SlideShare a Scribd company logo
1 of 31
Download to read offline
Presented By:-
Sourav Kumar Mund
CONTENTS
 Introduction Cyber Crime
 History of Cyber Crime
 Classification Of Cyber Crime
 Categories Of Cyber Crime
 Types Of Cyber Crimes
 Who Are Cyber Criminals
 Cyber Crime In India
History Of Cyber Crime
 The First Recorded Cyber CrimeTook Place In
TheYear 1820!
 In 1981 Ian Murphy , Becomes First Felon
Convicted Of A Computer Crime .
 In 1982 Elk Cloner,Wrote An Apple Ii Boot
Virus.
 In 1985 Online Hacking Magazine PhrackWas
Established
In 1986 Pakistani Brain,The OldestVirus
Created Under Unauthorised
Circumstances , Infects IBM Computers.
In 1987 Computer Emergency Response
Team (Cert) Created.
In 1988 Kevin Mitnick, Secretly Monitors
The Email Of MCI And Digital Equipment
Corporation (Dec) Security Officials. He Is
Convicted And SentencedTo AYear In Jail
Introduction Of Cyber Crime
 OffencesThat Are Committed Against Individuals Or GroupsOf
Individual.
 Computer Crime, Or Cybercrime, RefersTo Any CrimeThat
Involves A ComputerAnd A Network.
 The Computer May Have Been Used InThe Commission Of A
Crime, Or It May BeTheTarget.
 Netcrime Is Criminal Exploitation OfThe Internet.
 Such Crimes MayThreaten A Nation’s Security And Financial
Health. Issues SurroundingTheseTypes Of Crimes Have Become
High-profile.
 For Example: Cracking, Copyright Infringement, Child
PornographyAnd Child Grooming.
 Crime Committed Using A Computer AndThe Internet
To Steal A Person’s Identity Or Illegal Imports Or
Malicious Programs.
 Cyber Crime Is Nothing But WhereThe Computers Used
As An Objector Subject Of A Crime
Categories Of Cyber Crime
Cyber Crime Can Be Basically
Divided into 3 Major Categories.
 Cyber Crimes Against Persons
 Cyber Crimes Against Property
 Cyber Crime Against
Government
CYBER CRIME AGAINST PERSON
 Cyber harassment is a distinct Cyber crime.
Various kinds of harassment can and do
occur in cyberspace, or through the use of
cyberspace. Harassment can be sexual,
racial, religious, or other.
CYBER CRIME AGAINST PROPERTY
 These crimes include computer vandalism
(destruction of others' property),
transmission of harmful programs,
unauthorized trespassing through cyber
space, unauthorized possession of computer
information.
Cyber Crime Against Govt
 Cyber terrorism is one distinct kind of crime
in this category.
 Medium of Cyberspace is being used by
individuals and groups to threaten the
international governments as also to
terrorize the citizens of a country.
Types Of Cyber Crime
Hacking
Child pornography
Denial of service attack
Virus dissemination
Computer vandalism
Cyber terrorism
Software piracy
 Hacking means
Illegal intrusion
into a computer
system and/or
network.
 Also known as
CRACKING.
 Govt websites are the hot target of the hackers
due to the press coverage .
 Hackers enjoy the MEDIA COVERAGE.
CHILD PRONOGRAPHY
 The internet is being
highly used its abusers
to reach and abuse child-
-ren sexually, worldwide.
 Homes have access to
INTERNET .
 More children are using the internet and more are
the chances of falling victimto the AGRESSION of
pedophiles.
DENIAL OF SERVICE ATTACK
 This is an act by the
1. criminal who floods
2. the bandwidth of
3. the victims or fills
4. his email box with
5. a spam mail depriving
6. him of the services he
7. is entitled to access or
8. provide.
VIRUS DISSEMINATION
 Malicious software
that attaches itself
to other software
or computer system
and then propagates
itself to other comp
-uters via networks.
 Eg: virus ,worms ,
Trojan horse ,web
jacking ,email
bombing.
COMPUTER VANDALISM
 Damaging or destro
-ying data rather
than stealing or
misusing them
is called computer
vandalism.
CYBER TERRORISM
 Terrorist attack on the
internet is by distributed
denial of the service attacks.
hate websites and hate
emails attacks on the
sensitive computer
networks .etc.
 Technology savvy terrorists
are using 512-bit encryption,
which is impossible to
DECRYPT.
SOFTWARE PIRACY
 Theft of software through the illegal copying of
genuine programs or the COUNTERFEITING and
DISTRIBUTION OF PRODUCTS intended to pass
for the original.
MOST WANTED CRIMINALS IN FBI
COUNTRIES INVOLVED IN
CYBER CRIME
CYBER CRIME IN INDIA
 Cybercrimes are centred on forgery, fraud and
phishing.
 India is second most country of cyber crime.
 6.9 million boot-infected system in 2010.
 India lost 8 billion to cyber crime.
 14,348 websites defacements in 2010.
 6,850 in and 4,150 .com domains were defected
during 2011.
 15,000 sites hacked in 2011.
 India is the number 1 country in the world for
generating spam.
CYBER CRIME IN INDIA
CyberCrime
CYBER SECURITY
 Internet security is a branch of computer security
specially related to the internet.
 It’s objective is to establish rules and measure to
use against attacks over the internet.
Computer Security - Terminology
 People
 Hackers
 White Hat – Good guys. Report hacks/vulnerabilities
to appropriate people.
 Black Hat – Only interested in personal goals,
regardless of impact.
 Gray Hat – Somewhere in between.
Computer Security - Terminology
 Script Kiddies
 Someone that calls themselves a ‘hacker’ but
really isn’t
 Ethical Hacker
 Someone hired to hack a system to find
vulnerabilities and report on them.
 Also called a ‘sneaker’
Cyber Crime in Cinemas
Cyber Crime in Cinemas
 Use antivirus software.
 Insert firewalls.
 Uninstall unnecessary software
 Maintain unnecessary software.
 Maintain backup.
 Check security setting.
 Stay anonymous-choose a genderless screen name.
 Never give your full name or address to strangers.
THANK YOU

