100% found this document useful (1 vote)
118 views19 pages

Cyber

This document discusses cyber crime and security. It defines cyber crime as using electronic devices like computers to steal data or harm others. It explains that the first recorded cyber crime occurred in 1820 in France. Cyber crimes are categorized as those using computers as targets or weapons. Common types of cyber crimes include hacking, denial of service attacks, virus dissemination, computer vandalism, cyber terrorism, and software piracy. The document also discusses cyber security and its goals of establishing rules to protect against internet attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
118 views19 pages

Cyber

This document discusses cyber crime and security. It defines cyber crime as using electronic devices like computers to steal data or harm others. It explains that the first recorded cyber crime occurred in 1820 in France. Cyber crimes are categorized as those using computers as targets or weapons. Common types of cyber crimes include hacking, denial of service attacks, virus dissemination, computer vandalism, cyber terrorism, and software piracy. The document also discusses cyber security and its goals of establishing rules to protect against internet attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

CYBER

CRIME n SECURITY
INTRODUCTION
In technically driven society, people use various devices
to make life simple.

The internet connects people and companies from


opposite sides of the world fast, easily, and relatively
economically.

Nevertheless, the internet and computer can pose some


threats which can have disparaging impact on civilizations
and cyber crime is one among the hazards.
DEFINITION

‘Cyber Crime’ refers to the use of an


electronic device (computer, laptop,
etc.) for stealing someone’s data or
trying to harm them using a computer.
HISTORY

The first cyber crime ever recorded


was in France during 1820.

The person involved was


JOSEPH-MARIE JACQUARD.
CYBER THREAT EVOLUTION:
CATEGORIZATION

Cybercrimes are broadly categorized


into two groups such as crime using:

The computer as a target.

The computer as a weapon.


TYPES OF CYBER CRIME

There are many types of cybercrimes:


1. Hacking
2. Denial of service attack
3. Virus Dissemination
4. Computer vandalism
5. Cyber Terrorism
6.Software Piracy
Hacking

Hacking in simple terms means an


illegal intrusion into a computer system
and/ or network.
Denial Of service attack

Act by the criminal, who floods the bandwidth of the victims network.
🡪 Is his email box with spam mail depriving him of the services.
Virus dissemination

Malicious software that attaches itself to


other sources. (virus, worms, trojan horse,
web jacking, e-mail bombing etc,.)
Computer vandalism

Damaging or destroying data rather


than stealing.
🡪 Transmitting virus.
Computer terrorism
Use of internet based attacks in terrorist activities.
Technology savvy terrorists are using 512-bit
encryption, which is impossible to decrypt.
Software piracy
Theft of software through the illegal copying of genuine
programs.
Distribution of products intended to pass for the original.
STATISTICAL INFORMATION

TYPE %
FINANCIAL FRAUD 11%
SABOTAGE OF DATA/NETWORKS 17%
THEFT OF PROPRIETARY INFORMATION 20%
SYSTEM PENETRATION FROM THE OUTSIDE 25%
DENIAL OF SERVICE 27%
UNAUTHORIZED ACCESS BY INSIDERS 71%
EMPLOYEE ABUSE OF INTERNET PRIVILEGES 79%
VIRUSES 85%
CYBER SECURITY

Internet security is a branch of computer security


specifically related to the internet.
It’s objective is to establish rules and measure to
use against attacks over the internet.
Advantages of cyber security

Defend us from critical attacks.


Browse the safe website.
Internet security process all the incoming and outgoing
data on our computer.
conclusion

Technology is destructive
only in the hands of people
who don’t realize that they
are one and the same
process as the universe…

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy