RajeshKumarSharma71
42 views
24 slides
May 27, 2024
Slide 1 of 24
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
About This Presentation
Cyber hygiene
Size: 5.13 MB
Language: en
Added: May 27, 2024
Slides: 24 pages
Slide Content
I N D EX 6 Why Should We Know About Cyber Crime?.............................8 What Is Cyber Crime?...............................................................9 History………………………………………………………………………………..10 Definition Of Fraud……………………………………………………………..11 Categories Of Cyber Crime ………………………………………………….12 Weapons Of Cyber Crime And Fraud……………………………………13 Cyber Crimes Against Persons……………………………………………..14 Cyber Crimes Against Property ………………………………………..…15 Cyber Crimes Against Government………………………………….….16 An Instance Of Cyber Terrorism……………………………………..……17 Cyber Crimes Against Society………………………………………………18 Example Of Cyber Crime…………………………………………………….19-26 Conclusion………………………………………………………………………….27 Bibliography……………………………………………………………………….28
2
3 Why Should we know about Cyber-Crime? In This Tech-savvy World Of 21 st Century Every One Is Engaged With Internet, Through Whatsapp, Twitter, Facebook, Net- banking & Lots Of Other Platforms Are There. And Some Criminal Minded Persons Commit Crimes Here, Which Is Included Under Cyber- crime.
WHATISCYBERCRIME? LETMETELLYOU? Cyber Crime Is Nothing But Where The Computer Used As An Object Or Subject Of Crime. Crime Commited Using Computer And Internet Criminal Activites That Make Use Of Computers Or Networks.
10 The first recorded cyber crime was recorded in the year 1820 . The first spam email took place in 1978 when it was sent over the Arpanet. The first Virus was installed on an Apple Computer in 1982 .
11 Defintion of Fraud Black’s Law Dictionary defines fraud as: – …All Multifarious Means Which Human Ingenuity Can Devise, And Which Are Resorted To By One Individual To Get An Advantage Over Another By F als e S ugg e s t i on s O r S uppr e s s i o n O f T h e Tru s t . It Includes All Surprise, Trick, Cunning Or Dissembling, And Any Unfair Way By Which Another Is Cheated.
CATEGORIES OF CYBER CRIME Cyber Crimes Against Persons. Cyber Crimes Against Property. Cyber Crimes Against Government. Cyber Crimes Against Society. Cyber Crimes Against Organisation 7
Weapons of Cyber Crime and Fraud • • • • • • • • • • • Hacking Data Diddling Denial Of Service Attack Email Bombing Trojan Attack Web Jacking Virus/Worm Attacks Salami Attacks Phishing Spamming Cyber Stalking 8
CYBER CRIMES AGAINST PERSONS • • • • • Harassment Via E-mails Hacking E-mail / SMS Spoofing Carding Assault By Threat 9
CYBER CRIMES AGAINST PROPERTY • • • • • Intellectual Property Crimes Cyber Squatting Cyber Vandalism Transmitting Virus Internet Time Thefts 10
Cyber crimes against government Hacking into computer systems. Introducing viruses to vulnerable networks. Website Defacing. Denial-of-Service(DoS) attacks. Terroristic threats made via e-mail. 11
An Instance of Cyber terrorism Ahmedabad Bomb Blast(26-07-08) • • A Mail With Id Alarbi_gujrat@ Yahoo.Com Was Being Sent By A Group Of Terrorists. Person Named Kenneth Haywood’s Unsecured Wifi Router In His House Was Being Misused By Terrorists. 3 More Mails Were Sent After The Blast With The Same Misuse Of Unsecured Wifi Routers. 12
CYBER CRIMES AGAINST SOCIETY • Pornography • Cyber Trafficking • Online Gambling • F orge ry 13
Phishing: Phishing Refers To The Receipt Of Unsolicited Emails By Customers Of Financial Institutions, Requesting Them To Enter Their Username, Password Or Other Personal Information To Access Their Account For Some Reason. The Fraudster Then Has Access To The Customer’s Online Bank Account And To The Funds Contained In That Account. 14
15 Salami attacks: This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed. E.G. Criminal Makes Such Program That Deducts Small Amount Like Rs. 2.50 Per Month From The Account Of All The Customer Of The Bank And Deposit The Same In His Account. In This Case No Account Holder Will Approach The Bank For Such Small Amount But Criminal Gains Huge Amount.
Virus/ Worm Attacks: They usually affect the data on a computer, either by altering or deleting it. Worms unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on the computer’s memory. 16
Hacking: U n a u t h o r i ze d access to any computer systems or networks is known as ‘HACKING’. That is accessing the information of others without proper authorization. 17
DENIAL OF SERVICE ATTACK This is an act by the criminal who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide 18
24 • The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles .
This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Cyber stalking is a technology based attack which can take many forms, including: harassment, embarrassment and humiliation of the victim. 20
Trojan Attacks: This term has it’s origin in the word ‘Trojan Horse’. In software field this means an unauthorised program, which passively gains control over another’s computer by representing itself as an authorized program. The most common form of installing a Trojan is through e-mail. 21
22 CONCLUSION Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily . In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security.