (DoS) attacks by „Mafia Boy‟ on
eBay, Yahoo! and other popular sites (2000)
 FBI's e-mail system is hacked (Feb,2005)
“Cybercrime is criminal activity done using computers and the Internet.”

Criminal activity involving






Information technology infrastructure
Illegal access
Data interference
Misuse of devices
Forgery and
Electronic fraud.
 Against Individuals

 Against Organization

 Against Society
 Harassment via e-mails

 Email spoofing
 Defamation. Unauthorized control/access

over computer system
 Cheating & Fraud
 Phishing
Unauthorized

control/access over
computer system.
Possession

of unauthorized information.

Cyber

terrorism against the government
organization.
Distribution

of pirated software etc.
Polluting the youth through

indecent exposure.
 Trafficking
 Financial crimes
 Sale of illegal articles
 Online gambling
 Forgery











Hacking
Phishing
Cyber Stalking
Denial of service attack
Virus Dissemination
Computer Vandalism
Cyber Terrorism
Software Piracy
Email spoofing
Trojan attacks
 Hacking in simple terms means an illegal intrusion
into a computer system and/or network .Also called
as cracking!

Hacking means finding out weaknesses in an
established system and exploiting them. A
computer hacker is a person who finds out
weaknesses in the computer and exploits it.









For profit, protest, or challenge.
A large fraction of hacker attacks have been
pranks
Financial Gain
Revenge
Venting anger at a company or organization
Terrorism
A deception designed to steal valuable personal data,
such as credit card numbers, passwords, account data,
or other information.
In order for Internet criminals to successfully “phish”
a personal information, they must go from an email to a
website.
It is the use of the Internet or other electronic
means to stalk someone.
This term is used interchangeably with online
harassment and online abuse.
 Attack through which a person can render a system
unusable or significantly slow down the system for
legitimate users by overloading the system so that no
one else can use it.
 Act by the criminal, who floods the bandwidth of
the victims network.
Malicious software that attaches itself to other
software. (virus, worms, Trojan Horse etc.)
 Damaging or destroying data rather than stealing.
 Transmitting virus
Use of Internet based attacks in terrorist activities.
Technology savvy terrorists are using 512-bit
encryption, which is impossible to decrypt.
Theft of software through the illegal copying of
genuine programs.
Distribution of products intended to pass for
the original.
A spoofed email is one that appears to originate from
one source but actually has been sent from another
source.
The program that act like something useful but do
the things that are quiet damping. The programs of
this kind are called as Trojans.
Insider Threats

Hackers

Hactivists'

(employees)

(teenage thrill-seekers to
sophisticated criminals)

(overloads e-mail servers or hack
web sites to send political
message)

Virus writers

Criminal
groups

Sensitive
intrusions

(attack systems & steal
password for financial gain)

(sensitive information is
obtained via computer
intrusions)

Terrorists

Cyber Warfare

(who have potential to disrupt
government systems with
computer attacks)

(attack by sovereigns --- Crime
or Declaration of war)

(writes viruses to that infect
systems)

Information
warfare
(alternative to military attacks)
Cyber Crime

In

India

 The majority of cybercrimes are centered on fraud and Phishing,
 India is the third-most targeted country for Phishing attacks after
the US and the UK,
 Social networks as well as ecommerce sites are major targets,
 6.9 million bot-infected systems in 2010,
 14,348 website defacements in 2010,
 6,850 .in and 4,150 .com domains were defaced during 2011,
 15,000 sites hacked in 2011,
 India is the number 1 country in the world for generating spam.
 Anti-virus software

 Firewalls.
 Safe surfing.

 Frequent virus checks.
 Email filters.
Frequent password changing.
History is the witness that no legislation has succeeded in
totally eliminating crime.
We need to bring changes in the Information Technology
Act to make it more effective to combat cyber crime.
 User awareness is key to a secure computer/network
 Do not open suspicious files/emails
 Avoid using P2P programs
 Avoid downloading freeware
Cybercrime
Cybercrime

More Related Content

What's hot (20)

Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
CYBER CRIME ppt
CYBER CRIME pptCYBER CRIME ppt
CYBER CRIME ppt
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Viewers also liked

computer crime
computer crimecomputer crime
computer crime00jitesh00
 
Computer crime
Computer crimeComputer crime
Computer crimenurdiva123
 
Cyber Crime : Incident Highlights of 2011-2012
Cyber Crime : Incident Highlights of 2011-2012Cyber Crime : Incident Highlights of 2011-2012
Cyber Crime : Incident Highlights of 2011-2012tejant
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime finalHarsha Matta
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Förändringsstegen
FörändringsstegenFörändringsstegen
FörändringsstegenNino Baraka
 
Co-operative education
 Co-operative education Co-operative education
Co-operative educationHassan Hamed
 
Giai phap chu_yeu_nham_nang_cao_nang_luc_canh_tranh_cua_cong_ty_chung_khoan_t...
Giai phap chu_yeu_nham_nang_cao_nang_luc_canh_tranh_cua_cong_ty_chung_khoan_t...Giai phap chu_yeu_nham_nang_cao_nang_luc_canh_tranh_cua_cong_ty_chung_khoan_t...
Giai phap chu_yeu_nham_nang_cao_nang_luc_canh_tranh_cua_cong_ty_chung_khoan_t...Tran Quyen
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 

Viewers also liked (20)

computer crime
computer crimecomputer crime
computer crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime : Incident Highlights of 2011-2012
Cyber Crime : Incident Highlights of 2011-2012Cyber Crime : Incident Highlights of 2011-2012
Cyber Crime : Incident Highlights of 2011-2012
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Self study presentation
Self study presentationSelf study presentation
Self study presentation
 
Tr ee executive planning
Tr ee   executive planningTr ee   executive planning
Tr ee executive planning
 
Förändringsstegen
FörändringsstegenFörändringsstegen
Förändringsstegen
 
Nidhila .i
Nidhila .iNidhila .i
Nidhila .i
 
Co-operative education
 Co-operative education Co-operative education
Co-operative education
 
Breaks
BreaksBreaks
Breaks
 
Logo
LogoLogo
Logo
 
Hello_blue
Hello_blueHello_blue
Hello_blue
 
Giai phap chu_yeu_nham_nang_cao_nang_luc_canh_tranh_cua_cong_ty_chung_khoan_t...
Giai phap chu_yeu_nham_nang_cao_nang_luc_canh_tranh_cua_cong_ty_chung_khoan_t...Giai phap chu_yeu_nham_nang_cao_nang_luc_canh_tranh_cua_cong_ty_chung_khoan_t...
Giai phap chu_yeu_nham_nang_cao_nang_luc_canh_tranh_cua_cong_ty_chung_khoan_t...
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 

Similar to Cybercrime

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Internet
InternetInternet
InternetJodip
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and historygururaj lulkarni
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics sunanditaAnand
 

Similar to Cybercrime (20)

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Internet
InternetInternet
Internet
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Final ppt
Final pptFinal ppt
Final ppt
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 

Cybercrime

  • 1.
  • 2. Introduction History of cyber crime What is cyber crime? Classification Types of cyber crime Cyber criminals Prevention Conclusion
  • 3.  Cyber crime is an “unlawful acts wherein the computer is either a tool or target or both” The term “cyber crime” was first coined by Barry Collins in 1980’s. Criminals simply devise different ways to undertake standard criminal activities such as fraud theft, blackmail, forgery using the new medium, often involving the Internet.
  • 4.  The first recorded cyber crime took place in the year 1820! The first spam email took place in 1978 when it was sent out over the Arpanet.  The first virus was installed on an Apple computer in 1982. Denial of Service (DoS) attacks by „Mafia Boy‟ on eBay, Yahoo! and other popular sites (2000)  FBI's e-mail system is hacked (Feb,2005)
  • 5. “Cybercrime is criminal activity done using computers and the Internet.” Criminal activity involving      Information technology infrastructure Illegal access Data interference Misuse of devices Forgery and Electronic fraud.
  • 6.  Against Individuals  Against Organization  Against Society
  • 7.  Harassment via e-mails  Email spoofing  Defamation. Unauthorized control/access over computer system  Cheating & Fraud  Phishing
  • 8. Unauthorized control/access over computer system. Possession of unauthorized information. Cyber terrorism against the government organization. Distribution of pirated software etc.
  • 9. Polluting the youth through indecent exposure.  Trafficking  Financial crimes  Sale of illegal articles  Online gambling  Forgery
  • 10.           Hacking Phishing Cyber Stalking Denial of service attack Virus Dissemination Computer Vandalism Cyber Terrorism Software Piracy Email spoofing Trojan attacks
  • 11.
  • 12.  Hacking in simple terms means an illegal intrusion into a computer system and/or network .Also called as cracking! Hacking means finding out weaknesses in an established system and exploiting them. A computer hacker is a person who finds out weaknesses in the computer and exploits it.
  • 13.       For profit, protest, or challenge. A large fraction of hacker attacks have been pranks Financial Gain Revenge Venting anger at a company or organization Terrorism
  • 14.
  • 15. A deception designed to steal valuable personal data, such as credit card numbers, passwords, account data, or other information. In order for Internet criminals to successfully “phish” a personal information, they must go from an email to a website.
  • 16. It is the use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse.
  • 17.  Attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the system so that no one else can use it.  Act by the criminal, who floods the bandwidth of the victims network.
  • 18. Malicious software that attaches itself to other software. (virus, worms, Trojan Horse etc.)
  • 19.  Damaging or destroying data rather than stealing.  Transmitting virus
  • 20. Use of Internet based attacks in terrorist activities. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 21. Theft of software through the illegal copying of genuine programs. Distribution of products intended to pass for the original.
  • 22. A spoofed email is one that appears to originate from one source but actually has been sent from another source.
  • 23. The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans.
  • 24. Insider Threats Hackers Hactivists' (employees) (teenage thrill-seekers to sophisticated criminals) (overloads e-mail servers or hack web sites to send political message) Virus writers Criminal groups Sensitive intrusions (attack systems & steal password for financial gain) (sensitive information is obtained via computer intrusions) Terrorists Cyber Warfare (who have potential to disrupt government systems with computer attacks) (attack by sovereigns --- Crime or Declaration of war) (writes viruses to that infect systems) Information warfare (alternative to military attacks)
  • 25.
  • 26. Cyber Crime In India  The majority of cybercrimes are centered on fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam.
  • 27.  Anti-virus software  Firewalls.  Safe surfing.  Frequent virus checks.  Email filters. Frequent password changing.
  • 28.
  • 29.
  • 30. History is the witness that no legislation has succeeded in totally eliminating crime. We need to bring changes in the Information Technology Act to make it more effective to combat cyber crime.  User awareness is key to a secure computer/network  Do not open suspicious files/emails  Avoid using P2P programs  Avoid downloading freeware