Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber crime presentation


Published on

  • I pasted a website that might be helpful to you: ⇒ ⇐ Good luck!
    Are you sure you want to  Yes  No
    Your message goes here
  • You can try to use this service ⇒ ⇐ I have used it several times in college and was absolutely satisfied with the result.
    Are you sure you want to  Yes  No
    Your message goes here

Cyber crime presentation

  1. 1. • A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both” . • “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime” • Cyber crime is known by lots of different names, including computer crime, e-crime, or electronic crime. Introduction
  2. 2. Hacking - Hacking in simple terms means an illegal intrusion into a computer system without permission of computer owner/user. Hackers write or use ready-made computer programs to attack the target computer. Types of Cyber Crime
  3. 3. Virus Dissemination - Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious. Cyber Pornography - This would include pornographic websites; pornographic magazines produced using computers. The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. Intellectual Property Crimes - Intellectual property (IP) crime is a generic term used to describe a wide range of counterfeiting and piracy offences. These include software piracy, copyright infringement, trademarks violations, theft of computer source code etc.
  4. 4. Software Piracy - Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. The unauthorized copying of software.
  5. 5. Email spoofing - A spoofed email is one that appears to originate from one source but actually has been sent from another source. Cyber Stalking - The Oxford dictionary defines stalking as "pursuing stealthily". Cyber Stalking can be defined as the repeated acts harassment or threatening behavior of the cyber criminal towards the victim by using internet services.
  6. 6. Cyber Defamation - This occurs when defamation takes place with the help of computers and / or the Internet. Cyber Defamation is a crime conducted in cyberspace, usually through the Internet, with the intention of defaming others. Phishing - The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has .
  7. 7.  Unauthorized access to computer systems or networks  Theft of information contained in electronic form  Email bombing  Data diddling  Logic Bomb  Denial of Service attack  Virus / worm attacks  Trojan attacks FREQUENTLY USED CYBER CRIMES
  8. 8. REASONS FOR CYBER CRIMES  Capacity to store data in comparatively small space  Easy to access  Complex  Negligence
  9. 9. CYBER CRIMINALS  Children and adolescents between the age group of 6 – 18 years  Organised hackers  Professional hackers / crackers  Discontented employees
  10. 10. PREVENTION OF CYBER CRIME  Anti-virus software  Frequent password changing.  Firewalls  Safe surfing.  Frequent virus checks.  Email filters.  Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children
  11. 11. CONCLUSION Cyber crime is a multi-billion dollar problem. It is criminals activity committed on internet. This is a broad term that describes everything from electronic cracking to denial of service attacks that cause electronic commerce sites to loss money.
  12. 12. Thank You