cyber crime

29
CYBER CRIME NOISELESS & CLUELESS THEFT PRESENTED BY - MUKESH KUMAR

Upload: mukeshkaran

Post on 14-May-2015

9.404 views

Category:

Education


0 download

DESCRIPTION

cyber crime is most happened thing with us.so be aware.

TRANSCRIPT

Page 1: Cyber  Crime

CYBER CRIMENOISELESS & CLUELESS THEFT PRESENTED BY - MUKESH KUMAR

Page 2: Cyber  Crime

WHAT IS CYBER CRIME ?

Computer crime or cybercrime is a form of crime where the Internet or computers are used as a medium to commit crime.

Page 3: Cyber  Crime

• SOME THOUGHTS ABOUT CYBER CRIME

• "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist

may be able to do more damage with a keyboard than with a bomb".

– National Research Council, "Computers at Risk", 1991.

Page 4: Cyber  Crime

TYPES OF CYBER CRIME

• Cyber crimes can be basically divided into 3 major categories:

1. Cybercrimes against persons.

2. Cybercrimes against property.

3. Cybercrimes against government.

Page 5: Cyber  Crime

1. AGAINST PERSON

• This committed against persons include various harassment of any one with the use of a computer such as e-mail.

• Eg:- The Melissa virus first appeared on the internet in March of 1999. It spread rapidly throughout computer systems in the United States and Europe. It is estimated that the virus caused 80 million dollars in damages to computers worldwide.

Page 6: Cyber  Crime

1. AGAINST PERSON

• Cyber harassment is a distinct Cybercrime.• Harassment can be sexual, racial, religious, or other.

Persons perpetuating such harassment are also guilty of cybercrimes.

• Cyber harassment as a crime also brings us to another related area of violation of privacy of citizens.

• No one likes any other person invading the invaluable and extremely touchy area of his or her own privacy which the medium of internet grants to the citizen.

Page 7: Cyber  Crime

2.AGAINST PROPERTY

• The second category of Cyber-crimes is that of Cybercrimes against all forms of property. These crimes include computer vandalism (destruction of others' property), transmission of harmful programmes.

• Eg : A Mumbai-based upstart engineering company lost a say and much money in the business when the rival company, an industry major, stole the technical database from their computers with the help of a corporate cyber spy.

Page 8: Cyber  Crime

3.AGAINST GOVERNMENT

• This crime manifests itself into terrorism when an individual "cracks" into a government or military maintained website.

• Eg:- Lashker-e-Toiba is collecting contributions online from its sympathisers all over the world. During the

investigation of the Red Fort shootout in Dec. 2000, the accused Ashfaq Ahmed of this terrorist group revealed that

the militants are making extensive use of the internet to communicate with the operatives and the sympathisers and

also using the medium for intra-bank transfer of funds".

Page 9: Cyber  Crime

Why learn about CYBER CRIME ?

Because –• Everybody is using COMPUTERS.• Terrorist targeted the teenagers. • Conventional crimes like Forgery,, extortion,, kidnapping

are being committed with the help off computers.• New generation is growing up with computers• MOST IMPORTANT - Monetary transactions

are moving on to the INTERNET.

Page 10: Cyber  Crime

• IN SHORT

• COMPUTER CRIME is any crime where –• Computer is a target.• Computer is a tool of crime• Computer is incidental to crime

Page 11: Cyber  Crime

VICTIMS

• Desperados and greedy people• Unskilled & Inexperienced• Unlucky people

Page 12: Cyber  Crime

HACKING

Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.

Page 13: Cyber  Crime

VIRUS DISSEMINATION

• Malicious software that attaches itself to other software.Eg:-(virus,, worms,, Trojan Horse,, Time bomb,Logic Bomb,, Rabbit and Bacterium are themalicious software)

Page 14: Cyber  Crime

SOFTWARE PRIVACY

• Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.

• Retail revenue losses worldwide are ever increasing due to this crime Can be done in various ways

• Eg:-End user copying, Hard disk loading, Counterfeiting,

Illegal downloads from the internet etc.

Page 15: Cyber  Crime

INTERNET RELAY CHAT

• Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other.

• Criminals use it for meeting co-conspirators.• Hackers use it for discussing their exploits / sharing the

techniques.• Cyber Stalking - In order to harass a woman her

telephone number is given to others as if she wants to befriend males

Page 16: Cyber  Crime

CREDIT CARD FRAUD

Page 17: Cyber  Crime

CREDIT CARD FRAUD

Page 18: Cyber  Crime

ATM CARD FRAUD

Page 19: Cyber  Crime

ATM CARD FRAUD

Page 20: Cyber  Crime

ATM CARD FRAUD

Page 21: Cyber  Crime

NET EXTORTION

• Copying the company’s confidential data in order to extort said company for huge amount.

Page 22: Cyber  Crime

PHISHING

• It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means.

Page 23: Cyber  Crime

PHISHING

Page 24: Cyber  Crime

PHISHING

Page 25: Cyber  Crime

PHISHING

Page 26: Cyber  Crime

CYBER DEFAMATION

• The Criminal sends emails containing defamatory matters to all concerned off the victim or post the defamatory matters on a website..

• Eg:-(disgruntled employee may do this against boss,, ex-boys friend against girl,, divorced husband against wife etc.)

Page 27: Cyber  Crime

CONCLUSION

• Present time-

-We are always suffering from these type of problems.

So , now we should think about that how we can use our most valuable resources.

Page 28: Cyber  Crime

• ARE WE READY FOR THIS

CHALLENGE !!!!!!!

Page 29: Cyber  Crime

• THANK YOU