2. What is Cyber Crime?
Crime committed using a computer
and the internet to steal a person’s
identity or illegal imports or
malicious programs cybercrime is
nothing but where the computer
used as an object or subject of crime
.
3. HISTORY:
The first recorded cyber crime took place in the
year 1820 That is not surprising considering the
fact that the abacus, which is thought to be the
earliest form of a computer, has been around since
3500 B.C.
4.
5. TYPES OF CYBER CRIME:
Hacking.
Denial of service
Attacks.
IRC Crime
Credit Card Fraud
Phishing
Spoofing
Salami Attacks
Pornography
Net Extortion
Software Piracy
6.
7. HACKING:
Hacking in simple terms
means an illegal intrusion
into a computer system
and/or network. It is also
known as CRACKING.
Government websites are
the hot targets of the
hackers due to the press
coverage, it receives.
Hackers enjoy the media
coverage..
8. DENIAL OF SERVICE
ATTACKS:
This is an act by the
criminal, who floods
the band width of
the victim’s network
or fills his e-mail box
with spam mail
depriving him of the
services he is entitled
to access or provide.
9.
10. IRC (INTERNET RELAY
CHAT):
Internet Relay Chat (IRC) servers have chat rooms in
which people from anywhere the world can come together
and chat with each other .Criminals use it for meeting
coconspirators. Hackers use it for discussing their exploits
/ sharing the techniques
Pedophiles use chat rooms to allure small children.
11. CREDIT CARD FRAUD:
You simply have to type
credit card number into
www page off the vendor
for online transaction If
electronic transactions
are not secured the credit
card numbers can be
stolen by the hackers who
can misuse this card by
impersonating the credit
card owner.
12.
13. PHISHING:
Phishing is the act of attempting to acquire information
such as usernames, passwords, and credit card details
(and sometimes, indirectly, money) by masquerading as a
trustworthy entity in an electronic communication.
Communications purporting to be from popular social web
sites, auction sites, online payment processors or IT
administrators are commonly used to lure the
unsuspecting public. Phishing emails may contain links to
websites that are infected with malware. Phishing is
typically carried out by e-mail spoofing or instant
messaging, and it often directs users to enter details at a
fake website whose look and feel are almost identical to
the legitimate one.
14. SOFTWARE PIRACY:
Theft of software through the
illegal copying of genuine
programs or the counterfeiting
and distribution of products
intended to pass for the
original. Retail revenue losses
world wide are ever
increasing due to this crime
Can be done in various ways
such as end user copying, hard
disk
loading, Counterfeiting, Illega
l downloads from the internet
etc
15. PORNOGRAPHY:
Pornography is the first
consistently successful ecommerce
product. It was a
deceptive marketing tactics and
mouse trapping technologies.
Pornography encourage
customers to access their
websites. Anybody including
children can log on to the
internet and access website with
pornography contents with a
click of a mouse.
16. VIRUS:
In computers, a virus is a program or programming code that
replicates by being copied or initiating its copying to another
program, computer boot sector or document. Viruses can be
transmitted as attachments to an e-mail note or in a downloaded
file, or be present on a diskette or CD. The immediate source of the
e-mail note, downloaded file, or diskette you've received is usually
unaware that it contains a virus. Some viruses wreak their effect
as soon as their code is executed; other viruses lie dormant until
circumstances cause their code to be executed by the computer.
(virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit
and Bacterium are the malicious softwares)
19. PRECAUTION TO STOP
CYBER CRIMES:
Update your virus
protection software often
at least once a week.
Change your password
frequently and never
give them out to
anyone! Use password
that are at least 6
characters and do not
contain words in the
20. Back Up your files very
regularly.
Don’t open suspicious
attachments. Always look at
the three letter file extension.
Don’t leave your
computer unattended
after logging in (And
always log out when
you are finished).