Presentation is loading. Please wait.

Presentation is loading. Please wait.

Seminar by: Guided By: Nidhi Anand Sandhya Rani Sahoo Regd No:0801208056.

Similar presentations


Presentation on theme: "Seminar by: Guided By: Nidhi Anand Sandhya Rani Sahoo Regd No:0801208056."— Presentation transcript:

1 Seminar by: Guided By: Nidhi Anand Sandhya Rani Sahoo Regd No:0801208056

2  INTRODUCTION  CATEGORIES OF CYBER CRIME  TYPES OF CYBER CRIME  ADVANTAGES OF CYBER CRIME  CONCLUSION

3  Cybercrime is a form of crime where the internet or computers are used as a medium to commit crime.  Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright, infringement, child pornography and child grooming.

4  Cyber crimes can be basically divided into 3 major categories: 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government

5  Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other.

6  These crimes include computer vandalism (destruction of others' property), transmission of harmful programes.

7  Cyber terrorism is one distinct kind of crime in this category.  The growth of internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.

8  Hacking  Denial of Service Attack  Pornography  Phising  Spoofing  Salami Attack  Forgery

9  The act of gaining unauthorized access to a computer system or network and in some cases making unauthorized use of this access.  Hacking is also the act by which other forms of cyber crime(e.g., fraud,terrorism etc.) are committed.  Hacking is simple term means illegal intrusion into a computer system without the permission of the computer user.

10  This is an act by the criminal, who floods the bandwidth of the victim’s network or fills his e- mail box with spam mail depriving him of the services he is entitled to access or provide.  This involves flooding computer resources with more request than it can handle.This causes the resources to crash thereby denying authorized users the service offered by the resources.

11  Pornography is the first consistently successful e- commerce product.  Pornography has deceptive tactics and mouse trapping technologies which encourages customers to access their websites.  Any body including children can log on to the internet and access websites with pornographic contents with a click of a mouse.  Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient intrest is an offence under the provision of section 67 of I.T. Act-2000.

12  In computing, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as user names, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

13  The process of deception by which an individual or system alters its identity or creates additional identities, thereby causing another person or system to act incorrectly.  Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges, so as to obtain access to the other computer on the network.

14  In such crime criminal makes insignificant changes in such a,manner that such changes would go unnoticed.  Criminal makes such program that deducts small amount like $2.50 per month from the account of all the customer of the bank and deposit the same in his account.  In this case no account holder will approach the bank for such small amount but criminal gains huge amount.

15  Counter feit currency notes, postage and revenue stamps, mark sheets etc.,can be forged using sophisticated computers, printers and scanners.

16  Cyber security involves protection of sensitive personal and business information through prevention, detection and response to different online attack.  Cyber security standards are security standards which enables organizations to practice safe security techniques to minimize the number of successful cyber security attacks.

17  It defends us from critical attacks.  It helps us browse safe websites.  It defends us from hacks and virus.  Security developers update their database every week hence new virus also gets deleted.  Internet security process all the incoming and outgoing data on our computer.

18  Preventive measures should be adopted by both children as well as parents  For instance children should not reveal any kind of identity while chatting etc.  Parents should use content filter software on PC.  For any individual, he/she should share any personal information online to whomsoever it might be.

19  Everybody using COMPUTERS  From white collar criminals to terrorist organization and from teenagers to adult.  Conventional crimes like forgery, extortion, kidnapping etc. are being committed with the help of computers.  New generation is growing up with computers.  MOST IMPORTANT-monetary transactions are moving on to the internet

20 The modern thief can steal more with a computer than with a gun.Tomorrow’s terrorists may be able to do more damage with a keyboard than with a bomb.

21

22  Disable and log off a specific user account to prevent access.  Disable and log off a group of user accounts which access a particular service that is being attacked.  Disable and dismount specific (network) devices, for instance disk devices that are being swamped.

23

24  within the law enforcement agencies, a set of rules must be developed to address the various categories of computer crime.  As such, investigators will know what and which materials to search and seize, the electronic evidence to recover, and the chain of custody to maintain.


Download ppt "Seminar by: Guided By: Nidhi Anand Sandhya Rani Sahoo Regd No:0801208056."

Similar presentations


Ads by Google