2. CONTENTS
• Definition
• First Occurrence of cyber crime
• Evolution of cyber crimes
• Categories of Cyber Crime
• Types of Cyber Crime
• Target of cyber crime
• Cyber Security
• Safety tips to avoid Cyber Crime
• Concluding remarks
3. Cyberspace is the electronic medium
of computer networks in which
online communication takes place.
Cyber Crime refers to all activities
done with criminal intent in
cyberspace.
5. Categories of cyber crime
• Computer as a target
• Computer used as a target in which we use
computer to attack other computers.
E.g ,hack someone computer ,virus launching
and worm attack
• Computer as a weapon
• Computer used a weapon means using
computer to commit real crime of world
• pornography, cyber terrorism and credit card
fraud.
6. Target Of Cyber Crime
• Cyber crimes against persons.
• Cyber crimes against property.
• Cyber crimes against government
• Cyber crimes against society.
7. CYBER CRIMES AGAINST PERSONS
Harassment via E-Mails
Hacking
E-Mail bombing
Assault by Threat
8. CYBER CRIMES AGAINST PROPERTY
Cyber Vandalism
Transmitting Virus
Thefts data ,records ,
files etc.
9. Cyber crimes against government
large-scale disruption of computer
networks, and use computer in terrorism
activities
Examples of Cyber Terrorism
• Hacking into computer systems.
• Introducing viruses to vulnerable
networks.
• Website Defacing.
• Terroristic threats made via e-mail.
10. History of cyber crime
• Internet origin in 1969 with USA government
experiment .
• 1st cyber crime is spam email took place in
1976 when it was sent out over the Arpanet
(Advanced Research Projects Agency
Network).
• 2nd cyber-crime occurs in 1982 when virus
installed in Apple computer
12. Cyber Threat Evolution
Virus
Breaking
Web Sites
Malicious
Code
(Melissa)
Advanced Worm /
Trojan (I LOVE
YOU)
Identity Theft
(Phishing)
Organised Crime
Data Theft, DoS /
DDoS
1995 2000 2003-04 2005-06 2007-081977
13. Evolution of cyber threat
• 1969 internet origin and within
next 7 year a 1st cyber crime occur
• 1st cyber-crime that was spam email
that was sent in 1976
• top 3 countries that is most popular
in spam email crime are involved is
USA ,UK ,INDIA
14. • 2nd cyber-crime occurs in
1982 when a virus installed in
apple computer
• In 1993 1st website developed
and then internet used become
friendly
• 1996 website was hacked
15. • In 2000 coding started
through which we can apply
code and password to all kind
of data
• 2001 code cracking started
16. • Advanced worm launched in
2003
• Phishing crime started in
2005.
18. Different Types of Cybercrimes
Cyber crimes
Hacking
Information
Theft
E-mail
bombing
Salami
attacks
Phishing
Trojan
attacks
Web jacking
19. • Email bombing
It refers to sending large numbers of mail
to the victim, which may be an individual
or a company by ultimately resulting into
crashing.
• Trojan attacks /Trojan horse
In software field this means an
unauthorized program, which passively
gains control over another’s computer by
representing itself as an authorized
program. The most common form of
installing a Trojan is through e-mail.
• Web jacking
This term is derived from the term hi
jacking. In these kinds of offences the
hacker gains access and control over the
website of another. He may even
manipulate or change the information of
the website. This may be done for
fulfilling political objectives or for
20. • Virus Attacks
Viruses are programs that attach themselves
to a computer or a file and then circulate
themselves to other files and to other
computers on a network. They usually affect
the data on a computer, either by altering or
deleting it.
Worm Attacks
Worms unlike viruses do not need the host to
attach themselves to. They merely make
functional copies of themselves and do this
repeatedly till they eat up all the available
space on the computer’s memory.
– Salami attacks
This kind of crime is normally prevalent in
the financial institutions or for the purpose of
committing financial crimes. An important
feature of this type of offence is that the
alteration is so small that it would normally
go unnoticed.
21. • Phishing
Unsolicited emails by
customers of Financial
Institutions, requesting them to
enter their Username,
Password or other personal
information to access their
Account for some reason..
Spamming
Electronic spamming is the use
of electronic messaging
systems to send unsolicited
bulk messages (spam),
22. VIRUS DISSEMINATION
• Malicious software that attaches
itself to other software. (virus,
worms, Trojan Horse, web jacking,
e-mail bombing etc.)
23. HACKING
• Hacking in simple terms means an illegal
intrusion into a computer system and/or
network.
27. Theft of software through the illegal copying of
genuine programs.
Distribution of products intended to pass for the
original.
28.
29. Cyber security is a branch of computer security
specifically related to the Internet.
It's objective is to establish rules and measure to use
against attacks over the Internet.
30. 1.Install OS/Software Updates
2.Run Anti-virus Software
3. Prevent Identity Theft
5. Avoid Spyware/Adware
7. Back up Important Files
6. Turn on Personal Firewalls
4. Protect Passwords
31. An Instance of Cyber terrorism
Ahmedabad Bomb Blast(26-07-08)
o A mail with id alarbi_gujrat@
yahoo.com was being sent by a group of
Terrorists.
o Person named Kenneth Haywood’s
unsecured WIFI router in his house was
being misused by terrorists.
o 3 more mails were sent after the blast
with the same misuse of unsecured WIFI
routers.