my presentation
TRANSCRIPT
The most critical and increasing problem.
Cyber Crime
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where the computer used as an object or subject of crime .
What is Cyber Crime?
HISTORY:The first recorded cyber crime took place in the year 1820 That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C.
TYPES OF CYBER CRIME:
Hacking.Denial of service Attacks.IRC CrimeCredit Card FraudPhishingSpoofingSalami AttacksPornographyNet ExtortionSoftware Piracy
HACKING:Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage..
DENIAL OF SERVICE ATTACKS:
This is an act by the criminal, who floods the band width of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.
IRC (INTERNET RELAY CHAT):
Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other .Criminals use it for meeting coconspirators. Hackers use it for discussing their exploits / sharing the techniquesPedophiles use chat rooms to allure small children.
CREDIT CARD FRAUD:
You simply have to type credit card number into www page off the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
PHISHING:Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
SOFTWARE PIRACY:Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Retail revenue losses world wide are ever increasing due to this crime Can be done in various ways such as end user copying, hard disk loading, Counterfeiting, Illegal downloads from the internet etc
PORNOGRAPHY:Pornography is the first consistently successful ecommerce product. It was a deceptive marketing tactics and mouse trapping technologies. Pornography encourage customers to access their websites. Anybody including children can log on to the internet and access website with pornography contents with a click of a mouse.
VIRUS:In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD. The immediate source of the e-mail note, downloaded file, or diskette you've received is usually unaware that it contains a virus. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious softwares)
THEREFORE THERE ARE MANY CRIMES WHICH ARE DONE THROUGH INTERNET.
PRECAUTION TO STOP CYBER CRIMES:
Update your virus protection software often at least once a week.Change your password frequently and never give them out to anyone! Use password that are at least 6 characters and do not contain words in the dictionary.
Back Up your files very regularly.Don’t open suspicious attachments. Always look at the three letter file extension.Don’t leave your computer unattended after logging in (And always log out when you are finished).
Presented By:
Devashri Balinge.Priyanka Deshpande.
THANK YOU!
QUESTIONS: