divya nsh

Upload: gokul-rungta

Post on 05-Oct-2015

224 views

Category:

Documents


0 download

DESCRIPTION

cyber

TRANSCRIPT

Cyber Crime

Project On:

CYBER CRIME

Submitted To: Submitted By:Miss Pratibha Prajapati Divyansh Rungta PGT Computer Science Roll NO: 19 Certificate Of OriginalityThis is to certify that DIVYANSH RUNGTA of class IX A , R.A.N Public School , Rudrapur has successfully completed his project entitled CYBER CRIME as prescribed by CBSE in the year 2014-2015.

................................... Miss Pratibha Prajapati PGT Computer Science CS Department R.A.N Public School

Acknowledgement

The entire project from the very beginning of it to the reality would not have been possible without the guidance and support of many people. I would therefore like to take the golden opportunity of expressing our sincere and profound gratitude to all those people who helped me throughout the project. I express our sincere gratitude to Miss Pratibha Prajapati who accepted me as a trainee, without whose guidance this project would not have seen light of the day.

Table Of Contents

S .NO TOPIC

1.

2.

3.

4.

Introduction To CYBER CRIME

Computer crime,orcybercrime, is any crime that involves acomputerand anetwork .The computer may have been used in the commission of a crime, or it may be the target.Netcrimeis criminal exploitation of theInternet .Dr. Debarati Halder and Dr. K. Jaishankar (2011) define Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".Such crimes may threaten a nations security and financial health.Issues surrounding these types of crimes have become high-profile, particularly those surroundingcracking,copyright infringement,child pornography, andchild grooming. There are also problems ofprivacywhenconfidentialinformation is intercepted or disclosed, lawfully or otherwise.

TYPESHacking:This is a type of crime wherein a persons computer is broken into so that his personal or sensitive information can be accessed.Theft:This crime occurs when a person violates copyrights and downloads music, movies, games and software.Cyber Stalking:This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails.Identity Theft:This has become a major problem with people using the Internet for cash transactions and banking services.Malicious Software:These are Internet-based software or programs that are used to disrupt a network.Child soliciting and Abuse:This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography.

CAUSESWherever the rate of return on investment is high and the risk is low, you are bound to find people willing to take advantage of the situation. This is exactly what happens in cyber crime. Accessing sensitive information and data and using it means a rich harvest of returns and catching such criminals is difficult. Hence, this has led to a rise in cyber crime across the world.

CATEGORIESCyber crimes are broadly categorized into three categories, namely crime against1. Individual2. Property3. Government

CONCLUSIONAs internet technology advances, so does the threat of cyber crime . In times like these, we must protect ourselves from cybercrime. Anti virus software, firewalls and security patches are just the beginning. Never open suspicious e-mails and only navigate through trusted sites.

THANK YOU

Divyansh RungtaIX APage 7