Professional Documents
Culture Documents
1
2
Cybercrime is nothing but where the computer used as an object
or subject of crime.
Cyber crime is an evil having its origin in the growing
dependence on computers in modern life. In a day
and age when everything from microwave ovens and
refrigerators to nuclear power plants is being run
on computers, cyber crime has assumedrather
sinister implications.
3 3
In the early decades of modern information technology (IT),
computer crimes were largely committed by individual disgruntled
and dishonest employees.
Physical damage to computer systems was a prominent threat
until the 1980s.
Programmers in the 1980s began writing malicious software,
including self-replicating programs, to interfere with personal
computers.
As the Internet increased access to increasing numbers of
systems worldwide, criminals used unauthorized access to poorly
protected systems for vandalism, political action and financial
gain.
4 4
Criminal activity involving
Information technology
infrastructure
Illegal access
Data interference
Misuse of devices
Forgery and
Electronic fraud.
5 5
Types of Cyber Crime
6
Email spoofing - A spoofed email is one that appears to
originate from one source but actually has been sent from
another source.
Phishing - The e-mail directs the user to visit a Web site where
they ar asked to update personal information, such as
passwords and credit card social security, and bank account
numbers, that the legitimat organization already has .
7
8
CLASSIFICATION
Against Individuals
Against Organization
Against Society
9
Harassment via e-mails
Email spoofing
Defamation. Unauthorized control/access
over computer system
Cheating & Fraud
Phishing
10 1
Unauthorized control/access over
computer system.
11 1
Polluting the youth through
indecent exposure.
Trafficking
Financial crimes
Sale of illegal articles
Online gambling
Forgery
1
12
1
13
1
PREVENTION OF CYBER CRIME
Anti-virus software .
Firewalls.
Safe surfing.
Email filters.
15
1
User awareness is key to a secure computer/network
Do not open suspicious files/emails
Avoid using P2P programs
Avoid downloading freeware
If attacked, disconnect the network. Do not turn off the
computer
So we must pay attention to all those issues and protect the
World from Cyber Crime
“If you spend more on coffee than on IT security, you
will be hacked. What’s more, you deserve to be hacked.
— White House Cybersecurity Advisor” ─ Richard
Clarke
16
1
17
1