More Related Content

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to CyberCrime

Similar to CyberCrime (20)

ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Final ppt
Final pptFinal ppt
Final ppt
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 

Recently uploaded

Sales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales CoverageSales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales CoverageDista
 
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdfARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdfTobias Schneck
 
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...OnePlan Solutions
 
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Jaydeep Chhasatia
 
Webinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptWebinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptkinjal48
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?AmeliaSmith90
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies
 
OpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS CalculatorOpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS CalculatorShane Coughlan
 
Growing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesGrowing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesSoftwareMill
 
Deep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampDeep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampVICTOR MAESTRE RAMIREZ
 
ERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxAutus Cyber Tech
 
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLBig Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLAlluxio, Inc.
 
Fields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxFields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxJoão Esperancinha
 
Streamlining Your Application Builds with Cloud Native Buildpacks
Streamlining Your Application Builds  with Cloud Native BuildpacksStreamlining Your Application Builds  with Cloud Native Buildpacks
Streamlining Your Application Builds with Cloud Native BuildpacksVish Abrams
 
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine HarmonyLeveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmonyelliciumsolutionspun
 
Watermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesWatermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesShyamsundar Das
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionsNirav Modi
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilVICTOR MAESTRE RAMIREZ
 
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.Sharon Liu
 

Recently uploaded (20)

Sales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales CoverageSales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales Coverage
 
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdfARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
 
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
 
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
 
Webinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptWebinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.ppt
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in Trivandrum
 
OpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS CalculatorOpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS Calculator
 
Growing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesGrowing Oxen: channel operators and retries
Growing Oxen: channel operators and retries
 
Deep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampDeep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - Datacamp
 
ERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptx
 
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLBig Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
 
Fields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxFields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptx
 
Streamlining Your Application Builds with Cloud Native Buildpacks
Streamlining Your Application Builds  with Cloud Native BuildpacksStreamlining Your Application Builds  with Cloud Native Buildpacks
Streamlining Your Application Builds with Cloud Native Buildpacks
 
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine HarmonyLeveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
 
Salesforce AI Associate Certification.pptx
Salesforce AI Associate Certification.pptxSalesforce AI Associate Certification.pptx
Salesforce AI Associate Certification.pptx
 
Watermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesWatermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security Challenges
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspections
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-Council
 
