SlideShare ist ein Scribd-Unternehmen logo
1 von 20
CYBER CRIMES
Presented By
SHABEER ISMAEEL
ISHFAQ MAJID DAR
CONTENTS
 Introduction.
 Definition.
 History.
 Cyber threat evolution.
 Categories of cyber crime.
 Types of cyber crime.
 Prevention.
 References.
INTRODUCTION
The internet is growing rapidly. It has given rise to new
opportunities in every field we can think of be it entertainment,
business, sports or education.
There’re two sides to a coin. Internet also has it’s own
disadvantage, one is:
Cyber crime- illegal activity committed on the internet.
DEFINING CYBER CRIME
 Crime committed using a computer and the internet to steal data
or information.
 Illegal imports.
 Malicious programs.
 Cybercrime is nothing but where the computer used as an object
or subject of crime.
HISTORY
• The first recorded cyber crime took place in the year 1820.
• That is not surprising considering the fact that the abacus,
which is thought to be the earliest from of a computer, has
been around since 3500 B.c.
• In India, Japan and China, the era of modern computer,
however, began with the analytical engine of Charles
Babbage.
• The first spam email took place in 1976 when it was sent out
over the ARPANT.
• The first virus was installed on an Apple computer in 1982
when a high school student, Rich skrenta, developed the
EIK Cloner.
CYBER THREAT EVOLUTION
CATEGORIZATION OF CYBER CRIME
We can categorize cyber crime in two ways:
• The computer as a target :- Using a computer to attacks
other computer, e.g. Hacking, virus/worms attacks, Dos
attack etc.
• The computer as a weapon :- Using a computer to
commit real world crime e.g. cyber terrorism, credit card
fraud and pornography etc.
TYPES OF CYBER CRIME
• Hacking
• Child Pornography
• Denial of service attack
• Virus Dissemination
• Computer Vandalism
• Cyber Terrorism
• Software Piracy
HACKING
• Hacking in simple terms means an illegal intrusion into a computer
system and/or network.
• It is also known as CRACKING.
Motive behind the crime called HACKERS
-- Motive behind the crime called hacking is greed
power, publicity, revenge, adventure desire to
access forbidden information destructive
mindset wants to sell network security services.
• .
CHILD PORNOGRAPHY
 The Internet is being highly used by its abusers to reach and
abuse children sexually worldwide.
 As more homes have access to internet, more children would
be using the internet and more are the chances of falling
victim to the aggression of pedophiles.
How Do They Operate pedophiles?
 Using false identity to trap the children.
 Pedophiles connect children in various chat rooms which
are used by children to interact with other children.
DENIAL OF SERVICE ATTACK
 This is an act by the criminals who floods the bandwidth of
the victims network or fills his E-mail box with spam mail
depriving him of the service he is entitled to access or
provide.
 Many DOS attacks, such as the ping of death and Tear drop
attacks.
VIRUS DISSEMINATION
• Malicious software that attaches itself to other
software or computer system and then propagates
itself to other computers via networks or disks.
(virus, worms, Trojan Horse, web jacking, e-mail
bombing etc.)
COMPUTER VANDALISM
• Damaging or destroying data rather than stealing or misusing
them is called cyber vandalism.
• Transmitting virus: These are programs that attach
themselves to a file and then circulate.
CYBER TERRORISM
• Terrorist attacks on the Internet is by distributed denial of service attacks,
hate websites and hate emails, attacks on sensitive computer networks,
etc.
• Technology savvy terrorists are using 512-bit encryption, which is
impossible to decrypt.
• These crimes occur against individuals, Businesses, organizations and
against the government itself.
SOFTWARE PIRACY
• Theft of software through the illegal copying of
genuine programs.
• Distribution of products intended to pass for the
original.
TYPES OF CYBER ATTACK BY PERCENTAGE
• Financial fraud: 11%
• Sabotage of data/networks: 17%
• Theft of proprietary information: 20%
• System penetration from the outside: 25%
• Denial of service: 27%
• Unauthorized access by insiders: 71%
• Employee abuse of internet privileges 79%
• Viruses 85%
SAFETY TIPS FOR CYBER CRIME
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a genderless screen name.
• Never give your full name or address to strangers.
• Learn more about Internet privacy.
CONCLUSION
Technology is destructive only in the hands of
people who do not realize that they are one and
the same process as the universe.
References
• http://study.com/academy/lesson/what-is-
cyber-crime-definition-types-examples.html
• http://www.helplinelaw.com/employment-
criminal-and-labour/CCII/cyber-crimes-in-
india-what-is-types-web-hijacking-cyber-
stalking.html
• https://www.slideshare.net
Cybercrimes

