You are on page 1of 25

Personal Cyber Crime

Crime against property

Crime against an
organisation/society

Cybercrimes can be divided into


three main categories:
Personal Cybercrime
The offences that cause or attempt to cause harm or threat to an individual is
called1 personal
. . cybercrime. It can be in the form of :
• E-MAIL SPOOFING :Spoofing means hoax or misleading. In this when a
user clicks on the link that is falsely provided by the sender , the malware
or virus enters into the system of the user.
• Cyber stalking : It include harasses and humiliate the victim by posting
false information about him and monitor or view a victim's online
activites .
• Cyber-bullying : It is an act of harming or harassing in a deliberate manner.
This includes insulting remarks and threatening messages sent by e-mail,
spreading rumors about the person either by e-mails or social networking
sites, posting embarrassing photos and videos to hurt the person, making
derogatory remarks against gender, race, religion, or nationality.
Cyber Crime & Cyber security

• A cybercrime is any illegal activity or internet frauds done through the internet
e.g., identity theft; where somebody can steal your e-mail id or password and
use it to send fake e-mails .It can be credit card account thefts and other frauds
like ordering goods in your name, extracting mobile phone contacts, imitating
documents and currency, harassing others, by sending threatening messages, all
of which come under the jurisdiction of the Indian Penal Code ( IPC).

• Cyber security is a collection of technologies, processes, and practices designed


to protect networks, computers, programs, and data from attack, damage, or
unauthorized access
• Cyber Crime & Cyber Security
Presentation • Recognize Different Types of Cybercrime:
Contents • PERSONAL CRIME
• Harassment (Cyber bullying and stalking)
Dfgfh • CRIME AGAINST PROPERTY
• Identity Theft (key loggers)
Df • Phishing
Df • Pharming
• AGAINST SOCIETY AND ORGANIZATION
D • Types of Malware (Virus, worms, trojan horse)
F • Malware & Adware & Spyware
• Hacking
• How To Secure
Fd • Firewall
• Anitivirus
• Biometrics
• Personal Privacy
• Public Wi-Fi
• Passwords
Crime against
property
1. Identity theft
It is the crime of obtaining the personal or financial
information of another person to use their identity to
commit fraud, such as making unauthorized transactions
or purchases
2. Key loggers
• Key loggers are activity-monitoring software
programs that give hackers access to your personal data.
The passwords and credit card numbers you type, the
webpages you visit – all by logging your keyboard strokes
Phishing
DO YOU KNOW?
• Is the attempt to send fradulent In The pandemic,
communications through an reputable source
and mainly through EMAILS basically ,phishing attack has
been increased by 33% and all
• They will be after your login credentials,
payment card details or to upload malware to the content is related to covid
your computer which induces people to open
• The email will normally impersonate a genuine mail
company or person.
RECENT SCAM : EMAIL ASKING
Pharming FOR VACCINATION PROOF
✓Redirects you to a phony website even if you
type the URL
✓Hijacks a company’s domain name
Cybercrime Against Organizations
Cybercrime against organization and society mainly
includes unauthorized access of computer, password sniffing,
malware attacks, network intrusions, forgery, web-jacking etc. It is a
planned and political motivated attack to cause large scale disorder in
computer networks.
• Hacking
• is an attempt to exploit a computer system or a private
network inside a computer. Simply put, it is the
unauthorized access to or control over computer
network security systems for some Unwanted purpose.
• Black-hat or “crackers”
Black Hat hackers are criminals who break into computer
networks with malicious intent. 
• Gray-hat

• is a computer hacker or computer security expert who may


sometimes violate laws or typical ethical standards, but does
not have the malicious intent like black hat hacker.
Cyber security fgffhgfhgg

Cyber security

• BEST HACKER IN THE WORLD- KEVIN MITNICK ( HE HACKED NORTH


AMERICAN DEFENCE COMMAND ).
• HACKING IS NOT A CRIME WHEN IT IS LIMITED TO ETHICAL HACKING ,
WHICH IS LEGAL BECAUSE IT IMPROVES COMPUTER SECURITY BY
DETECTING FOREIGN AND MALICIOUS ATTACKS . IT IS ILLEGAL WHEN IT IS
DONE TO DECEIVE SOMEONE
Spam
✓spamming is when one person or company sends an unwanted email to another
person. Spam emails are the computer version of unwanted "junk mail" that arrives
in a mailbox, such as advertising pamphlets and brochures.Messages are called
spam
DO YOU KNOW ?

