SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Presented & performed by




                           Divya Rani
                               115353
                              CSE N 2
   Introduction
   History
   Cyber Criminals
   Modes & Manner
   Categories
   Types
   Cyber Security
   Protecting your privacy
   How can we protect?
   Concluding remarks
Crime committed using a computer and the internet to steal a
person's identity or illegal imports or malicious programs
Cybercrime is nothing but where the computer used as an object
or subject of crime.
The first spam email took place in 1978 when it was sent out over the
Arpanet (Advanced Research Projects Agency Network),.
The first virus was installed on an Apple computer in 1982 when a
high school student, Rich Skrenta, developed the Elk cloner.
Those who are doing crimes by using the computer as an target or
object.
i. Children and adolescents between the age group of 6 – 18 years
ii. Dissatisfied employees
iii. Professional hackers / crackers
iv. Organized hackers
Unauthorized access to computer systems or networks:
         This is generally referred as ‘Hacking’. That is accessing the
information of others without proper authorization.

Theft of information contained in electronic form:
        This includes theft of information stored in computer hard disks,
removable storage media etc.
Data diddling:
 This is altering raw data just before a computer processes it and
 then changing it back after the processing is completed.
Denial of Service attack:
 The computer is flooded with more requests than it can handle which
 cause it to crash. Distributed Denial of Service (DDOS) attack is a
 example.
Trojan attacks:
   It means unauthorized programmer. It gains control over another’s
  system by representing itself as an authorized programmer.
 Web jacking:
    This term is derived from the term hi jacking. In these kinds of offences
    the hacker gains access and control over the web site of another.
Email bombing:
  It refers to sending large numbers of mail to the victim, which
  may be an individual or a company by ultimately resulting into
  crashing.
The Cyber crimes are categorized as the following
  i. Cyber crimes against persons
  ii. Cyber crimes against Individual Property
  iii. Cyber crimes against government
Under these categorize there are many ways to done Crimes. Here let
we see some ways …
i. Harassment via e-mails:
      Harassment through e-mails is not a new concept. It is very similar
      to harassing through letters.
ii. Cyber-stalking :
      Cyber stalking involves following a person movements across the
      Internet by posting messages.
iii. Email spoofing:
      A mail which misrepresents its origin. It shows it's origin to be
      different from which actually it originates.
i.Computer Vandalism:
     Damaging or destroying data rather than stealing or misusing them is
     called cyber vandalism.
ii.Transmitting virus:
     These are programs that attach themselves to a file and then
     circulate .
     They usually affect the data on a computer, either by altering or
     deleting it.
Cyber Terrorism:
  Terrorist attacks on the Internet is by distributed denial of service
  attacks, hate websites and hate emails, attacks on sensitive computer
  networks, etc. Technology savvy terrorists are using 512-bit encryption,
  which is impossible to decrypt.
  The recent example may be cited of – Osama Bin Laden, the LTTE, and
  attack on America’s army deployment system during Iraq war.
i. Child Pornography:
      The use of computer networks to create, distribute, or access
      materials that sexually use underage children.
ii. Cyber Contraband:
      Transferring illegal items through the internet (such as encryption
      technology) that is barred in some locations.
iii. Cyber laundering:
      Electronic transfer of illegally-obtained money with the goal of hiding
      its source and possibly its destination.
iv. Cyber Stalking:
    Threats that creates fear through the use of computer technology such
    as email, phones, text messages, webcams, websites or videos.
v. Cyber Theft:
    Using a computer to steal. This includes activities related to: breaking
    and entering, unlawful appropriation, identity theft, fraud, malicious
    hacking and piracy.
Cyber security involves protection of sensitive personal and
business    information through prevention, detection, and
response to different online attacks.
 Cyber security actually protects your personal information by
responding, detecting and preventing the attacks.
Privacy policy :
   Before submitting your name, email address, or other personal
   information on a web site, look for the site's privacy policy.
Evidence that your information is being encrypted :
   To protect attackers from hijacking your information, any personal
   information submitted online should be encrypted. Many sites use SSL
   or secure sockets layer, to encrypt information.
Keep software up to date:
  If the seller releases patches for the software operating your device,
  install them as soon as possible. Installing them will prevent attackers
  from being able to take advantage.
Use good passwords:
  Select passwords that will be difficult for thieves to guess. Do not
  choose options that allow your computer to remember your
  passwords.
Disable remote connectivity:
   Some PDA’s and phones are equipped with wireless technologies,
   such as Bluetooth, that can be used to connect to other devices or
   computers. You should disable these features when they are not in
   use.
Cybercrime is indeed getting the recognition it
deserves.
However, it is not going to restricted that easily.
In fact, it is highly likely that cybercrime and its
hackers will continue developing and upgrading to
stay ahead of the law.
So, to make us a safer we must need cyber
security.
Thank You

Divya Rani

Mais conteúdo relacionado

Mais procurados

Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivismrashidirazali
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime finalKudakwashe Shamu
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsPrabesh Shrestha
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPTAnandKaGe
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 

Mais procurados (20)

cyber crime
cyber crimecyber crime
cyber crime
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
it act
it actit act
it act
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 

