CYBER CRIMES Know how's of cyber crimes. I’M HERE………

Slides:



Advertisements
Similar presentations
Internet As A Business Tool Peter Lilburn. Consumer Advantages The Internet has affected most individuals basic routine such as paying bills and receiving.
Advertisements

Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
CYBER CAFÉ VISITOR TRACKING SYSTEM A Comprehensive Portal for Tracking Cyber Café Visitors.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
ICT at Work Banking and Finance.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
INTERNET SAFETY.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
Security, Privacy, and Ethics Online Computer Crimes.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
WhatsApp – Tweaking Security -The new face of Information Technology Services 1.
Net Safety S.G.IsaveLecturer Tilak College of Education Pune.
Social impacts of the use of it By: Mohamed Abdalla.
What have you known about cybercrime? What do you want to know about cybercrime?
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Social The social impact may include allowing others to access your personal information, potential employers cheacking your face book page to obtain.
Cyber crime & Security Prepared by : Rughani Zarana.
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Unethical use of Computers and Networks
CYBER CRIME.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
100 Internet Safety Jeopardy Social Network Sites Online Shopping Words & Pictures Cyber- bullying Internet Scams.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
The social impacts of ICT is that its gives you access to your personal information. Face book is acceptable in some cases because employers can access.
Protecting Your Identity Anders Olson Computers III September 18, 2008.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have... Cyber crime encompasses.
Advanced Academic Reading and Discussion Attendance Please raise your hand and say “HERE!”
 people will go through your trash to get credit card numbers. Like old mail that you threw away, had your number on it a lot of the time its with.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Cyber Safety Jamie Salazar.
Computer Security By Duncan Hall.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Tips to Avoid Online Scams. About Several threats are there which spreads on every computer system just to infect each system with their harmful ways.
Identity Theft: Protect Yourself Ronald J. Leach.
Tips for avoiding crime To enjoy your college life 2016/4/5 TOHOKU UNIVERSITY.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
CYBER CRIME fb MANIA & TEACHERS
Lesson 3 Safe Computing.
Submitted By: Arslan Javaid Bsmc Submitted to: Sir Farrukh
Homeland Security: Computer Protection
Seminar On Cyber Crime Submitted To: Submitted By:
cybercrime Presented to you by : NAMES MATRIC NO
The Best Way To Secure U R Self
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
Lesson 2- Protecting Yourself Online
Five Unethical Uses of Computers
Computer Crime and Security Measures
Prepared By : Binay Tiwari
IGraphic Social impacts of IT
Ethical Use of Computers
CYBER CRIME fb MANIA & TEACHERS
Lesson 2- Protecting Yourself Online
Presentation transcript:

CYBER CRIMES Know how's of cyber crimes

I’M HERE………

What is a cyber crime? Cyber crime can be defined as a crime where a crime is done through a computer or, computer acts as a tool for crime. Cyber criminals use computer to get excelled in crime.

TYPES OF CYBER CRIME Based on the activity involved cyber crimes are classified Some of them are Cyber terrorism Cyber theft Cyber fraud etc

CYBER CRIMINALS People involved in cyber crimes are termed as “cyber criminals”. Mainly three types of cyber criminals are there. Hackers-software programmers Crackers-security system Phreaks-telephone system

FIRST RECORDED CYBER CRIME. The first cyber crime ever recorded was In France during The person involved was Joseph-Marie Jacquard. He was a textile manufacturer, he made looms. He invented looms that can store designs.

Cont………… This made his employees fear that they may lose their jobs. So they persuaded him to not use that loom. Even though computer was not invented the principle was of Abacus. So it was as a cyber crime.

INSTANCES Most common cyber crime is related with online games Hackers are mainly involved Tries to give the player unwanted advantage. To avoid this companies have anti hacking software, or some character in game will act as a moderator controlled by company

GOLD FARMING A type of online game cheating You pay a company to play the game for you and get the game money from the company. The employees of a gold farming firm is very less paid & under paid. Teenagers are mainly involved If caught about 10 years imprisonment.

CASE FOR HACKING Done by Jonathan James from Miami, U.S.A He had hacked the systems of U.S defense department & NASA. He was then 16 year old & got 10 year imprisonment & $11000 as penalty. He was the first juvenile to get punished for a cyber crime

COMMON CRACKING One day you will get a mail tells you that you have won an lottery or lucky dip & you are supposed to give your credit card number. All will get excited & gives their number. But later you will find out that they have done withdrawals for you & your account will be empty. Most commonly done cracking. Prominent in India& south Asia

CYBER TERRORISM Great threat to a country. They may recruit youngsters online and they are brainwashed & taken to the gang. Many of the terrorist will be having good knowledge on computers. People will just fell in their nets & can’t return back & finally ended up in disasters.

HOW TO AVOID THIS? Do not give your computer password or credit password to any one. Read the terms of use or End User License Agreement (EULA) before gaming. If got cheated report immediately to the authorities. Take immediate concern.

Cont………. Don’t visit unwanted or unprotected sites. Use internet wisely.

QUESTIONS???????

THANK YOU ……..