SlideShare ist ein Scribd-Unternehmen logo
1 von 26
CYBER CRIME
Name-Ruhil
THE NORTHCAP
UNIVERSITY, GURUGRAM
 Introduction
 Definition
 History
 Categories
 Types
 Prevention
 Conclusion
Contents
 Computer crime or Cyber Crime is criminal activity
that involves unlawful access to computer systems.
 Cyber crime is an illegal activity committed on the
internet.
Introduction
Crime committed using a computer and the internet to steal
data or information.
Example:
 Stealing credit card information
 Breaking into government website
Definition
 The first cyber crime ever recorded was in France
during 1820.
 The person involved was Joseph-Marie.
 He was a textile manufacturer, he made looms.
 He invented looms that can store design.
History
 The first spam email took place in the year 1978.
 The first virus was installed on Apple Computer in the year
1982.
 The Computer as a Target:
Using a computer to attacks other computer. e.g. Hacking,
virus/worms attacks etc.
 The Computer as a Weapon:
Using a computer to commit real world crime e.g. Cyber
terrorism, credit card fraud etc.
Categories of Cyber Crime
 Hacking
 Credit Card Fraud
 Virus Dissemination
 Cyber Terrorism
 Computer Vandalism
 Software Piracy
 Spoofing
Types of Cyber Crime
Hacking is a source of threat to security in computer. It
is defined as unauthorized access to the computer
system by a hacker.
Types Of Hackers:
i. White Hat Hackers
ii. Black Hat Hackers
iii. Gray Hat Hackers
Hacking
 When an individual uses another individuals’ credit
card for personal reasons while the owner of the card
and the card issuer are not aware of the fact that the
card is being used.
 This problem occur while using online banking,
shopping.
Credit Card Fraud
 To avoid such a fraud the banks are now make a
privacy so that one can’t use the others credit card
because of the mobile security code and two steps
verification.
 Now this is an ethical conduct that is enforce by the
banks to avoid such type of hacking.
Malicious software that attaches itself to other
software.
Virus Dissemination
 Example to create a virus by yourself open your notepad
and write Following Code and paste it in notepad then Save
it as “anyname.bat".
 @echo off
 :VIRUS
 cd /d C:
 md %RANDOM%
 cd /d D:
 md %RANDOM%
 cd /d E:
 md %RANDOM%
 goto VIRUS
 Keep a regular backup of your important files.
 Be aware that most current viruses arrive as email
attachments. Be very aware of any attachment that has any
of the following file extensions: .exe .vbs .scr .vbe .com .bat
.shs .cpl .dll .ocx .pif .drv .lnk .bin .sys .eml .nws
 It is impossible for any anti-virus program to protect against
all new viruses, so your best protection is to be very
cautious about opening e-mail attachments.
 Use of Internet based attacks in terrorist activities.
 There are laws to prevent cyber crimes.
For example:
i. Seven Iranians working on behalf of Iranian
government indicted on hacking charges.
ii. Many persons has sent to jail recently in Rawalpindi
for blackmailing on the social media
Cyber Terrorism
 Damaging or destroying data rather than stealing.
 Transmitting virus.
 Ethical way to deal with computer vandalism is not to
give permissions to software without reading the
agreements.
Computer Vandalism
For Example:
 Write the Following code In Notepad Exactly as it says
 01001011000111110010010101010101010000011111100000
 Save as a .EXE -any name will do
 Run the .exe
 You are done !
 Theft of software through the illegal copying of
genuine programs.
Software Piracy
 Nowadays, no one is ready to use the original
software’s as they are too costly.
 Some of the organizations are now doing a serious
attempt against the people who are involved in the
distribution of pirated software’s.
 For Example:
BSA has many running cases.
 The word "spoof" means to trick, or deceive. Therefore, in
the IT world, spoofing refers tricking or deceiving
computer systems or other computer users. This is
typically done by hiding one's identity or faking the identity
of another user on the Internet.
 Spoofing can take place on the Internet in several
different ways:
 E-mail Spoofing
 IP Spoofing
 Fake Identity
Spoofing
 Always keep your computer system updated with a good
anti virus software
 Do not open the mail if you do not recognize the sender.
 Ignore any mails with comes without sender names
 Ignore any mail which has your name in the sender details
 Do not open any mails if it has only a link in the body of the
message
 Use antivirus software’s.
 Insert firewalls.
 Uninstall unnecessary software
 Maintain backup.
 Check security settings.
 Never give your full name or address to
strangers.
 Learn more about Internet privacy.
SAFETY TIPS FOR CYBER
CRIME
 Internet security is a branch of computer
 security specifically related to the Internet.
 It's objective is to establish rules and measure to use
against attacks over the Internet
Cyber Security
 Defend us from critical attacks.
 Browse the safe website.
 Internet security process all the incoming and
outgoing data on our computer.
ADVANTAGES OF CYBER
SECURITY
 As someone rightly said that “bytes are replacing
bullets in the crime world”.
 The key to protecting yourself is being aware.
 Not all cybercriminals are “hackers.”
 There is a whole other world that exists in
cyberspace, make sure that your information travels
safely.
 Stay Secure.
Conclusion
Cyber crime

