CYBERCRIMES

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 36

CYBERCRIMES

Introduction
•The Internet Is growing rapidly It has given rise to new opportunities in every
field we can think of like entertainment, business & education.
•There are two sides to a coin. Internet also has it's own disadvantage, i.e.
Cybercrime.
Objectives
• To provide a general awareness of Cyber
crime.

• To Recognize Cyber-crime methods.

• To know the Importance of Cyber-Iaws


•To learn how to keep away from being a
victim
Cyber
•Crime
Crime committed ?? using a computer and the internet to steal a person‘s
identity or iilllegal imports or malicious programs.
• Cybercrime happens when the computer is used as an object or
subject of crime.
Why Should we know about
CyberCrime?
• in this Tech-Savvy world of 21st Century every one is engaged with Internet,
through WhatsApp, Tiktok, Twitter, Facebook, net banklng 8‹ lots of other
platforms.
•Criminal-minded persons commit crimes here, which is included under
cybercrime.
• So we should be aware about crimes hąppening around in the cyber-
space.
Cyber
Criminals
•Persons or Groups who commit Cyber Crime using
computers
-Hackers, crlmlnals groups, hacktivists, virus writers,
terrorists
History
•The first recorded cyber crime took place in the year 1834.
• The first spam email took place In 1978 when it was sent over the
Arpanet.
• a guy named Gary Thuerk. He was the marketing manager at
Digital Equipment Company. Sent what is widely recognized as
the first spam ever — a message trying to sell computers.
•The first VIRUS was Installed on an Apple computer In 1982.
Cyber Threat Evolution
Cyber Attack by percentage
Cyber Criminals
used to attack other computers.
The Computer as a Target : using a
computer
E.g Hacking, virus/worm attacks, Dos
attacks etc.

The computer as a weapon : using


a
computer to commit real world
crimes.
E.g Cyber terrorism, credit card
frauds, Child pornography etc
Categories
• Against Person
• Against Property
• Against Government
Against person:
• Harassment via emails, cyber stalking, cyber, bullying, email
spoofing, carding, assault by threat.
• The potential harm of such a crime ro humanity can hardly be
overstated.
Against Property:
• Cybercrimes against all forms of property.
- Unauthorized computer trespassing through cyberspace, computer
vandalism, transmission of
harmful programs, and unauthorized possession of computerized
information.
Against Government:
This is the least common cybercrime, but is the most serious offense. A crime against the
government is also known as cyber terrorism. Government cybercrime includes hacking
government websites, military websites or distributing propaganda. These criminals are
usually terrorists or enemy governments of other nations.
Types of Cyber
Crime
Hacking
Hacking in simple terms means an illegal intrusion or unauthorized access to
or control over a computer system and/or network.
Denial of Service(DOS)
• Act by the criminal, who floods the bandwidth of the victims
network or Internet server is f|ooded with continuous requests
so as to crash the server
•Its an attempt to make a machine or network resource
unavailable to its intended users
Virus Dissemination
Malicious software that attaches itself to other software. (virus, worms, Trojan
Horse, web jacking, e-mail bombing etc.)
Computer Vandalism
• Damaging or destroying data rather than
stealing.
• Transmitting virus to destroy system files.
Software
•Piracy
Theft software through the illegal copying of genuine programs.
• The counterfeitingand distribution of products intended to pass for
the original
Credit Card
Fraud
Personal Information stolen from a card, or the theft of a card łtself, can be
used
to commit fraud.
Fraudsters might use the information to purchase goods In your name or obtain
unauthorized funds from an account.
Net Extortion
Copying of confłdendal daI:a In order to extort a huge
amount of money.
Ransomware
Ransomware is a type of malware that prevents or Iimits users
from accessing their system, elther by locking the system's screen
or by locking the users' files unless a ransom is paid.
Phishing
To request confidential information over the Internet or by telephone under false pretenses
In order to fraudulently obtain credit card numbers, passwords, or other personal data.
Child Pornography
The Internet is being highly used by its abusers to reach and abuse
children
sexually, worldwide.
Cyber Terrorism
• Use of Internet based attacks in terrorist activities. Terrorist
attacks on the Internet is distributed through denial of
service attacks, hate websites and hate emails, attacks on
sensitive computer networks, etc.
• Technology savvy terrorists are using 512-bit encryptlon,
which is lmposslble to
decrypt.
Cyber Crimes in
Nepal
Social Media Related Cyber
Crime
Social media related cyber crime in Nepal includes using Porn Content In social Media or
creating fake profiles to Intentionally harm someone with the use of Facebook, Twitter.
Instagram or any soclal Media Platform
Fake Profile Marketing
Creating or using a fake profile, fake website or email to create a bad image or
inappropriate marketing is also considered as cybercrime.
Website Hacking
•Website Hacking means taking control from the website owner to a person who hacks the
website.
•Nowadays most of the government websites are attacked by hackers. Many
government websites including the president's website were hacked.
How to tackle these
activities?
•Awareness is the first step in protecting yourself, your family and your
business.
•Invest In Antivirus Firewall, and SPAM blocking software for your PC.
•Detect secure websites when conducting transactions online
•Do NOT respond or act on emails sent from unknown sources.
Safety Tips to Cyber
Crime
•Use antivirus software and install firewalls
•Read Privacy pollcy carefully wben you submit
the data through internet. Keep it
•Uninstall unnecessary software Secret,
•Maintain backup Keep it Safe
Check security settings
-D1sabIe Remote Connecttvlty
•Use hard-to•guess passwords. Don‘t use words
found in a dictionary. Remember that password
cracking tools
•Never give your full name or address to strangers
•Learn more about Internet privacy
Cyber
Security
•Internet security is a branch of computer security specifically related to
the Internet.
•It’s objectlve is to establish rules and measure to use agalnst attacks
over the Internet.
Cyber Security Advantages:
•The cyber security will defend us from critical
attacks, hacks and virus.
•It helps us to browse safe websites
•Internet security proœss all the incomlng and
outgoing data on our Computer.
•The application of cyber security used In our PC
needs update regularly.
Cybercrime Law

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy