2. Cybercrime is nothing but where the computer used
as an object or subject of crime.
Cyber crime is an evil having its origin in the growing
dependence on computers in modern life. In a day and
age when everything from microwave ovens and
refrigerators to nuclear power plants is being run on
computers, cyber crime has assumed rather sinister
implications.
Crime committed using a computer and the internet
to steal a person's identity or illegal imports or
malicious programs
2 2
3. In the early decades of modern information technology (IT),
computer crimes were largely committed by individual disgruntled
and dishonest employees.
Physical damage to computer systems was a prominent threat
until the 1980s.
Programmers in the 1980s began writing malicious software,
including self-replicating programs, to interfere with personal
computers.
As the Internet increased access to increasing numbers of
systems worldwide, criminals used unauthorized access to poorly
protected systems for vandalism, political action and financial
gain.
3 3
4. Criminal activity involving
Information technology
infrastructure
Illegal access
Data interference
Misuse of devices
Forgery and
Electronic fraud.
4 4
5. Types of Cyber Crime
Hacking - Hacking in simple terms means an illegal
intrusion into a computer system without permission of
computer owner/user. Hackers write or use ready-made
computer programs to attack the target computer.
Software Piracy - Theft of software through the illegal
copying of genuine programs or the counterfeiting and
distribution of products intended to pass for the
original. The unauthorized copying of software.
5
6. Email spoofing - A spoofed email is one that appears to
originate from one source but actually has been sent
from another source.
Phishing - The e-mail directs the user to visit a Web site
where they ar asked to update personal information,
such as passwords and credit card social security, and
bank account numbers, that the legitimat organization
already has .
6
9. Harassment via e-mails
Email spoofing
Defamation. Unauthorized control/access
over computer system
Cheating & Fraud
Phishing
9 9
10. Unauthorized control/access over computer
system.
Possession of unauthorized information.
Cyber terrorism against the government
organization.
Distribution of pirated software etc.
10 1
11. 12
Polluting the youth
through indecent
exposure.
Trafficking
Financial crimes
Sale of illegal articles
Online gambling
Forgery
1
15. User awareness is key to a secure computer/network
Do not open suspicious files/emails
Avoid using P2P programs
Avoid downloading freeware
If attacked, disconnect the network. Do not turn off the
computer
So we must pay attention to all those issues and protect the
World from Cyber Crime
“If you spend more on coffee than on IT security, you
will be hacked. What’s more, you deserve to be hacked.
— White House Cybersecurity Advisor” ─ Richard
Clarke
15
1