3. SUMMARY
The internet is growing rapidly.
Rise in new opportunities in the modern
world.
Internet also has its own disadvantages
which is :
4. WHAT IS CYBERCRIME ?
Crime committed using a computer and the
internet to steal a person’s identity or illegal
imports or malicious programs
the computer used as an object or subject of
crime
5. HISTORY
Abacus is the earliest and simplest form of computer
which dates back about 3500 B.C and was used in
some parts of the world such as China
First recorded cyber crime dates back to 1820
Joseph-Marie Jacquard had a textile manufacture
introduced the loom
The loom threatened the employees in the firm who
then decided to sabotage it in order to discourage
Jacquard from further use of the loom
6. Cont’d
First spam email took place in 1978 when it
was sent over the Arpanet
The first virus was installed on an Apple
computer in 1982
8. HACKING
Illegal intrusion into a computer system
and/or network
Hackers writes or use ready-made computer
programs to attack the target computer
Includes breaking into a computer with
intention to steal, damage, modify or monitor
data or settings within a system
9. CHILD PORNOGRAPHY
The internet is being highly used by its
abusers to reach and abuse children
sexually, worldwide
Nowadays, more homes have internet
access, more children would be using the
internet and high chances of falling victim to
paedophiles
10. Denial of Service
The criminal floods the bandwidth of victims
network or fills his e-mail box with spam mail
depriving him of the services he is entitled to
access or provide
11. VIRUS DISSEMINITION
Malicious software that attaches itself to
other software
Circulate themselves to other files and to
other computers on a network
Affect the data on a computer, either by
altering or deleting it
14. CYBER TERRORISM
It is the actual use of computers and internet
technology to cause intimidation and
destruction
Uses the internet or network to destroy or
damage computers for political reasons
Cyber terrorists could hack into a
pharmaceutical company’s
computers, changing the formula of some
essential medication and causing thousands
to die
15. SOFTWARE PIRACY
Theft of software through an illegal act of
copying a genuine programs or the
counterfeiting and distribution of products
intended to pass for the original
Copying and using computer programs in
violation of copyrights and trade secret laws
Retail revenue losses worldwide are ever
increasing due to software piracy
19. CASE STUDY 1
Cyber criminals target social network &
Windows users with Blackhole malware.
Disuised as Windows
licences, Facebook account
verification, Skype voicemail
notifications & spam messages.
Biggest dangers Internet users face.
20. Users who click the malicious Blackhole
links & downloaded the files were
infected with a Trojan virus.
Spam email campaign targeted
Facebook users with a message
claiming that their account was locked
and needed to be re-verified.
The links led to Blackhole exploits and a
Zeus Trojan disguised as an Adobe
Flash Player download.
21. Users should verify the source and
destination of any link before clicking
they should never run executable files
unless they are positive that the source
is legitimate
23. CASE STUDY 2
Chinese hackers increasingly attracted to
US drone technology
Hacker group “Comment Crew” hacked US
military network stealing classified
information of US military drones.
They targeted both large
companies, including US military contractors
& military firms focused on drone technology.
24. Chinese drone identical to US Predator
drone.
US drone market could be the first victim of
Chinese espionage.
26. Antivirus & Anti Spyware
software
to identify and eliminate computer
viruses and other malicious software.
to restrict backdoor program, trojans
and other spywares to be installed on
the computer.
27. Firewalls
protects a computer network from
unauthorized access.
guards an internal computer network
against malicious access from outside
the network.
28. Cryptography
science of encrypting and decrypting
information.
Encryption is like sending a postal mail
to another party with a lock code on the
envelope which is known only to the
sender & the recipient.
A number of cryptographic methods
have been developed and some of them
are still not cracked.
29. Cyber Laws & Ethics
Responsibility of every individual to
follow cyber ethics and cyber laws.
ISP should provide high level security at
their severs
Security software as a protection
Essential features in the cyber world
today.
30. CONCLUSION
Cybercrimes increase with the rapidly
growing internet technology.
It is not possible to eliminate
cybercrimes.
It is quite possible to
check them.
Awareness is always the
first step to protect yourself.