Cyber Crime
Cyber Crime
Cyber Crime
CONTENT
• INTROUDUCTION
• HISTORY OF CYBER CRIME
• CATERGORIES OF CYBER CRIME
• TYPES OF CYBER CRIME
• CYBER SECURITY
• ADVANTAGE OF CYBER SECURITY
• SAFETY TIPS TO CYBER CRIME
• CYBER LAWS OF INDIA
• CONCLUSION
Introduction:
Cybercrime, or computer-oriented crime, is a
crime that involves a computer and a network .The computer may
have been used in the commission of a crime, or it may be the
target. Cybercrimes can be defined as: "Offences that are
committed against individuals or groups of individuals with a
criminal motive to intentionally harm the reputation of the victim or
cause physical or mental harm, or loss, to the victim directly or
indirectly, using modern telecommunication networks such as
Internet (networks including chat rooms, emails, notice boards and
groups) and mobile phones (Bluetooth /SMS/MMS)".
3
HISTORY OF CYBER CRIME
The first recorded cyber crime took place in 1820. Cybercrime first started with hackers
trying to break into computer networks. Some did it just for the thrill of accessing high-level
security networks, but others sought to gain sensitive, classified material. Eventually,
criminals started to infect computer systems with computer viruses, which led to
breakdowns on personal and business computers.
Computer viruses are forms of code or malware programs that can copy themselves and
damage or destroy data and systems. When computer viruses are used on a large scale,
like with bank, government or hospital networks, these actions may be categorized as
cyber terrorism. Computer hackers also engage in phishing scams, like asking for bank
account numbers, and credit card theft.
4
CATEGORIES OF CYBER CRIME
5
CATEGORIES OF CYBER CRIME
The computer as a target:
• Using a computer to attacks other computer, e.g. Hacking,
virus/worms attacks, Dos attack etc.
The computer as a weapon:
• using a computer to commit real world crime e.g. cyber
terrorism, credit card fraud and pornography etc.
6
TYPES OF CYBER CRIME
HACKING
CHILD PHONOGRAPHY
CYBER TERRORISM
HACKING
• Hacking in simple terms means an illegal intrusion info a
computer system and/or network . It is also known as HACKING
Government websites are the hot target of the hackers due to
the press coverage, it receives. Hackers enjoy the media
coverage.
8
MOTIVE BEHIND THE HACKING
• Motive behind the crime called hacking greed power,
publicity, revenge, adventure desire to access forbidden
information destructive mind-set wants to sell n/w
security services.
9
CHILD PORNOGRAPHY
• The Internet is being highly used by its abusers to reach
and abuse children sexually, worldwide. As more homes
have access to internet, more children would be using the
internet and more are the chances of falling victim to the
aggression of Paedophiles.
10
HOW DO THEY OPERATE
• They operate paedophiles use false identity to trap the
children , paedophiles connect children in various chat
rooms which are used by children to interact with other
children.
11
DENIAL OF SERVICE ATTACKS
• This is an act by the criminals who floods the bandwidth of the victims network or fills
his E-mail box with spam mail depriving him of the service he is entitled to access or
provide. Many DOS attacks, such as the ping of death and Tear drop attacks. VIRUS
DISSMINITION : Malicious software that attaches itself to other software. VIRUS ,
WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING etc. COMPUTER
VANDALISM : Damaging or destroying data rather than stealing or misusing them is
called cyber vandalism. These are program that attach themselves to a file and then
circulate.
CYBER TERRORISM
• Terrorist attacks on the Internet is by distributed denial of
service attacks, hate websites and hate E-mails , attacks on
service network etc. SOFTWARE PIRACY : Theft of software
through the illegal copying of genuine programs or the
counterfeiting and distribution of products intended to pass for
the original.
CYBER SECURITY
14
Introduction:
Cyber security is the practice of defending computers,
servers, mobile devices, electronic systems, networks,
and data from malicious attacks. It's also known as
information technology security or electronic information
security. The term applies in a variety of contexts, from
business to mobile computing
15
CYBER SECURITY
• Network security is the practice of securing a computer network from intruders,
whether targeted attackers or opportunistic malware.
• Application security focuses on keeping software and devices free of threats. A
compromised application could provide access to the data its designed to protect.
Successful security begins in the design stage, well before a program or device is
deployed.
• Information security protects the integrity and privacy of data, both in storage and in
transit.
• Operational security includes the processes and decisions for handling and
protecting data assets. The permissions users have when accessing a network and
the procedures that determine how and where data may be stored or shared all fall
under this umbrella.
16
CYBER SECURITY
• Disaster recovery and business continuity define how an organization responds to a
cyber-security incident or any other event that causes the loss of operations or data.
Disaster recovery policies dictate how the organization restores its operations and
information to return to the same operating capacity as before the event. Business
continuity is the plan the organization falls back on while trying to operate without
certain resources.
• End-user education addresses the most unpredictable cyber-security factor: people.
Anyone can accidentally introduce a virus to an otherwise secure system by failing to
follow good security practices. Teaching users to delete suspicious email
attachments, not plug in unidentified USB drives, and various other important lessons
is vital for the security of any organization.
17
ADVANTAGE OF CYBER SECURITY
• Protects the system against viruses, worms, spyware, and other unwanted programs.
• Protection against data from theft.
• Protects the computer from being hacked.
• Minimizes computer freezing and crashes.
• Gives privacy to users.
• Improved security of cyberspace.
• Increase in cyber defence.
SAFETY TIPS TO CYBER CRIME
CYBER AWARENESS AND HYGIENE FOR PARENTS
• Talk to your children about the potential online threats such as grooming, bullying,
and stalking, keep track of their online activities. Set clear guidelines for internet and
online games usage.
• Protect your child from Cyber Grooming: Grooming is a practice where someone
builds an emotional bond with a child through social media or chat window with an
objective of gaining their trust for sexual exploitation.
• Children may remove privacy settings on social media to make more friends. Parents
should discuss responsible use of social media. Also, they should educate and help
them in selecting strong privacy settings.
19
SAFETY TIPS TO CYBER CRIME
CYBER AWARENESS AND HYGIENE FOR TEENS AND YOUNG ADULTS
• Secure your online presence just like you secure yourself
• Be selective about accepting friend request of strangers on social media
• Learn how to block someone who is making you uncomfortable
• Learn how to remove someone from your friends list
• Remember to logout from social media websites after use
• Secure your phone with password
• Be careful while accepting chat requests from strangers
20
CYBER LAW OF INDIA
• Cyber crime can involve criminal activities that are traditional in
nature, such as theft, fraud, deformation and mischief, all of
which are subjected to the India Penal code. In simple way we
can say that cyber crime is unlawful acts where in the computer
is either a tool or both. The abuse of computer has also given
birth of new age crime that are addressed by the Information
Technology Act, 2000.
21
CONCLUSION
• Cybercrime is indeed getting the recognition it deserves. However, it is not
going to restricted that easily . In fact , it is highly likely that cyber crime and
its hackers will continue developing and upgrading to stay ahead of the law.
• SO, TO MAKE US A SAFER WE MUST NEED CYBER
SECURITY.
22
23
MADE BY: ADITI RASTOGI