Cyber Crime

33 %
67 %
Information about Cyber Crime

Published on March 18, 2010

Author: pl_arun


Slide 1: Cyber Crime Slide 2: Presented & performed by Arunachalam PL COMPUTER ENGINEERING Slide 3: agenda Introduction History Cyber Criminals Modes & Manner Categories Types Cyber Security Protecting your privacy How can we protect? Bibliography Concluding remarks Slide 4: Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs Cybercrime is nothing but where the computer used as an object or subject of crime. Introduction Slide 5: The first spam email took place in 1978 when it was sent out over the Arpanet (Advanced Research Projects Agency Network),. The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk cloner. history Slide 6: Those who are doing crimes by using the computer as an target or object. Children and adolescents between the age group of 6 – 18 years Dissatisfied employees Professional hackers / crackers Organized hackers Cyber criminals Of Committing Cybercrimes : Of Committing Cybercrimes Unauthorized access to computer systems or networks: This is generally referred as ‘Hacking’. That is accessing the information of others without proper authorization. Theft of information contained in electronic form: This includes theft of information stored in computer hard disks, removable storage media etc. Modes & manner Slide 8: Data diddling: This is altering raw data just before a computer processes it and then changing it back after the processing is completed. Denial of Service attack: The computer is flooded with more requests than it can handle which cause it to crash. Distributed Denial of Service (DDOS) attack is a example. Cont… Slide 9: Trojan attacks: It means unauthorized programmer. It gains control over another’s system by representing itself as an authorized programmer. Web jacking: This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the web site of another. Email bombing: It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing. Cont… Slide 10: The Cyber crimes are categorized as the following Cyber crimes against persons Cyber crimes against Individual Property Cyber crimes against government Under these categorize there are many ways to done Crimes. Here let we see some ways … Categories Slide 11: Harassment via e-mails: Harassment through e-mails is not a new concept. It is very similar to harassing through letters. Cyber-stalking : Cyber stalking involves following a person movements across the Internet by posting messages. Email spoofing: A mail which misrepresents its origin. It shows it's origin to be different from which actually it originates. Against persons Slide 12: Computer Vandalism: Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate . They usually affect the data on a computer, either by altering or deleting it. Against properties Slide 13: Cyber Terrorism: Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt. The recent example may be cited of – Osama Bin Laden, the LTTE, and attack on America’s army deployment system during Iraq war. Against government Slide 14: Child Pornography: The use of computer networks to create, distribute, or access materials that sexually use underage children. Cyber Contraband: Transferring illegal items through the internet (such as encryption technology) that is barred in some locations. Cyber laundering: Electronic transfer of illegally-obtained money with the goal of hiding its source and possibly its destination. types Slide 15: Cyber Stalking: Threats that creates fear through the use of computer technology such as email, phones, text messages, webcams, websites or videos. Cyber Theft: Using a computer to steal. This includes activities related to: breaking and entering, unlawful appropriation, identity theft, fraud, malicious hacking and piracy. Cont… Slide 16: Cyber security involves protection of sensitive personal and business information through prevention, detection, and response to different online attacks. Cyber security actually protects your personal information by responding, detecting and preventing the attacks. Cyber security Slide 17: Privacy policy : Before submitting your name, email address, or other personal information on a web site, look for the site's privacy policy. Evidence that your information is being encrypted : To protect attackers from hijacking your information, any personal information submitted online should be encrypted. Many sites use SSL or secure sockets layer, to encrypt information. Protecting your privacy Slide 18: Keep software up to date: If the seller releases patches for the software operating your device, install them as soon as possible. Installing them will prevent attackers from being able to take advantage. Use good passwords: Select passwords that will be difficult for thieves to guess. Do not choose options that allow your computer to remember your passwords. How can we protect? Slide 19: Disable remote connectivity: Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use. Cont… Slide 20: Conclusion Slide 21: Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily. In fact, it is highly likely that cybercrime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security. Let us conclude… Slide 22: Its time for demo’s This Paper has been submitted under the guidance of : This Paper has been submitted under the guidance of Over headed by Mr.M. Saravanan (M.E) – Senior Lecturer (Computer Engg). K. Megala B.E – Lecturer (Computer Engg). MR.D.ARUL SELVAN M.E., Head Of the Department / Computer Engineering Mr.M. Ramesh Kumar, MCA.,Mphil – HOD i/c (Computer Engg). Slide 28: Thank You very much….. Create Knowledge Structure Knowledge Disseminate Knowledge Apply Knowledge Assimilate Knowledge Seminar - Knowledge Sharing And Acquiring Environment Apply Knowledge Assimilate Knowledge Disseminate Knowledge Apply Knowledge Assimilate Knowledge Structure Knowledge Disseminate Knowledge Apply Knowledge Assimilate Knowledge Create Knowledge Structure Knowledge Disseminate Knowledge Apply Knowledge Assimilate Knowledge Slide 29: Thank You “A journey of a thousand sites begins with a single click Full effort is full” victory .”

Add a comment

Related presentations

Related pages

Computerkriminalität – Wikipedia

Der Begriff Computerkriminalität oder Cyberkriminalität (engl. Cybercrime) umfasst „alle Straftaten, die unter Ausnutzung der Informations- und ...
Read more

Sicherheitskooperation Cybercrime

Sehr geehrte Besucher, falls Sie Fragen zu der Sicherheitskooperation Cybercrime oder allgemeine Fragen zum Thema “Cybercrime und Wirtschaft”
Read more

Cybercrime – Wikipedia

Weiterleitung nach: Cyberkriminalität ...
Read more

Cybercrime - Wikipedia, the free encyclopedia

Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be ...
Read more

CSI: Cyber -

CSI: Cyber bei RTL . Der Tod kommt aus dem Netz - in der neuen RTL-Krimi-Serie "CSI: Cyber", dem mittlerweile dritten Ableger der "CSI"-Reihe von Schöpfer ...
Read more

Computer Crime and Intellectual Property Section (CCIPS ...

The Computer Crime and Intellectual Property Section ... Computer Crime & Intellectual Property Section. Contact . Department of Justice Main Switchboard
Read more

Übersicht "Cyber-Crime" -

Übersicht zum Thema Cyber-Crime. Auf dieser Seite finden Sie unsere Texte zum Thema Cyber-Crime (Kriminalität im Internet). Folgende Beiträge können ...
Read more

Cyber Crime Law - Für Dein gutes Recht im Internet

Cyber Crime Law – Für Dein gutes Recht im Internet Den Cybermobbern keine Chance geben! – Für Ihr gutes Recht im Internet. Daher haben sich die ...
Read more

MIK NRW: Aktuelles

Das Ministerium für Inneres und Kommunales NRW ist Teil der Landesregierung Nordrhein-Westfalen und ist u. a. zuständig für die Bereiche Polizei ...
Read more