83046895 cyber crime full ppt
TRANSCRIPT
![Page 1: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/1.jpg)
-SEMINAR PRESENTATION-- ON
“CYBER CRIME”SUBMITTED BY – BHEEM RAOROLL NO- 10SECTION-B1BRANCH -IT
SUBMITTED TO- MR. BRIJESH YADAV
![Page 2: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/2.jpg)
PRESENTATION OVERVIEW
WHAT IS CYBER CRIME..??! TYPES OF CYBER CRIMES.. OCCURRENCE.. WHY LEARN ABOUT CYBER CRIME.. CYBER CRIMINALS.. MEASURES TO BE TAKEN..
![Page 3: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/3.jpg)
WHAT IS CYBER CRIME..??!
Cyber crime, also called computer crime, is any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed .
The concept of cyber crime is not radically different from the concept of conventional crime.
![Page 4: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/4.jpg)
TYPES OF CYBER CRIMES….(This is not exhaustive list of cyber crime)
• HACKING• VIRUS DISSEMINATION• SOFTWARE PIRACY• CREDIT CARD FRAUD• NET EXTORTION• CYBER DEFAMATION
![Page 5: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/5.jpg)
2..VIRUS DISSEMINATION• MALICIOUS SOFTWARE THAT ATTACHES ITSELF TO OTHER SOFTWARE..(VIRUS,, WORMS,, TROJAN HORSE,, TIME BOMB, LOGIC BOMB, RABBIT AND BACTERIUM ARE THE MALICIOUS SOFTWARES )
1..HACKINGHacking in simple terms means illegalintrusion into a computer system without thepermission of the computer owner/user.
![Page 6: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/6.jpg)
Denial of service attack This is an act by the criminal, who floods the bandwidth of the
victim’s network or fills his e-mail box with spam mail depriving him
of the services he is entitled to access or provide.
This involves flooding computer resources with more requests than
it can handle. This causes the resources to crash thereby denying
authorized users the service offered by the resources.
![Page 7: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/7.jpg)
4..CREDIT CARD FRAUD
3..SOFTWARE PIRACY• Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original..
• If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card byimpersonating the credit card owner.
![Page 8: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/8.jpg)
6..CYBER DEFAMATIONTHE CRIMINAL SENDS EMAILS CONTAININGDEFAMATORY MATTERS TO ALL CONCERNED OFFTHE VICTIM OR POST THE DEFAMATORY MATTERS ON A WEBSITE..
5..NET EXTORTION• Copying the company’s confidential data in order to extort said company for huge amount..
![Page 9: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/9.jpg)
Pornography
Pornography is the first consistently successful e-commerce
product.
Pornography has deceptive marketing tactics and mouse trapping
technologies which encourages customers to access their websites.
Anybody including children can log on to the internet and access
websites with pornographic contents with a click of a mouse.
Publishing, transmitting any material in electronic form which is
lascivious or appeals to the prurient interest is an offence under the
provisions of section 67 of I.T. Act -2000.
![Page 10: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/10.jpg)
IRC crimes
Internet Relay Chat (IRC) servers have chat rooms in which
people from anywhere the world can come together and
chat with each other Criminals use it for meeting co-
conspirators.
Hackers use it for discussing their exploits / sharing the
technique.
Paedophiles use chat rooms to allure small children.
![Page 11: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/11.jpg)
Credit card fraud Credit card fraud is a wide-ranging term for theft and fraud
committed using a credit card or any similar payment mechanism as
a fraudulent source of funds in a transaction.
If electronic transactions are not secured the credit card numbers
can be stolen by the hackers who can misuse this card by
impersonating the credit card owner.
![Page 12: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/12.jpg)
Phishing
In computing, phishing is the criminally fraudulent process of
attempting to acquire sensitive information such as usernames,
password and credit card details, by masquerading as a trustworthy
entity in an electronic communication.
![Page 13: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/13.jpg)
Spoofing The process of deception by which an individual or system alters its
identity or creates additional identities, thereby causing another
person or system to act incorrectly.
Getting one computer on a network to pretend to have the identity
of another computer, usually one with special access privileges, so as
to obtain access to the other computers on the network.
![Page 14: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/14.jpg)
Forgery
Counterfeit currency notes, postage and revenue stamps,
mark sheets etc., can be forged using sophisticated
computers, printers and scanners.
![Page 15: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/15.jpg)
WHERE DO THEY OCCUR..???
Military and Intelligence Attacks
Business Attacks Financial Attacks Terrorist Attacks
![Page 16: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/16.jpg)
![Page 17: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/17.jpg)
Why learn about CYBER CRIME?
Because – – Everybody is using COMPUTERS.. – From white collar criminals to terrorist
organizations And from Teenagers to Adults – Conventional crimes like Forgery,, extortion,,
kidnappiing etc.. are being committed with the help off
computers – New generation is growing up with computers – MOST IMPORTANT - Monetary transactions are moving on to the IINTERNET
![Page 18: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/18.jpg)
WHY CRIMES ARE NOT REPORTED? 56% of crimes NOT REPORTED Embarrassment. loss of public confidence False arrest concerns
![Page 19: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/19.jpg)
CYBER CRIMINALS:
Children and adolescents between the age group of 18 years –
Business Rival.. Political Hacktivist.. Professional Hackers.. Disgruntled employees..
![Page 20: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/20.jpg)
MEASURES TO BE TAKEN...
Use anti-virus software and firewalls - keep them up to date
Keep your operating system up to date with critical security updates and patches
Don't open emails or attachments from unknown sources
Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist
![Page 21: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/21.jpg)
CONTINUE…
Don't share access to your computers with strangers
If you have a wi-fi network, password protect it
Disconnect from the Internet when not in use
Reevaluate your security on a regular basis
Make sure your employees and family members know this info too!
![Page 22: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/22.jpg)
CONCLUSION...
Cyberspace has emerged as a national-level concern through several events .. Therefore, this needs to be given equal concern as the other major crimes. we need to be aware and alert during our interaction with the computer.al recent events
![Page 23: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/23.jpg)
BIBLIOGRAPHY.!!
http://www.ifccfbi.gov - operation web snare – latest cyber crimes to be aware of
www.cybercellmumbai.com
Computers Today. (Web Commerce Technology.)
![Page 24: 83046895 Cyber Crime Full Ppt](https://reader033.vdocuments.mx/reader033/viewer/2022061106/5448b43ab1af9f4f618b4ac8/html5/thumbnails/24.jpg)
THANK YOU!!