cyber crime
DESCRIPTION
TRANSCRIPT
RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME
1
RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME
2
Presented by :
RAJENDRA DANGWALB.TECH- IT
RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME
3
TABLE OF CONTENTS
INTRODUCTION
HISTROY
CYBER CRIME TYPES CLASSIFICATION
PREVENTION CONCLUSION
RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 4
INTRODUCTION Cybercrime is nothing but where the computer used as an object or subject of crime.
Cyber crime is an evil having its origin in the growingdependence on computers in modern life. In a day and age when everything from microwave ovens andrefrigerators to nuclear power plants is being run on computers, cyber crime has assumed rather sinister implications.
Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs.
RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 5
In the early decades of modern information technology (IT), computer crimes were largely committed by individual disgruntled and dishonest employees. Physical damage to computer systems was a prominent threat until the 1980s.
Programmers in the 1980s began writing malicious software, including self-replicating programs, to interfere with personal computers. As the Internet increased access to increasing numbers of systems worldwide, criminals used unauthorized access to poorly protected systems for vandalism, political action and financial gain.
HISTROY
RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 6
WHAT IS CYBER CRIME
Criminal activity involving
Information technology infrastructure Illegal access Data interference Misuse of devices Forgery and Electronic fraud.
RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME
7
Types of Cyber Crime
Hacking - Hacking in simple terms means an illegal intrusion into a computer system without permission of computer owner/user. Hackers write or use ready-made computer programs to attack the target computer. Software Piracy - Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. The unauthorized copying of software.
RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME
8
Email spoofing - A spoofed email is one that appears to originate from one source but actually has been sent from another source.
Phishing - The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has .
RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME
9
CLASSIFICATION
Against Individuals
Against Organization
Against Society
RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 10
AGAINST INDIVIDUAL
Harassment via e-mails
Defamation. Unauthorized control/access over computer system
Email spoofing
Cheating & Fraud
Phishing
RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME 11
Unauthorized control/access over computer system.
Possession of unauthorized information.
Cyber terrorism against the government organization.
Distribution of pirated software etc.
AGAINST ORGANIZATION
RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME
12
AGAINST SOCIETY
Polluting the youth through indecent exposure. Trafficking Financial crimes Sale of illegal articles Online gambling Forgery
RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME
13
RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME
14
PREVENTION OF CYBER CRIME
Anti-virus software .
Frequent password changing.
Firewalls.
Safe surfing.
Frequent virus checks.
Email filters.
RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME
15
User awareness is key to a secure computer/network Do not open suspicious files/emails Avoid using P2P programs Avoid downloading freeware If attacked, disconnect the network. Do not turn off the
computer
So we must pay attention to all those issues and protect the World from Cyber Crime “If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked. — White House Cybersecurity Advisor” ─ Richard Clarke
CONCLUSION
RAJENDRA DANGWAL, GEHU(BHIMTAL) CYBER CRIME
16