P. 1
Cyber Crime Ppt

Cyber Crime Ppt

|Views: 112|Likes:
Published by ritesh banyal

More info:

Published by: ritesh banyal on Dec 25, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPTX, PDF, TXT or read online from Scribd
See more
See less

10/29/2015

pdf

text

original

CONTENTS  Introduction  Types of Cyber Crime .

illegal damaging. deleting or alteration of computer data. Misuse of devices .unauthorized access by unauthorized people. transmitting or suppressing computer data. Illegal access .usage of unauthorized people.interfering with the functioning of a computer by inputting. from or within a computer system. systems interference .CYBER CRIMES        Cyber crime is simply as criminal activity involving the information technology infrastructure.ID theft. Forgeries . . Illegal interception .technical means of non-public transmissions of computer data to. Data interference .

Types of Cyber Crime HACKING • DENIAL OF SERVICE ATTACK • VIRUS DISSEMINATION • SOFTWARE PIRACY • PORNOGRAPHY • IRC Crime • CREDIT CARD FRAUD • .

Conti… • NET EXTORTION • PHISHING • SPOOFING • CYBER STALKING • CYBER DEFAMATION • THREATENING • SALAMI ATTACK .

DENIAL OF SERVICE ATTACK This is an act by the criminal.HACKING Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user. who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide .

Trojan Horse.VIRUS DISSEMINATION • Malicious software that attaches itself to other software. Time bomb. Rabbit and Bacterium are the malicious softwares ) NET EXTORTION • Copying the company’s confidential data in order to extort said company for huge amount. Logic Bomb. (virus. worms. .

usually one with special access privileges . CYBER STALKING The Criminal follows the victim by sending emails. entering the chat rooms frequently.SPOOFING • Getting one computer on a network to pretend to have the identity of another computer. . so as to obtain access to the other computers on the network.

ex-boys friend against girl. (Any one disgruntled may do this againstboss. Divorced husband against wife etc) THREATENING The Criminal sends threatening email or comes in contact in chat rooms with or victim. ( disgruntled employee may do this Against boss. friend or official) .CYBER DEFAMATION The Criminal sends emails containing defamatory matters to all concerned of the victim or post the defamatory matters on a website.

CATEGORIES OF CRIMES Cyber crimes Mobiles Banking Internet .

 Irritating an unknown person by continuous sms and phone calls. .  Blue bugging – unknown persons interruption using blue tooth.  Usage of mobiles in cinema theatres to take videos.CRIMES RELATED TO MOBILES  Chipping and pinning.  Taking photos without knowledge of that particular person.  Mobile robberies.

Abusing pin numbers of credit cards. Issuing fake cheques. Misusing others credit card in the public .CRIMES RELATED TO BANKING Nigerian money offers. .

 Misusing the information stored on others personal computer or website.  Harmful software .attaches itself to other software.CRIMES RELATED TO INTERNET  Sale of duplications. .  Forgeries such as ID theft.  Software piracy.

Remember that password cracking tools exist • Back-up your computer data on disks or CDs often • Make sure your employees and family members know this info too! .keep them up to date • Keep your operating system up to date with critical security updates and patches • Don't share access to your computers with strangers • If you have a wi-fi network.Protect your Computers! • Use anti-virus software and firewalls . Don’t use words found in a dictionary. password protect it • Disconnect from the Internet when not in use • Reevaluate your security on a regular basis • Don't open emails or attachments from unknown sources • Use hard-to-guess passwords.

CONCLUSION Cyber crime is a crime that ruins people financially. “Let us take part in developing our INDIA without crimes” . personally. professionally often taking years to recover from it unless we people are aware of it.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->