1. Maulana Abul Kalam Azad University Of Technology
Topic:
Paper Code: BSFSGE-304B
Submitted By:-
Name: Pranisha Singha
Roll No.: 30059221033
Registration No. 213002459210033
Department: Bsc. Forensic Science
Batch: 2021
Guided By: Miss Gaurab Som
2. Computer Crimes
• Cybercrime, also called computer
crime, the use of a computer as an
instrument to further illegal ends, such
as committing fraud, trafficking in child
pornography and intellectual property,
stealing identities, or violating privacy.
• It is performed by a computer user who
has great knowledge about hacking.
• The hacker tries to gain unauthorized
access to any particular account,
personal information or steals a
company's or individual's private
information.
3. Types of cybercrime
• Cybercrime ranges across a spectrum of activities.
•
•
• Malware
Any software that is designed to harm, disable, or grant unauthorized access to
your computer or other internet-connected device to criminals.
image source: @netwrixblog
4. Social Engineering
Criminals use social engineering to make direct contact with you, generally via
phone or email. Their ultimate goal is to obtain the information they want. This is
usually a password, your employer’s name, or your bank account number.
Bots
Bots are a kind of internet-based tool that automates activities. They can be used
to gather passwords, steal financial information, hack social media accounts. Also
they can be used for DoS or DDoS attacks the purpose of which is to make a
server or a network unavailable for users and disrupt the working process for
some time.
Physical cyber attacks
Physical cyber attacks corrupt, harm, or otherwise disrupt digital systems by
using hardware, external storage devices, or other physical attack methods.
5. • The most frequent types of cybercrime: ransomware and phishing.
Ransomware
Ransomware has been a persistent security issue
for businesses all around the world in recent years.
Ransomware is a form of malicious software
that prohibits you from accessing your computer files,
systems, or networks and demands that you pay a
ransom to regain access to them.
Opening an email attachment, clicking an ad, clicking a link, or
even visiting a malware-infected website can all unintentionally
download ransomware onto your machine.
Phishing
Hackers send malicious email attachments or
URLs to users in order to obtain access to their
accounts or computers.
Users are lured into clicking on links in emails
that suggest they need to change their password
or update their payment information, allowing thieves
access to their accounts.
image source: netwrix blog
6. Examples of computer crimes
• Child pornography
• Cracking
• Copyright violation
• Cyber terrorism
• Cybersquatting
• Cyberbully or Cyberstalking
• Creating Malware
• Denial of Service attack
• Espionage
• Fraud
• Human trafficking
• Identity theft
• Illegal sales
• Intellectual property theft
• Phishing or vishing
• Spamming
• Unauthorized access
7. Acknowledgement
I wish to acknowledge the contribution of Sir Sujoy
Mitra, Department of Forensic Science for his
assistance in refractive data collection.
I THANK YOU ALL