Weitere ähnliche Inhalte

Was ist angesagt?

Web Security
Web SecurityWeb Security
Web SecurityTripad M
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threadsVdidv
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYRc Os
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware MenaceTami Brass
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentationPhương Anh Pađi
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 

Was ist angesagt? (19)

cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Web Security
Web SecurityWeb Security
Web Security
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 

Ähnlich wie Cyber crime

Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security BasitShah18
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 

Ähnlich wie Cyber crime (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 

Kürzlich hochgeladen

O9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking MenO9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking MenSapana Sha
 
Angela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings RepublikGenuineGirls
 
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptxFactors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptxvemusae
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDYgalaxypingy
 
SELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYSELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYdizinfo
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageSocioCosmos
 
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...baharayali
 
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"SocioCosmos
 
c Starting with 5000/- for Savita Escorts Service 👩🏽‍❤️‍💋‍👨🏿 8923113531 ♢ Boo...
c Starting with 5000/- for Savita Escorts Service 👩🏽‍❤️‍💋‍👨🏿 8923113531 ♢ Boo...c Starting with 5000/- for Savita Escorts Service 👩🏽‍❤️‍💋‍👨🏿 8923113531 ♢ Boo...
c Starting with 5000/- for Savita Escorts Service 👩🏽‍❤️‍💋‍👨🏿 8923113531 ♢ Boo...gurkirankumar98700
 
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Paymentanilsa9823
 
This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...samuelcoulson30
 
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...anilsa9823
 
Learn About the Rise of Instagram Pro in 2024
Learn About the Rise of Instagram Pro in 2024Learn About the Rise of Instagram Pro in 2024
Learn About the Rise of Instagram Pro in 2024Islam Fit
 
"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's goSocioCosmos
 
Improve Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing CompanyImprove Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing CompanyWSI INTERNET PARTNER
 
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsPooja Nehwal
 

Kürzlich hochgeladen (20)

Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
O9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking MenO9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking Men
 
Angela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian | Operations Director | Dallas
Angela Killian | Operations Director | Dallas
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik
 
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptxFactors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDY
 
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
 
SELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYSELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANY
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence Package
 
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
 
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
 
c Starting with 5000/- for Savita Escorts Service 👩🏽‍❤️‍💋‍👨🏿 8923113531 ♢ Boo...
c Starting with 5000/- for Savita Escorts Service 👩🏽‍❤️‍💋‍👨🏿 8923113531 ♢ Boo...c Starting with 5000/- for Savita Escorts Service 👩🏽‍❤️‍💋‍👨🏿 8923113531 ♢ Boo...
c Starting with 5000/- for Savita Escorts Service 👩🏽‍❤️‍💋‍👨🏿 8923113531 ♢ Boo...
 
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
 
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
 
This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...
 
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
 
Learn About the Rise of Instagram Pro in 2024
Learn About the Rise of Instagram Pro in 2024Learn About the Rise of Instagram Pro in 2024
Learn About the Rise of Instagram Pro in 2024
 
"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go
 
Improve Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing CompanyImprove Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing Company
 
