Cyber crime is an activity done using computers and internet.
Cyber forensics is the science of collecting, examining, analyzing and reporting electronic evidence.
4. Cyber Crime is nothing but
where the computer used as
an object or subject of
crime..
Cyber Crime is nothing but where the
computer used as an object or subject of
crime…
5. HISTORY OF CYBER CRIME
The first recorded cyber crime took place in the year
1820.
The first spam email took place in 1976 when it was
sent out over the ARPANET.
The first virus was installed on an Apple computer in
1982.
6. CATEGORIES OF CYBER CRIME
Using a computer to commit real world crime
e.g. cyber terrorism, credit card fraud, cyber bullying etc.
Using a computer to attack other computers
e.g. Hacking, virus/worms attacks, software piracy etc.
Individuals Property Government
10. Hacking in simple
terms means an
illegal intrusion into a
computer system
without permission
of the owner/user.
It is also known as
CRACKING. It is use of the
Internet or other
electronic means to
bully and stalk
someone. These
terms are used
interchangeably with
online harassment
and online abuse.
11. It is a process of a
Malicious software that
attaches itself to other
software.
(Virus , Worms, Trojan
Horse ,Web Jacking, E-
mail Bombing Etc.) An attack which floods a computer
or website with data, causing it to
overload and prevent it from
functioning properly. It is an explicit
attempt by attackers to deny service
to intended users of that service.
12. It is the use of the Internet
to conduct violent acts that
result in, or threaten, loss of
life or significant bodily
harm. use of Internet based
attacks in terrorist activities.
Damaging or destroying data rather
than stealing or misusing them is
called cyber vandalism.
13. Identity theft occurs when a criminal
gains access to our personal information
(such as our name, address, date of birth
or bank account details) to steal money
or gain other benefits. Also known as
identity fraud.
Software piracy is the unauthorised use
and distribution of computer software.
14. A spoofed email is one
that appears to
originate from one
source but actually has
been sent from another
source.
This a technique of extracting
confidential information such as credit
card numbers and username-
password by masquerading as a
legitimate enterprise.
It is a way that criminals trick people
into giving out their personal or
financial details.
Spam is electronic junk
mail – unsolicited
messages sent by email,
text message without
the recipient’s consent..
15. Vishing is the criminal practice
of using social engineering and
Voice over IP(VoIP) to gain
access to private personal and financial information
from the public for the purpose of financial reward.
Vishing is typically used to steal credit card numbers or
other information used in identity theft schemes from
individuals.
16. India stands 11th in the ranking for Cyber Crime in the
World, constituting 3% of the Global Cyber Crime.
18. WAYS TO PREVENT CYBER CRIME
Never disclose your personal information publicly on websites.
Always avoid sending any photograph online particularly to strangers .
Never enter your credit card number to any site that is not secured, to prevent its misuse.
Always use latest and updated Antivirus software to guard against virus attacks.
To prevent loss of data due to virus attacks, always keep back up of your data.
Website owners should watch traffic and check any irregularity on the site.
Use of firewalls proves beneficial.
19. Cyber forensics is the
science of collecting,
examining, analyzing
and reporting
electronic evidence.
It is an electronic
discovery technique
used to determine and
reveal technical
criminal evidence.
CYBER FORENSICS
21. When dealing with digital evidence, all of the general
forensics and procedural principles must be applied.
Upon seizing digital evidence, actions taken should not
change that evidence.
When it is necessary for a person to access original
digital evidence, that person should be trained for that
purpose.
An individual is responsible for all actions taken with
respect to digital evidence.
23. Intellectual Property Theft
Employment Disputes
Fraud Investigations
Forgeries
Bankruptcy Investigations
Inappropriate email and
internet use in the work place
Regulatory Compliance
26. Though not all people are victims to cyber crimes, they are
still at risk.
Crimes by computer vary, and they don’t always occur
behind the computer, but they executed by computer.
The forensic examination of electronic systems has
undoubtedly been a huge success in the identification of
cyber and computer-assisted crime. Computer forensics is
an invaluable tool in the process.