You are on page 1of 17

Presented By:

1
2
Cybercrime is nothing but where the computer used as an object
or subject of crime.
Cyber crime is an evil having its origin in the growing
dependence on computers in modern life. In a day
and age when everything from microwave ovens and
refrigerators to nuclear power plants is being run
on computers, cyber crime has assumedrather
sinister implications.

Crime committed using a computer and the internet to steal a


person's identity or illegal imports or malicious programs

3 3
In the early decades of modern information technology (IT),
computer crimes were largely committed by individual disgruntled
and dishonest employees.
Physical damage to computer systems was a prominent threat
until the 1980s.
Programmers in the 1980s began writing malicious software,
including self-replicating programs, to interfere with personal
computers.
As the Internet increased access to increasing numbers of
systems worldwide, criminals used unauthorized access to poorly
protected systems for vandalism, political action and financial
gain.

4 4
Criminal activity involving

Information technology
infrastructure
 Illegal access
 Data interference
 Misuse of devices
 Forgery and
 Electronic fraud.

5 5
Types of Cyber Crime

Hacking - Hacking in simple terms means an illegal intrusion


into a computer system without permission of computer
owner/user. Hackers write or use ready-made computer
programs to attack the target computer.

Software Piracy - Theft of software through the illegal


copying of genuine programs or the counterfeiting and
distribution of products intended to pass for the original. The
unauthorized copying of software.

6
Email spoofing - A spoofed email is one that appears to
originate from one source but actually has been sent from
another source.

Phishing - The e-mail directs the user to visit a Web site where
they ar asked to update personal information, such as
passwords and credit card social security, and bank account
numbers, that the legitimat organization already has .

7
8
CLASSIFICATION

 Against Individuals

 Against Organization

 Against Society

9
 Harassment via e-mails
 Email spoofing
Defamation. Unauthorized control/access
over computer system
 Cheating & Fraud
 Phishing

10 1
Unauthorized control/access over
computer system.

 Possession of unauthorized information.

Cyberterrorism against the


government organization.

 Distribution of pirated software etc.

11 1
Polluting the youth through
indecent exposure.
 Trafficking
 Financial crimes
 Sale of illegal articles
 Online gambling
 Forgery

1
12
1
13
1
PREVENTION OF CYBER CRIME

 Anti-virus software .

 Frequent password changing.

 Firewalls.

 Safe surfing.

 Frequent virus checks.

 Email filters.

15
1
 User awareness is key to a secure computer/network
 Do not open suspicious files/emails
 Avoid using P2P programs
 Avoid downloading freeware
 If attacked, disconnect the network. Do not turn off the
computer

So we must pay attention to all those issues and protect the
World from Cyber Crime
“If you spend more on coffee than on IT security, you
will be hacked. What’s more, you deserve to be hacked.
— White House Cybersecurity Advisor” ─ Richard
Clarke
16
1
17
1

You might also like