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
 

Cyber crime

  • 2.  Introduction  Definition  History  Categories  Types  Prevention  Conclusion Contents
  • 3.  Computer crime or Cyber Crime is criminal activity that involves unlawful access to computer systems.  Cyber crime is an illegal activity committed on the internet. Introduction
  • 4. Crime committed using a computer and the internet to steal data or information. Example:  Stealing credit card information  Breaking into government website Definition
  • 5.  The first cyber crime ever recorded was in France during 1820.  The person involved was Joseph-Marie.  He was a textile manufacturer, he made looms.  He invented looms that can store design. History
  • 6.  The first spam email took place in the year 1978.  The first virus was installed on Apple Computer in the year 1982.
  • 7.  The Computer as a Target: Using a computer to attacks other computer. e.g. Hacking, virus/worms attacks etc.  The Computer as a Weapon: Using a computer to commit real world crime e.g. Cyber terrorism, credit card fraud etc. Categories of Cyber Crime
  • 8.  Hacking  Credit Card Fraud  Virus Dissemination  Cyber Terrorism  Computer Vandalism  Software Piracy  Spoofing Types of Cyber Crime
  • 9. Hacking is a source of threat to security in computer. It is defined as unauthorized access to the computer system by a hacker. Types Of Hackers: i. White Hat Hackers ii. Black Hat Hackers iii. Gray Hat Hackers Hacking
  • 10.  When an individual uses another individuals’ credit card for personal reasons while the owner of the card and the card issuer are not aware of the fact that the card is being used.  This problem occur while using online banking, shopping. Credit Card Fraud
  • 11.  To avoid such a fraud the banks are now make a privacy so that one can’t use the others credit card because of the mobile security code and two steps verification.  Now this is an ethical conduct that is enforce by the banks to avoid such type of hacking.
  • 12. Malicious software that attaches itself to other software. Virus Dissemination
  • 13.  Example to create a virus by yourself open your notepad and write Following Code and paste it in notepad then Save it as “anyname.bat".  @echo off  :VIRUS  cd /d C:  md %RANDOM%  cd /d D:  md %RANDOM%  cd /d E:  md %RANDOM%  goto VIRUS
  • 14.  Keep a regular backup of your important files.  Be aware that most current viruses arrive as email attachments. Be very aware of any attachment that has any of the following file extensions: .exe .vbs .scr .vbe .com .bat .shs .cpl .dll .ocx .pif .drv .lnk .bin .sys .eml .nws  It is impossible for any anti-virus program to protect against all new viruses, so your best protection is to be very cautious about opening e-mail attachments.
  • 15.  Use of Internet based attacks in terrorist activities.  There are laws to prevent cyber crimes. For example: i. Seven Iranians working on behalf of Iranian government indicted on hacking charges. ii. Many persons has sent to jail recently in Rawalpindi for blackmailing on the social media Cyber Terrorism
  • 16.  Damaging or destroying data rather than stealing.  Transmitting virus.  Ethical way to deal with computer vandalism is not to give permissions to software without reading the agreements. Computer Vandalism
  • 17. For Example:  Write the Following code In Notepad Exactly as it says  01001011000111110010010101010101010000011111100000  Save as a .EXE -any name will do  Run the .exe  You are done !
  • 18.  Theft of software through the illegal copying of genuine programs. Software Piracy
  • 19.  Nowadays, no one is ready to use the original software’s as they are too costly.  Some of the organizations are now doing a serious attempt against the people who are involved in the distribution of pirated software’s.  For Example: BSA has many running cases.
  • 20.  The word "spoof" means to trick, or deceive. Therefore, in the IT world, spoofing refers tricking or deceiving computer systems or other computer users. This is typically done by hiding one's identity or faking the identity of another user on the Internet.  Spoofing can take place on the Internet in several different ways:  E-mail Spoofing  IP Spoofing  Fake Identity Spoofing
  • 21.  Always keep your computer system updated with a good anti virus software  Do not open the mail if you do not recognize the sender.  Ignore any mails with comes without sender names  Ignore any mail which has your name in the sender details  Do not open any mails if it has only a link in the body of the message
  • 22.  Use antivirus software’s.  Insert firewalls.  Uninstall unnecessary software  Maintain backup.  Check security settings.  Never give your full name or address to strangers.  Learn more about Internet privacy. SAFETY TIPS FOR CYBER CRIME
  • 23.  Internet security is a branch of computer  security specifically related to the Internet.  It's objective is to establish rules and measure to use against attacks over the Internet Cyber Security
  • 24.  Defend us from critical attacks.  Browse the safe website.  Internet security process all the incoming and outgoing data on our computer. ADVANTAGES OF CYBER SECURITY
  • 25.  As someone rightly said that “bytes are replacing bullets in the crime world”.  The key to protecting yourself is being aware.  Not all cybercriminals are “hackers.”  There is a whole other world that exists in cyberspace, make sure that your information travels safely.  Stay Secure. Conclusion