SlideShare a Scribd company logo
1 of 32
CONTENTS
• Definition
• First Occurrence of cyber crime
• Evolution of cyber crimes
• Categories of Cyber Crime
• Types of Cyber Crime
• Target of cyber crime
• Cyber Security
• Safety tips to avoid Cyber Crime
• Concluding remarks
Cyberspace is the electronic medium
of computer networks in which
online communication takes place.
Cyber Crime refers to all activities
done with criminal intent in
cyberspace.
 The Computer as a Target
 The computer as a weapon
Categories of cyber crime
• Computer as a target
• Computer used as a target in which we use
computer to attack other computers.
E.g ,hack someone computer ,virus launching
and worm attack
• Computer as a weapon
• Computer used a weapon means using
computer to commit real crime of world
• pornography, cyber terrorism and credit card
fraud.
Target Of Cyber Crime
• Cyber crimes against persons.
• Cyber crimes against property.
• Cyber crimes against government
• Cyber crimes against society.
CYBER CRIMES AGAINST PERSONS
Harassment via E-Mails
Hacking
E-Mail bombing
Assault by Threat
CYBER CRIMES AGAINST PROPERTY
Cyber Vandalism
Transmitting Virus
Thefts data ,records ,
files etc.
Cyber crimes against government
large-scale disruption of computer
networks, and use computer in terrorism
activities
Examples of Cyber Terrorism
• Hacking into computer systems.
• Introducing viruses to vulnerable
networks.
• Website Defacing.
• Terroristic threats made via e-mail.
History of cyber crime
• Internet origin in 1969 with USA government
experiment .
• 1st cyber crime is spam email took place in
1976 when it was sent out over the Arpanet
(Advanced Research Projects Agency
Network).
• 2nd cyber-crime occurs in 1982 when virus
installed in Apple computer
Evolution of cyber crime
Cyber Threat Evolution
Virus
Breaking
Web Sites
Malicious
Code
(Melissa)
Advanced Worm /
Trojan (I LOVE
YOU)
Identity Theft
(Phishing)
Organised Crime
Data Theft, DoS /
DDoS
1995 2000 2003-04 2005-06 2007-081977
Evolution of cyber threat
• 1969 internet origin and within
next 7 year a 1st cyber crime occur
• 1st cyber-crime that was spam email
that was sent in 1976
• top 3 countries that is most popular
in spam email crime are involved is
USA ,UK ,INDIA
• 2nd cyber-crime occurs in
1982 when a virus installed in
apple computer
• In 1993 1st website developed
and then internet used become
friendly
• 1996 website was hacked
• In 2000 coding started
through which we can apply
code and password to all kind
of data
• 2001 code cracking started
• Advanced worm launched in
2003
• Phishing crime started in
2005.
• Child Pornography
• Virus Dissemination
• Computer Vandalism
• Cyberterrorism
• Software Piracy
• Credit Card Fraud
• Mobile Hacking
Different Types of Cybercrimes
Cyber crimes
Hacking
Information
Theft
E-mail
bombing
Salami
attacks
Phishing
Trojan
attacks
Web jacking
• Email bombing
It refers to sending large numbers of mail
to the victim, which may be an individual
or a company by ultimately resulting into
crashing.
• Trojan attacks /Trojan horse
In software field this means an
unauthorized program, which passively
gains control over another’s computer by
representing itself as an authorized
program. The most common form of
installing a Trojan is through e-mail.
• Web jacking
This term is derived from the term hi
jacking. In these kinds of offences the
hacker gains access and control over the
website of another. He may even
manipulate or change the information of
the website. This may be done for
fulfilling political objectives or for
• Virus Attacks
Viruses are programs that attach themselves
to a computer or a file and then circulate
themselves to other files and to other
computers on a network. They usually affect
the data on a computer, either by altering or
deleting it.
Worm Attacks
Worms unlike viruses do not need the host to
attach themselves to. They merely make
functional copies of themselves and do this
repeatedly till they eat up all the available
space on the computer’s memory.
– Salami attacks
This kind of crime is normally prevalent in
the financial institutions or for the purpose of
committing financial crimes. An important
feature of this type of offence is that the
alteration is so small that it would normally
go unnoticed.
• Phishing
Unsolicited emails by
customers of Financial
Institutions, requesting them to
enter their Username,
Password or other personal
information to access their
Account for some reason..
Spamming
Electronic spamming is the use
of electronic messaging
systems to send unsolicited
bulk messages (spam),
VIRUS DISSEMINATION
• Malicious software that attaches
itself to other software. (virus,
worms, Trojan Horse, web jacking,
e-mail bombing etc.)
HACKING
• Hacking in simple terms means an illegal
intrusion into a computer system and/or
network.
COMPUTER VANDALISM
• Damaging or destroying data rather
than stealing.
• Transmitting virus
SOFTWARE PIRACY
• Theft of software through the illegal
copying of genuine programs.
Use of Internet based attacks
in terrorist activities.
Theft of software through the illegal copying of
genuine programs.
Distribution of products intended to pass for the
original.
 Cyber security is a branch of computer security
specifically related to the Internet.
 It's objective is to establish rules and measure to use
against attacks over the Internet.
1.Install OS/Software Updates
2.Run Anti-virus Software
3. Prevent Identity Theft
5. Avoid Spyware/Adware
7. Back up Important Files
6. Turn on Personal Firewalls
4. Protect Passwords
An Instance of Cyber terrorism
 Ahmedabad Bomb Blast(26-07-08)
o A mail with id alarbi_gujrat@
yahoo.com was being sent by a group of
Terrorists.
o Person named Kenneth Haywood’s
unsecured WIFI router in his house was
being misused by terrorists.
o 3 more mails were sent after the blast
with the same misuse of unsecured WIFI
routers.
aashir980@gmail.com