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescentsTreesa Lobo
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technologyBinu p jayan
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Class on cyber crime
Class on cyber crimeClass on cyber crime
Class on cyber crimeJayakumar PP
 
Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowAbdullah Khosa
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingANKIT KUMAR
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 

Was ist angesagt? (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescents
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technology
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Class on cyber crime
Class on cyber crimeClass on cyber crime
Class on cyber crime
 
Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till now
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 

Ähnlich wie Cybercrimes

Ähnlich wie Cybercrimes (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Final ppt
Final pptFinal ppt
Final ppt
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 

Mehr von Shareb Ismaeel

Mehr von Shareb Ismaeel (9)

Unions
UnionsUnions
Unions
 
Spanning trees
Spanning treesSpanning trees
Spanning trees
 
Multiprocessor structures
Multiprocessor structuresMultiprocessor structures
Multiprocessor structures
 
Installation testing
Installation testingInstallation testing
Installation testing
 
Genome data management
Genome data managementGenome data management
Genome data management
 
E mail systems
E mail systemsE mail systems
E mail systems
 
E commerce
E commerceE commerce
E commerce
 
Disk structure
Disk structureDisk structure
Disk structure
 
.Netframework
.Netframework.Netframework
.Netframework
 

Kürzlich hochgeladen

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answersdalebeck957
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 

Kürzlich hochgeladen (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Cybercrimes

  • 1. CYBER CRIMES Presented By SHABEER ISMAEEL ISHFAQ MAJID DAR
  • 2. CONTENTS  Introduction.  Definition.  History.  Cyber threat evolution.  Categories of cyber crime.  Types of cyber crime.  Prevention.  References.
  • 3. INTRODUCTION The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. There’re two sides to a coin. Internet also has it’s own disadvantage, one is: Cyber crime- illegal activity committed on the internet.
  • 4. DEFINING CYBER CRIME  Crime committed using a computer and the internet to steal data or information.  Illegal imports.  Malicious programs.  Cybercrime is nothing but where the computer used as an object or subject of crime.
  • 5. HISTORY • The first recorded cyber crime took place in the year 1820. • That is not surprising considering the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c. • In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. • The first spam email took place in 1976 when it was sent out over the ARPANT. • The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 7. CATEGORIZATION OF CYBER CRIME We can categorize cyber crime in two ways: • The computer as a target :- Using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. • The computer as a weapon :- Using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
  • 8. TYPES OF CYBER CRIME • Hacking • Child Pornography • Denial of service attack • Virus Dissemination • Computer Vandalism • Cyber Terrorism • Software Piracy
  • 9. HACKING • Hacking in simple terms means an illegal intrusion into a computer system and/or network. • It is also known as CRACKING. Motive behind the crime called HACKERS -- Motive behind the crime called hacking is greed power, publicity, revenge, adventure desire to access forbidden information destructive mindset wants to sell network security services. • .
  • 10. CHILD PORNOGRAPHY  The Internet is being highly used by its abusers to reach and abuse children sexually worldwide.  As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles. How Do They Operate pedophiles?  Using false identity to trap the children.  Pedophiles connect children in various chat rooms which are used by children to interact with other children.
  • 11. DENIAL OF SERVICE ATTACK  This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide.  Many DOS attacks, such as the ping of death and Tear drop attacks.
  • 12. VIRUS DISSEMINATION • Malicious software that attaches itself to other software or computer system and then propagates itself to other computers via networks or disks. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)
  • 13. COMPUTER VANDALISM • Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. • Transmitting virus: These are programs that attach themselves to a file and then circulate.
  • 14. CYBER TERRORISM • Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. • Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt. • These crimes occur against individuals, Businesses, organizations and against the government itself.
  • 15. SOFTWARE PIRACY • Theft of software through the illegal copying of genuine programs. • Distribution of products intended to pass for the original.
  • 16. TYPES OF CYBER ATTACK BY PERCENTAGE • Financial fraud: 11% • Sabotage of data/networks: 17% • Theft of proprietary information: 20% • System penetration from the outside: 25% • Denial of service: 27% • Unauthorized access by insiders: 71% • Employee abuse of internet privileges 79% • Viruses 85%
  • 17. SAFETY TIPS FOR CYBER CRIME • Use antivirus software’s. • Insert firewalls. • Uninstall unnecessary software • Maintain backup. • Check security settings. • Stay anonymous - choose a genderless screen name. • Never give your full name or address to strangers. • Learn more about Internet privacy.
  • 18. CONCLUSION Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.