my presentation

23
The most critical and increasing problem. Cyber Crime

Upload: devashri-balinge

Post on 08-May-2015

363 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: My presentation

The most critical and increasing problem.

Cyber Crime

Page 2: My presentation

Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where the computer used as an object or subject of crime .

What is Cyber Crime?

Page 3: My presentation

HISTORY:The first recorded cyber crime took place in the year 1820 That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C.

Page 4: My presentation
Page 5: My presentation

TYPES OF CYBER CRIME:

Hacking.Denial of service Attacks.IRC CrimeCredit Card FraudPhishingSpoofingSalami AttacksPornographyNet ExtortionSoftware Piracy

Page 6: My presentation
Page 7: My presentation

HACKING:Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage..

Page 8: My presentation

DENIAL OF SERVICE ATTACKS:

This is an act by the criminal, who floods the band width of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.

Page 9: My presentation
Page 10: My presentation

IRC (INTERNET RELAY CHAT):

Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other .Criminals use it for meeting coconspirators. Hackers use it for discussing their exploits / sharing the techniquesPedophiles use chat rooms to allure small children.

Page 11: My presentation

CREDIT CARD FRAUD:

You simply have to type credit card number into www page off the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.

Page 12: My presentation
Page 13: My presentation

PHISHING:Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

Page 14: My presentation

SOFTWARE PIRACY:Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Retail revenue losses world wide are ever increasing due to this crime Can be done in various ways such as end user copying, hard disk loading, Counterfeiting, Illegal downloads from the internet etc

Page 15: My presentation

PORNOGRAPHY:Pornography is the first consistently successful ecommerce product. It was a deceptive marketing tactics and mouse trapping technologies. Pornography encourage customers to access their websites. Anybody including children can log on to the internet and access website with pornography contents with a click of a mouse.

Page 16: My presentation

VIRUS:In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD. The immediate source of the e-mail note, downloaded file, or diskette you've received is usually unaware that it contains a virus. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious softwares)

Page 17: My presentation
Page 18: My presentation

THEREFORE THERE ARE MANY CRIMES WHICH ARE DONE THROUGH INTERNET.

Page 19: My presentation

PRECAUTION TO STOP CYBER CRIMES:

Update your virus protection software often at least once a week.Change your password frequently and never give them out to anyone! Use password that are at least 6 characters and do not contain words in the dictionary.

Page 20: My presentation

Back Up your files very regularly.Don’t open suspicious attachments. Always look at the three letter file extension.Don’t leave your computer unattended after logging in (And always log out when you are finished).

Page 21: My presentation

Presented By:

Devashri Balinge.Priyanka Deshpande.

Page 22: My presentation

THANK YOU!

Page 23: My presentation

QUESTIONS: