Professional Documents
Culture Documents
Information Technology
Presented By:
Fatima Attari
R.N. 19(A)
I.T. Sem-III
CONTENTS
1. Introduction
2. History
3. Forms of Cyber Crime
Hacking
Computer Viruses
Phishing
Denial of Service Attack
4. Dealing With Cyber Crime
5. The Information Technology Act 2000
6. Precautions
7. Where to go
8. Conclusion
9. Bibliography
INTRODUCTION
The word cyber and its relative dotcom are the most
common terminologies of the modern era.
COMPUTER VIRUSES
PHISHING
COMPUTER
VIRUSES
FINANCIAL ABUSEMENT
COMPUTER VIRUS
FRAUD 8%
4%
PHISHING DENIAL OF SERVICE
7% ATTACK
COMPUTER UNAUTHORISED
ACCESS
VIRUS
UNAUTHORISE PHISHING
48%
D ACCESS
14%
FINANCIAL FRAUD
ABUSEMENT
DENIAL OF
SERVICE
ATTACK
19%
DEALING WITH CYBERCRIME
Internet firewall is a piece of software or hardware that helps screen
out hackers, viruses, and worms that try to reach your computer
over the Internet
Spam filters also help protect users from phishers, because they
reduce the number of phishing-related emails that users receive.
www.cybercellmumbai.com
www.mumbaicyberlab.org/
cbiccic@bol.net.in
www.google.com/contact/spamreport
www.asianlaws.org/fact/index.htm
www.cyberangels.org
CONCLUSION
The Cyber World is analogous to the high seas.
No one owns it, yet people of all nationalities use
it.
Technology should be used for the benefits of
human race not for selfish gains.
Strict laws should be there to stop such
activities.
General awareness is the best way to prevent
ourselves from being the victim of cyber crime.
BIBLIOGRAPHY
www.wikipedia.com
www.answers.com
www.google.com
www.altavista.com
THANK YOU