What is Cybercrime? Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs Cybercrime.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Electronic Crimes on the E-Information Highway. Violent Crimes.
How to protect yourself, your computer, and others on the internet
Primary Threats to Computer Security
Introduction and Overview of Digital Crime and Digital Terrorism
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
CYBER CRIME& SECUIRITY
Security, Privacy, and Ethics Online Computer Crimes.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
CYBER CRIME AND SECURITY TRENDS
presentation topic : cyber crimes and security By ashwini awatare
Cyber Crimes Mumbai Police. Why do we need to know about this Everybody uses computers Crimes like forgery, extorion, kidnapping, are all being assisted.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
Cyber crime & Security Prepared by : Rughani Zarana.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
CYBER CRIME.
Crime & Malpractice AS Module Heathcote Ch. 10.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Types of Electronic Infection
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
CLICKTECHSOLUTION.COM.  INTRODUCTION  HISTORY OF CYBER CRIME  CATEGORIES OF CYBER CRIME  TYEPS OF CYBER CRIME  CYBERCRIMES THREATENS NATIONAL SECORITY.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Cyber Safety Jamie Salazar.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Presented by Presented by Daniel Lawrence Delgado CITCS BSIT 1-D.
Cyber Security. Objectives To understand: 1.Definition of Cyber Crime 2.Classification of Cyber crimes 3.Computer Intrusions and Hacking 4.Computer Security.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
Seminar by: Guided By: Nidhi Anand Sandhya Rani Sahoo Regd No:
CYBER SECURITY...
IT Security  .
Cyber crime and security issues
Assalamualaikum Today, I am going to give a presentation on
COMPUTER CRIME.
Securing Information Systems
Unit# 7: Future Enabling use of ICT
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Presentation transcript:

What is Cybercrime? Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs Cybercrime is nothing but where the computer used as an object or subject of crime Online activities are just as vulnerable to crime and can compromise personal safety just as effectively as common everyday crimes. Lawmakers, law enforcement, and individuals need to know how to protect themselves and the persons for which they are responsible.

HISTORY OF CYBER CRIME HISTORY OF CYBER CRIME: The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage. The first spam took place in 1978 when it was sent out over the Arpanet (Advanced Research Projects Agency Network),. The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk cloner.

categorize of Cybercrime We can categorize Cyber crimes in two ways : The Computer as a Target :- using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc The computer as a weapon :- using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.Cyber Crime regulated by Cyber Laws or Internet Laws.

Types of Cybercrime 1.HACKING : Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motive Behind The Crime called HACKING : Motive Behind The Crime called HACKING Greed Power Publicity Revenge Adventure Desire to access forbidden information Destructive mindset Wants to sell n/w security services.

Types of Cybercrime 2.CHILD PORNOGRAPHY: The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide.. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles. How do they Operate : How do they Operate Pedophiles use false identity to trap the children/teenagers Pedophiles contact children/teens in various chat rooms which are used by children/teen to interact with other children/teen Befriend the child/teen. Extract personal information from the child/teen by winning his confidence.

Types of Cybercrime Gets the address of the child/teen and starts making contacts on the victimizes address as well. Starts sending pornographic images/text to the victim including child pornographic images in order to help child/teen shed his inhibitions so that a feeling is created in the mind of the victim that what is being fed to him is normal and that everybody does it. Extract personal information from child/teen At the end of it, the pedophile set up a meeting with the child/teen out of the house and then drag him into the net to further sexually assault him or to use him as a sex object.

Types of Cybercrime 3.DENIAL OF SERVICE ATTACK : This is an act by the criminal, who floods the bandwidth of the victims network or fills his box with spam mail depriving him of the services he is entitled to access or provide. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCp/IP protocols. 4.VIRUS DISSEMINITION : Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, bombing etc)

Types of Cybercrime 5.COMPUTER VANDALISM: Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate. They usually affect the data on a computer, either by altering or deleting it against properties. 6.CYBERTERRORISM: Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate s, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.

Types of Cybercrime The recent example may be cited of – Osama Bin Laden, the LTTE, and attack on America’s army deployment system during Iraq war. Against government 7.SOFTWARE PIRACY: Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.

CYBERCRIMES THREATENS NATIONAL SECURITY CYBERCRIMES THREATENS NATIONAL SECURITY IN “INDIA” : Ex. Union Home Minister Shivraj Patil said that the rising level of cyber crime is an indication of an enormous threat to national security. In today’s age when everything from, small gadgets to nuclear plants is being operated through computers, cyber crime has assumed threatening ramifications. cyber crimes are capable of breaching the security in the information systems of vital installations.

CYBERCRIMES THREATENS NATIONAL SECURITY on Google’s social networking site, Orkut, have been perplexing authorities. Fan clubs of underworld dons like Dawood Ibrahim and Chota Shakeel and other wanted underworld dons are also doing the rounds on Orkut. There is huge potential for damage to national security through cyber attacks. The internet is a means for money laundering and funding terrorist attacks in an organized manner.

Cyber security Cyber security involves protection of sensitive personal and business information through prevention, detection, and response to different online attacks. Cyber security actually protects your personal information by responding, detecting and preventing the attacks. Cyber security Privacy policy : Before submitting your name, address, or other personal information on a web site, look for the site's privacy policy. Evidence that your information is being encrypted : To protect attackers from hijacking your information, any personal information submitted online should be encrypted. Many sites use SSL or secure sockets layer, to encrypt information. Protecting your privacy.

Cyber security Keep software up to date: If the seller releases patches for the software operating your device, install them as soon as possible. Installing them will prevent attackers from being able to take advantage. Use good passwords: Select passwords that will be difficult for thieves to guess. Do not choose options that allow your computer to remember your passwords. How can we protect? Disable remote connectivity: Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.

Advantages of cyber security  Advantages of cyber security The cyber security will defend us from critical attacks.  It helps us to browse the safe website.  Internet security process all the incoming and outgoing data on our computer.

Advantages of cyber security  Advantages of the cyber security cyber security will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted.

Challenges of cyber security  Challenges of cyber security Explosion of computer and broadband internet availability.  Low priority of security for software developers.  Challenge of timely patching vulnerabilities on all systems.

Safety tips to cyber Crime  Use antivirus software’s  insert firewalls  uninstall unnecessary software  maintain backup  check security settings

Cyber Law of India Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target or both. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.

Conclusion Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily. In fact, it is highly likely that cybercrime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security.

Presented by S.A. Ayesha Shadoon K. Kowsalya