Seminar by: Guided By: Nidhi Anand Sandhya Rani Sahoo Regd No:0801208056.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
CYBER CRIME AND SECURITY TRENDS
presentation topic : cyber crimes and security By ashwini awatare
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
 It is a Criminal Activity Committed On The Internet.  A generalized definition of Cyber Crime May Be “Unlawful Acts wherein the computer is either.
Cyber Crimes Mumbai Police. Why do we need to know about this Everybody uses computers Crimes like forgery, extorion, kidnapping, are all being assisted.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Cyber crime & Security Prepared by : Rughani Zarana.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Cybercrime What is it, what does it cost, & how is it regulated?
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
CLICKTECHSOLUTION.COM.  INTRODUCTION  HISTORY OF CYBER CRIME  CATEGORIES OF CYBER CRIME  TYEPS OF CYBER CRIME  CYBERCRIMES THREATENS NATIONAL SECORITY.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Presented by Presented by Daniel Lawrence Delgado CITCS BSIT 1-D.
Cyber Security. Objectives To understand: 1.Definition of Cyber Crime 2.Classification of Cyber crimes 3.Computer Intrusions and Hacking 4.Computer Security.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
Security Risks Todays Lesson Security Risks Security Precautions
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
IT Security  .
Cyber Laws in Pakistan.
A Project on CYBER SECURITY
Seminar On Cyber Crime Submitted To: Submitted By:
Chapter 5 Electronic Commerce | Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Chapter 11 crime and security in the networked economy
Assalamualaikum Today, I am going to give a presentation on
COMPUTER CRIME.
Introduction to Computer Forensics
Chapter 5 Electronic Commerce | Security
UNIT 18 Data Security 1.
Societal Issues in Computing (COMP466)
Computers in Society 12/1/2018.
Philip Nichilo Vincent Carestia
Cyber Laws in Pakistan Hassan Khalil.
Protecting Yourself from Fraud including Identity Theft
Faculty of Science IT Department By Raz Dara MA.
Protecting Yourself from Fraud including Identity Theft
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer Security.
What is Phishing? Pronounced “Fishing”
Phishing “In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire.
Security in mobile technologies
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Seminar by: Guided By: Nidhi Anand Sandhya Rani Sahoo Regd No:

 INTRODUCTION  CATEGORIES OF CYBER CRIME  TYPES OF CYBER CRIME  ADVANTAGES OF CYBER CRIME  CONCLUSION

 Cybercrime is a form of crime where the internet or computers are used as a medium to commit crime.  Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright, infringement, child pornography and child grooming.

 Cyber crimes can be basically divided into 3 major categories: 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government

 Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other.

 These crimes include computer vandalism (destruction of others' property), transmission of harmful programes.

 Cyber terrorism is one distinct kind of crime in this category.  The growth of internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.

 Hacking  Denial of Service Attack  Pornography  Phising  Spoofing  Salami Attack  Forgery

 The act of gaining unauthorized access to a computer system or network and in some cases making unauthorized use of this access.  Hacking is also the act by which other forms of cyber crime(e.g., fraud,terrorism etc.) are committed.  Hacking is simple term means illegal intrusion into a computer system without the permission of the computer user.

 This is an act by the criminal, who floods the bandwidth of the victim’s network or fills his e- mail box with spam mail depriving him of the services he is entitled to access or provide.  This involves flooding computer resources with more request than it can handle.This causes the resources to crash thereby denying authorized users the service offered by the resources.

 Pornography is the first consistently successful e- commerce product.  Pornography has deceptive tactics and mouse trapping technologies which encourages customers to access their websites.  Any body including children can log on to the internet and access websites with pornographic contents with a click of a mouse.  Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient intrest is an offence under the provision of section 67 of I.T. Act-2000.

 In computing, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as user names, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

 The process of deception by which an individual or system alters its identity or creates additional identities, thereby causing another person or system to act incorrectly.  Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges, so as to obtain access to the other computer on the network.

 In such crime criminal makes insignificant changes in such a,manner that such changes would go unnoticed.  Criminal makes such program that deducts small amount like $2.50 per month from the account of all the customer of the bank and deposit the same in his account.  In this case no account holder will approach the bank for such small amount but criminal gains huge amount.

 Counter feit currency notes, postage and revenue stamps, mark sheets etc.,can be forged using sophisticated computers, printers and scanners.

 Cyber security involves protection of sensitive personal and business information through prevention, detection and response to different online attack.  Cyber security standards are security standards which enables organizations to practice safe security techniques to minimize the number of successful cyber security attacks.

 It defends us from critical attacks.  It helps us browse safe websites.  It defends us from hacks and virus.  Security developers update their database every week hence new virus also gets deleted.  Internet security process all the incoming and outgoing data on our computer.

 Preventive measures should be adopted by both children as well as parents  For instance children should not reveal any kind of identity while chatting etc.  Parents should use content filter software on PC.  For any individual, he/she should share any personal information online to whomsoever it might be.

 Everybody using COMPUTERS  From white collar criminals to terrorist organization and from teenagers to adult.  Conventional crimes like forgery, extortion, kidnapping etc. are being committed with the help of computers.  New generation is growing up with computers.  MOST IMPORTANT-monetary transactions are moving on to the internet

The modern thief can steal more with a computer than with a gun.Tomorrow’s terrorists may be able to do more damage with a keyboard than with a bomb.

 Disable and log off a specific user account to prevent access.  Disable and log off a group of user accounts which access a particular service that is being attacked.  Disable and dismount specific (network) devices, for instance disk devices that are being swamped.

 within the law enforcement agencies, a set of rules must be developed to address the various categories of computer crime.  As such, investigators will know what and which materials to search and seize, the electronic evidence to recover, and the chain of custody to maintain.