✓The main idea of spam is to make a


profit. Mass email sending is cheap
and easy compared to physical
mail. Near 250 billion emails are
sent globally every day, and 45% of
them are spam.
ADWARE

Adware, or advertising-supported malware, is a term used


to describe unwanted software that displays
advertisements on the device. It’s a program that is Do you know?
installed without express permission from the user.
Google Play Store has
EFFECT ON COMPUTER removed 8 apps dealing in
This program disrupts your browsing experience in the form of crypto currency because
• excessive advertisements these apps were boosting
various malwares and
• flashing pop-up windows
adware on Smartphone.
• banners, in-text links and
• auto-play video commercials.

Adware’s purpose is to generate revenue for its developer


and it does this by showing these ad
Differentiate between Various Types of Malware

My Doom is considered to be
the most expensive virus in
the world and it can lead to
financial damage of dollar
38.5 million.
Viruses, Worms, SPYWARE , and Rootkits
Virus
SPYWARE Worms
a program that Replicates
• Spyware is a kind of malware ✓Self-replicating
that secretly gathers information
itself and infects
about a person or organization ✓Do not need a host to Computers
and relays this data to other travel  Needs a host file
parties.
✓Travel over networks to  May use an email program
•Spyware is any software that infect other machines to infect
installs itself on your computer and other computers
starts monitoring your online
✓Conficker worm
behavior without your knowledge First released in 2008  The attack is called the
or permission payload
Reemerged in 2010
with new behaviors  Check to see if message is
a hoax
Root kits
• Root kit is a term applied to a type of malware
that is designed to infect a target PC and allow
an attacker to install a set of tools that grant
him persistent remote access to the computer.
• They hide malicious programs from users and any
anti-virus software installed on a computer. Nearly
impossible to detect
• Root kits allow attackers to install additional
malware on infected computers
• execute files and change system configurations on
the host machine.
How to Secure a Computer
Practice Safe Computing
Do you know?

RECOGNISE BRAND UBER


reported that in 2016
hackers stole information
of over 57 million rides
and drivers
Shield’s Up – Software
• Firewall
• It controls incoming and outgoing network traffic and preventing
unauthorized users from gaining access to it.
• Hardware device that blocks access to your network
• Software that blocks access to an individual machine
• Antivirus program
• Protects against viruses, Trojans, worms, spyware
• Windows 10 includes Windows Defender
• An antispyware program that performs both real-time protection
and system scanning
• Antispyware software (Spybot, Spyware blaster)
• Prevents adware and spyware from installing
• ENCRYPTION SOFTWARES - Process of converting electronic data that cannot be
understood by anyone ,i.e encrypted text called cipher text.

• BIOMETRICS- verifying a person by means of unique biological and physical


characteristics . It identifies a person by retinal scan , fingerprint , voice recognition etc

• BACKUPS- Duplicate copy of data to used to restore the original data in case of any
loss

• COOKIES- Text message given to a web browser . Cookies are text file that may contain
information about the sites you visitedor even credentials for assessing the site. It is
advised to delete cookies perodically to avoid privacy threat
.
Public Wi-Fi
• May not be trustworthy. They could share your information to other
companies who operate in countries without any data protection.
• You may not know who is watching you while you’re online.

What to do and not do to


• Don’t use online banking. Use your own data.
• Don’t conduct any purchases
• Use a virtual private network (VPN)
Passwords Advice
• Use 1 password per account.
• Three random words is the NCSC’s advice. Capitals, special characters
and numbers is your own choice.
• If you follow this advice your passwords security will be significantly
increased against a brute force attack.
• Password managers can be helpful to store your passwords.
• Change the password regularly.
Discuss Laws Related to Computer Security and Privacy
Cyber Crime Act in India
The Information Technology Act, 2000 (also
known as ITA-2000, or the IT Act) is an Act of
the Indian Parliament (No 21 of 2000) notified
on 17 October 2000. It is the primary law in
India dealing with cybercrime and electronic
commerce.
Do’s and Dont’s
• For protecting phishing attacks your browser should be enabled with
phishing filters and never click links in your emails for updating and
transactions.
• Restrict yourself from giving personal information when you receive a
call from bank or credit card provider.
• Never download from untrusted sites. Check that the URLs are same
and always download music and videos from secure websites like
HTTPS instead HTTP.
• Be careful while downloading attachments from emails and scan it
first with updated antivirus.Use email filtering software to avoid spam.
llo Thank you
he

Stay safe on net

You might also like