Destaque

Oliver toni presentació bowie
Oliver toni presentació bowieOliver toni presentació bowie
Oliver toni presentació bowieies llucmajor
 
Stamps of Emotion
Stamps of EmotionStamps of Emotion
Stamps of Emotionmmw5183
 
Atestat mihaela corectat
Atestat mihaela corectatAtestat mihaela corectat
Atestat mihaela corectatMĂDĂLINA TOMA
 
Reducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksReducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksJames Cash
 
Computer Networking
Computer NetworkingComputer Networking
Computer NetworkingAlisha Jain
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

Destaque (16)

Models and Ontologies: differences
Models and Ontologies: differencesModels and Ontologies: differences
Models and Ontologies: differences
 
Oliver toni presentació bowie
Oliver toni presentació bowieOliver toni presentació bowie
Oliver toni presentació bowie
 
Art pp
Art ppArt pp
Art pp
 
Aduh ujang
Aduh ujangAduh ujang
Aduh ujang
 
Stamps of Emotion
Stamps of EmotionStamps of Emotion
Stamps of Emotion
 
Atestat mihaela corectat
Atestat mihaela corectatAtestat mihaela corectat
Atestat mihaela corectat
 
Reducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksReducing the Impact of Cyber Attacks
Reducing the Impact of Cyber Attacks
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 

Semelhante a Cyber Crime

Semelhante a Cyber Crime (20)

Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 

Último

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 

Último (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 

Cyber Crime

  • 1.
  • 2. Presented & performed by Divya Rani 115353 CSE N 2
  • 3. Introduction  History  Cyber Criminals  Modes & Manner  Categories  Types  Cyber Security  Protecting your privacy  How can we protect?  Concluding remarks
  • 4. Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs Cybercrime is nothing but where the computer used as an object or subject of crime.
  • 5. The first spam email took place in 1978 when it was sent out over the Arpanet (Advanced Research Projects Agency Network),. The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk cloner.
  • 6. Those who are doing crimes by using the computer as an target or object. i. Children and adolescents between the age group of 6 – 18 years ii. Dissatisfied employees iii. Professional hackers / crackers iv. Organized hackers
  • 7. Unauthorized access to computer systems or networks: This is generally referred as ‘Hacking’. That is accessing the information of others without proper authorization. Theft of information contained in electronic form: This includes theft of information stored in computer hard disks, removable storage media etc.
  • 8. Data diddling: This is altering raw data just before a computer processes it and then changing it back after the processing is completed. Denial of Service attack: The computer is flooded with more requests than it can handle which cause it to crash. Distributed Denial of Service (DDOS) attack is a example.
  • 9. Trojan attacks: It means unauthorized programmer. It gains control over another’s system by representing itself as an authorized programmer. Web jacking: This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the web site of another. Email bombing: It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing.
  • 10. The Cyber crimes are categorized as the following i. Cyber crimes against persons ii. Cyber crimes against Individual Property iii. Cyber crimes against government Under these categorize there are many ways to done Crimes. Here let we see some ways …
  • 11. i. Harassment via e-mails: Harassment through e-mails is not a new concept. It is very similar to harassing through letters. ii. Cyber-stalking : Cyber stalking involves following a person movements across the Internet by posting messages. iii. Email spoofing: A mail which misrepresents its origin. It shows it's origin to be different from which actually it originates.
  • 12. i.Computer Vandalism: Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. ii.Transmitting virus: These are programs that attach themselves to a file and then circulate . They usually affect the data on a computer, either by altering or deleting it.
  • 13. Cyber Terrorism: Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt. The recent example may be cited of – Osama Bin Laden, the LTTE, and attack on America’s army deployment system during Iraq war.
  • 14. i. Child Pornography: The use of computer networks to create, distribute, or access materials that sexually use underage children. ii. Cyber Contraband: Transferring illegal items through the internet (such as encryption technology) that is barred in some locations. iii. Cyber laundering: Electronic transfer of illegally-obtained money with the goal of hiding its source and possibly its destination.
  • 15. iv. Cyber Stalking: Threats that creates fear through the use of computer technology such as email, phones, text messages, webcams, websites or videos. v. Cyber Theft: Using a computer to steal. This includes activities related to: breaking and entering, unlawful appropriation, identity theft, fraud, malicious hacking and piracy.
  • 16. Cyber security involves protection of sensitive personal and business information through prevention, detection, and response to different online attacks. Cyber security actually protects your personal information by responding, detecting and preventing the attacks.
  • 17. Privacy policy : Before submitting your name, email address, or other personal information on a web site, look for the site's privacy policy. Evidence that your information is being encrypted : To protect attackers from hijacking your information, any personal information submitted online should be encrypted. Many sites use SSL or secure sockets layer, to encrypt information.
  • 18. Keep software up to date: If the seller releases patches for the software operating your device, install them as soon as possible. Installing them will prevent attackers from being able to take advantage. Use good passwords: Select passwords that will be difficult for thieves to guess. Do not choose options that allow your computer to remember your passwords.
  • 19. Disable remote connectivity: Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.
  • 20. Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily. In fact, it is highly likely that cybercrime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security.