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
 

CyberCrime

  • 2. CONTENTS  Introduction Cyber Crime  History of Cyber Crime  Classification Of Cyber Crime  Categories Of Cyber Crime  Types Of Cyber Crimes  Who Are Cyber Criminals  Cyber Crime In India
  • 3. History Of Cyber Crime  The First Recorded Cyber CrimeTook Place In TheYear 1820!  In 1981 Ian Murphy , Becomes First Felon Convicted Of A Computer Crime .  In 1982 Elk Cloner,Wrote An Apple Ii Boot Virus.  In 1985 Online Hacking Magazine PhrackWas Established
  • 4. In 1986 Pakistani Brain,The OldestVirus Created Under Unauthorised Circumstances , Infects IBM Computers. In 1987 Computer Emergency Response Team (Cert) Created. In 1988 Kevin Mitnick, Secretly Monitors The Email Of MCI And Digital Equipment Corporation (Dec) Security Officials. He Is Convicted And SentencedTo AYear In Jail
  • 5. Introduction Of Cyber Crime  OffencesThat Are Committed Against Individuals Or GroupsOf Individual.  Computer Crime, Or Cybercrime, RefersTo Any CrimeThat Involves A ComputerAnd A Network.  The Computer May Have Been Used InThe Commission Of A Crime, Or It May BeTheTarget.  Netcrime Is Criminal Exploitation OfThe Internet.  Such Crimes MayThreaten A Nation’s Security And Financial Health. Issues SurroundingTheseTypes Of Crimes Have Become High-profile.  For Example: Cracking, Copyright Infringement, Child PornographyAnd Child Grooming.
  • 6.  Crime Committed Using A Computer AndThe Internet To Steal A Person’s Identity Or Illegal Imports Or Malicious Programs.  Cyber Crime Is Nothing But WhereThe Computers Used As An Objector Subject Of A Crime
  • 7. Categories Of Cyber Crime Cyber Crime Can Be Basically Divided into 3 Major Categories.  Cyber Crimes Against Persons  Cyber Crimes Against Property  Cyber Crime Against Government
  • 8. CYBER CRIME AGAINST PERSON  Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other.
  • 9. CYBER CRIME AGAINST PROPERTY  These crimes include computer vandalism (destruction of others' property), transmission of harmful programs, unauthorized trespassing through cyber space, unauthorized possession of computer information.
  • 10. Cyber Crime Against Govt  Cyber terrorism is one distinct kind of crime in this category.  Medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.
  • 11. Types Of Cyber Crime Hacking Child pornography Denial of service attack Virus dissemination Computer vandalism Cyber terrorism Software piracy
  • 12.  Hacking means Illegal intrusion into a computer system and/or network.  Also known as CRACKING.  Govt websites are the hot target of the hackers due to the press coverage .  Hackers enjoy the MEDIA COVERAGE.
  • 13. CHILD PRONOGRAPHY  The internet is being highly used its abusers to reach and abuse child- -ren sexually, worldwide.  Homes have access to INTERNET .  More children are using the internet and more are the chances of falling victimto the AGRESSION of pedophiles.
  • 14. DENIAL OF SERVICE ATTACK  This is an act by the 1. criminal who floods 2. the bandwidth of 3. the victims or fills 4. his email box with 5. a spam mail depriving 6. him of the services he 7. is entitled to access or 8. provide.
  • 15. VIRUS DISSEMINATION  Malicious software that attaches itself to other software or computer system and then propagates itself to other comp -uters via networks.  Eg: virus ,worms , Trojan horse ,web jacking ,email bombing.
  • 16. COMPUTER VANDALISM  Damaging or destro -ying data rather than stealing or misusing them is called computer vandalism.
  • 17. CYBER TERRORISM  Terrorist attack on the internet is by distributed denial of the service attacks. hate websites and hate emails attacks on the sensitive computer networks .etc.  Technology savvy terrorists are using 512-bit encryption, which is impossible to DECRYPT.
  • 18. SOFTWARE PIRACY  Theft of software through the illegal copying of genuine programs or the COUNTERFEITING and DISTRIBUTION OF PRODUCTS intended to pass for the original.
  • 21. CYBER CRIME IN INDIA  Cybercrimes are centred on forgery, fraud and phishing.  India is second most country of cyber crime.  6.9 million boot-infected system in 2010.  India lost 8 billion to cyber crime.
  • 22.  14,348 websites defacements in 2010.  6,850 in and 4,150 .com domains were defected during 2011.  15,000 sites hacked in 2011.  India is the number 1 country in the world for generating spam. CYBER CRIME IN INDIA
  • 24. CYBER SECURITY  Internet security is a branch of computer security specially related to the internet.  It’s objective is to establish rules and measure to use against attacks over the internet.
  • 25. Computer Security - Terminology  People  Hackers  White Hat – Good guys. Report hacks/vulnerabilities to appropriate people.  Black Hat – Only interested in personal goals, regardless of impact.  Gray Hat – Somewhere in between.
  • 26. Computer Security - Terminology  Script Kiddies  Someone that calls themselves a ‘hacker’ but really isn’t  Ethical Hacker  Someone hired to hack a system to find vulnerabilities and report on them.  Also called a ‘sneaker’
  • 27. Cyber Crime in Cinemas
  • 28. Cyber Crime in Cinemas
  • 29.  Use antivirus software.  Insert firewalls.  Uninstall unnecessary software
  • 30.  Maintain unnecessary software.  Maintain backup.  Check security setting.  Stay anonymous-choose a genderless screen name.  Never give your full name or address to strangers.