Download presentation
Presentation is loading. Please wait.
Published bySabrina Janice Alexander Modified over 8 years ago
1
Seminar by: Guided By: Nidhi Anand Sandhya Rani Sahoo Regd No:0801208056
2
INTRODUCTION CATEGORIES OF CYBER CRIME TYPES OF CYBER CRIME ADVANTAGES OF CYBER CRIME CONCLUSION
3
Cybercrime is a form of crime where the internet or computers are used as a medium to commit crime. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright, infringement, child pornography and child grooming.
4
Cyber crimes can be basically divided into 3 major categories: 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government
5
Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other.
6
These crimes include computer vandalism (destruction of others' property), transmission of harmful programes.
7
Cyber terrorism is one distinct kind of crime in this category. The growth of internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.
8
Hacking Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery
9
The act of gaining unauthorized access to a computer system or network and in some cases making unauthorized use of this access. Hacking is also the act by which other forms of cyber crime(e.g., fraud,terrorism etc.) are committed. Hacking is simple term means illegal intrusion into a computer system without the permission of the computer user.
10
This is an act by the criminal, who floods the bandwidth of the victim’s network or fills his e- mail box with spam mail depriving him of the services he is entitled to access or provide. This involves flooding computer resources with more request than it can handle.This causes the resources to crash thereby denying authorized users the service offered by the resources.
11
Pornography is the first consistently successful e- commerce product. Pornography has deceptive tactics and mouse trapping technologies which encourages customers to access their websites. Any body including children can log on to the internet and access websites with pornographic contents with a click of a mouse. Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient intrest is an offence under the provision of section 67 of I.T. Act-2000.
12
In computing, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as user names, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
13
The process of deception by which an individual or system alters its identity or creates additional identities, thereby causing another person or system to act incorrectly. Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges, so as to obtain access to the other computer on the network.
14
In such crime criminal makes insignificant changes in such a,manner that such changes would go unnoticed. Criminal makes such program that deducts small amount like $2.50 per month from the account of all the customer of the bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
15
Counter feit currency notes, postage and revenue stamps, mark sheets etc.,can be forged using sophisticated computers, printers and scanners.
16
Cyber security involves protection of sensitive personal and business information through prevention, detection and response to different online attack. Cyber security standards are security standards which enables organizations to practice safe security techniques to minimize the number of successful cyber security attacks.
17
It defends us from critical attacks. It helps us browse safe websites. It defends us from hacks and virus. Security developers update their database every week hence new virus also gets deleted. Internet security process all the incoming and outgoing data on our computer.
18
Preventive measures should be adopted by both children as well as parents For instance children should not reveal any kind of identity while chatting etc. Parents should use content filter software on PC. For any individual, he/she should share any personal information online to whomsoever it might be.
19
Everybody using COMPUTERS From white collar criminals to terrorist organization and from teenagers to adult. Conventional crimes like forgery, extortion, kidnapping etc. are being committed with the help of computers. New generation is growing up with computers. MOST IMPORTANT-monetary transactions are moving on to the internet
20
The modern thief can steal more with a computer than with a gun.Tomorrow’s terrorists may be able to do more damage with a keyboard than with a bomb.
22
Disable and log off a specific user account to prevent access. Disable and log off a group of user accounts which access a particular service that is being attacked. Disable and dismount specific (network) devices, for instance disk devices that are being swamped.
24
within the law enforcement agencies, a set of rules must be developed to address the various categories of computer crime. As such, investigators will know what and which materials to search and seize, the electronic evidence to recover, and the chain of custody to maintain.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.