2. DEFINITION
Harmful acts committed from or
against a computer or network.
Unlawful acts wherein the
computer is either a tool or target
or both
Online or Internet-based illegal
acts
4. Hacking is commonly referred as unauthorized access to
computer systems or network without the permission of
the computer owner/user
Hackers write or use ready-made computer programs to
attack the target computer
Computer hacking includes breaking into a computer with
the intent to steal, damage or modify the data within the
system.
5. VIRUS ATTACKS
Malicious software that attaches itself to other software
Circulate themselves to other files and to other computers on
a network
Affect the data on a computer, either by altering or deleting it
6. CYBER
THEFT In such crime criminal makes
insignificant changes in such a
manner that such changes
would go unnoticed
Criminals makes such program
that deducts small amount like
Rs. 2.50 per month from the
account of all the customer of
the bank and deposit the same
in his account. In this case no
account holder will approach
the bank for such small amount
but criminal gains huge amount
7. SOFTWARE PIRACY
Theft of software through the illegal copying of genuine
programs and distribution of products intended to pass for the
original
Copying and using computer programs in violation of
copyrights and trade secret laws
Retail revenue losses worldwide are ever increasing due to this
crime
8. E-MAIL BOMBS
It refers to sending large numbers of mail to the victim, which
may be an individual or a company by ultimately resulting into
crashing.
E-mail "bombing" is characterized by abusers repeatedly
sending an identical email message to a particular address
9. CYBER TERRORISM
It is the actual use of computers
and Internet technology to cause
intimidation and destruction
Uses the Internet or network to
destroy computers for political
reasons
Cyber terrorist could hack into a
pharmaceutical company’s
computers, changing the formula
of some essential medication
and causing thousands to die.
10. PASSWORD TRAFFICKING
Misuse of other people’s passwords.
Break a company’s password and misuse the password or sale
that password to another company or an individual.
11. IDENTITY THEFT
Identity theft occurs when
somebody steals a personal name
and other personal information for
fraudulent purposes
Identity theft is a form of identity
crime where somebody uses a
false identity to commit a crime
It involves stealing victims’
personal information and
credentials, often to make
purchases
13. CREDIT CARD FRAUD
If electronic transaction are not secured the credit
card numbers can be stolen by the hackers who can
misuse this card by impersonating the credit card
owner.
14. Safety Tips to Cyber Crime
Use antivirus software’s.
Insert firewalls.
Maintain backup.
Check security settings.
Never give your full name or e-mail address to strangers.
Don't respond to harassing or negative messages (flames).
Get out of uncomfortable or hostile situations quickly .
Save offending messages.
Learn more about Internet privacy.