More Related Content

What's hot (20)

Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Hacking
HackingHacking
Hacking
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to Cyber crime (20)

cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
pravallika chowdary
pravallika chowdarypravallika chowdary
pravallika chowdary
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 

Recently uploaded

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 

Recently uploaded (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 

Cyber crime

  • 1.
  • 2. CONTENTS • Definition • First Occurrence of cyber crime • Evolution of cyber crimes • Categories of Cyber Crime • Types of Cyber Crime • Target of cyber crime • Cyber Security • Safety tips to avoid Cyber Crime • Concluding remarks
  • 3. Cyberspace is the electronic medium of computer networks in which online communication takes place. Cyber Crime refers to all activities done with criminal intent in cyberspace.
  • 4.  The Computer as a Target  The computer as a weapon
  • 5. Categories of cyber crime • Computer as a target • Computer used as a target in which we use computer to attack other computers. E.g ,hack someone computer ,virus launching and worm attack • Computer as a weapon • Computer used a weapon means using computer to commit real crime of world • pornography, cyber terrorism and credit card fraud.
  • 6. Target Of Cyber Crime • Cyber crimes against persons. • Cyber crimes against property. • Cyber crimes against government • Cyber crimes against society.
  • 7. CYBER CRIMES AGAINST PERSONS Harassment via E-Mails Hacking E-Mail bombing Assault by Threat
  • 8. CYBER CRIMES AGAINST PROPERTY Cyber Vandalism Transmitting Virus Thefts data ,records , files etc.
  • 9. Cyber crimes against government large-scale disruption of computer networks, and use computer in terrorism activities Examples of Cyber Terrorism • Hacking into computer systems. • Introducing viruses to vulnerable networks. • Website Defacing. • Terroristic threats made via e-mail.
  • 10. History of cyber crime • Internet origin in 1969 with USA government experiment . • 1st cyber crime is spam email took place in 1976 when it was sent out over the Arpanet (Advanced Research Projects Agency Network). • 2nd cyber-crime occurs in 1982 when virus installed in Apple computer
  • 12. Cyber Threat Evolution Virus Breaking Web Sites Malicious Code (Melissa) Advanced Worm / Trojan (I LOVE YOU) Identity Theft (Phishing) Organised Crime Data Theft, DoS / DDoS 1995 2000 2003-04 2005-06 2007-081977
  • 13. Evolution of cyber threat • 1969 internet origin and within next 7 year a 1st cyber crime occur • 1st cyber-crime that was spam email that was sent in 1976 • top 3 countries that is most popular in spam email crime are involved is USA ,UK ,INDIA
  • 14. • 2nd cyber-crime occurs in 1982 when a virus installed in apple computer • In 1993 1st website developed and then internet used become friendly • 1996 website was hacked
  • 15. • In 2000 coding started through which we can apply code and password to all kind of data • 2001 code cracking started
  • 16. • Advanced worm launched in 2003 • Phishing crime started in 2005.
  • 17. • Child Pornography • Virus Dissemination • Computer Vandalism • Cyberterrorism • Software Piracy • Credit Card Fraud • Mobile Hacking
  • 18. Different Types of Cybercrimes Cyber crimes Hacking Information Theft E-mail bombing Salami attacks Phishing Trojan attacks Web jacking
  • 19. • Email bombing It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing. • Trojan attacks /Trojan horse In software field this means an unauthorized program, which passively gains control over another’s computer by representing itself as an authorized program. The most common form of installing a Trojan is through e-mail. • Web jacking This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the website of another. He may even manipulate or change the information of the website. This may be done for fulfilling political objectives or for
  • 20. • Virus Attacks Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worm Attacks Worms unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on the computer’s memory. – Salami attacks This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed.
  • 21. • Phishing Unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason.. Spamming Electronic spamming is the use of electronic messaging systems to send unsolicited bulk messages (spam),
  • 22. VIRUS DISSEMINATION • Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)
  • 23. HACKING • Hacking in simple terms means an illegal intrusion into a computer system and/or network.
  • 24. COMPUTER VANDALISM • Damaging or destroying data rather than stealing. • Transmitting virus
  • 25. SOFTWARE PIRACY • Theft of software through the illegal copying of genuine programs.
  • 26. Use of Internet based attacks in terrorist activities.
  • 27. Theft of software through the illegal copying of genuine programs. Distribution of products intended to pass for the original.
  • 28.
  • 29.  Cyber security is a branch of computer security specifically related to the Internet.  It's objective is to establish rules and measure to use against attacks over the Internet.
  • 30. 1.Install OS/Software Updates 2.Run Anti-virus Software 3. Prevent Identity Theft 5. Avoid Spyware/Adware 7. Back up Important Files 6. Turn on Personal Firewalls 4. Protect Passwords
  • 31. An Instance of Cyber terrorism  Ahmedabad Bomb Blast(26-07-08) o A mail with id alarbi_gujrat@ yahoo.com was being sent by a group of Terrorists. o Person named Kenneth Haywood’s unsecured WIFI router in his house was being misused by terrorists. o 3 more mails were sent after the blast with the same misuse of unsecured WIFI routers.