SlideShare uma empresa Scribd logo
1 de 14
Computer Crime
By Inqilab Ruknuddin Patel (MCS)
KN Academy Malir
Cyber Crime
   "Offences that are committed against individuals or
   groups of individuals with a criminal motive to
   intentionally harm the reputation of the victim or
   cause physical or mental harm to the victim directly
   or indirectly, using modern telecommunication
   networks such as Internet (Chat rooms, emails,
   notice boards and groups) and mobile phones
   (SMS/MMS)“
Internet Terminology
Cyber Crimes
Hacking
Definition                                      Protection


       Hacking is unauthorized use of                 Make your passwords long and
                                                      complicated, and with a good mix of
       computer      and      network                 letters and numbers, as well as utilizing
       resources.                                     case-sensitive letters. Don't use anything
                                                      familiar, such as your birthday, your
       The activity of breaking into a                children's names or anything like that. If a
       computer    system     to   gain   an          hacker wants to attempt to break into your
       unauthorized access is known as                email accounts, at least make him work
       hacking. The act of defeating the              for it.
                                                      Don't ever allow your browser to
       security capabilities of a computer
                                                      remember your passwords. True, it may
       system in order to obtain an illegal
                                                      be a bit of an inconvenience to enter your
       access to the information stored on
                                                      password every time you log in.
       the computer system is called hacking.         Activate Firewall
Phishing
(fishing)
Disguising as a trustworthy source



                                 Phishing is the act of attempting to
                                 acquire sensitive information like
                                 usernames, passwords and credit card
                                 details by disguising as a trustworthy
                                 source. Phishing is carried out through
                                 emails or by luring the users to enter
                                 personal information through fake
                                 websites. Criminals often use websites
                                 that have a look and feel of some
                                 popular website, which makes the users
                                 feel safe to enter their details there.
Phishing
Phishing Protection

 • The most powerful weapon against phishing is common sense and
   the following rules that every user should oblige to.
 • If you are not a customer of the site delete the email immediatly.
   Don´t click on the link or reply.
 • If you are a customer and you are not sure if the email is legit do
   one of the following:
 • Contact the institute by phone or contact at the official website ( do
   not use the email link of course) and ask if the mail is official.
 • Instead of using the link provided open the website by typing in the
   official link there. The site should have news about the email on their
   starting page. (most of the time). If not, use 2a to verify the email.
Pharming
DNS Poisoning


                Pharming in Simple Steps:
                Hacker creates a fake website which appears
                similar to the original website.
                Hacker poisons the DNS servers thus domain
                names are resolved into fake IP address.
                User types the URL of the original website in
                the browser.
                The DNS server directs User to the fake
                website designed by hacker.
                User not knowing that it is a fake website,
                shares his confidential information such as
                login, password... etc.
                Hacker gets the user confidential information
                from his fake web site and uses it to access
                the original website.
                Hacker exploits user's confidential information
                to his liking.
Pharmin
                                        DNS
                                        g
                                         Poisoning


Pharming in Simple Steps:
Hacker creates a fake website which appears
similar to the original website.
Hacker poisons the DNS servers thus domain
names are resolved into fake IP address.
User types the URL of the original website in
the browser.
The DNS server directs User to the fake
website designed by hacker.
User not knowing that it is a fake website,
shares his confidential information such as
login, password... etc.
Hacker gets the user confidential information
from his fake web site and uses it to access
the original website.
Hacker exploits user's confidential information
to his liking.
Pharming
Protection from Pharming


1   Check the URL of       2   Use a trusted,      3   Check the
    any site that asks         legitimate              certificate. It
    you to provide             Internet Service        takes just a few
    personal
                               Provider.               seconds to tell if
    information. Make
    sure your session          Rigorous                a site you land
    begins at the              security at the         on is legitimate.
    known authentic            ISP level is your       Block suspicious
    address of the site,       first line of           Websites
    with no additional         defense against         automatically
    characters                 pharming.
    appended to it.
Internet Business Scams


   Dear Friend, as you read this, I don't want you to feel sorry for me, because, I
   believe everyone will die someday. My name is Mr Adada Muhammadu, a Crude
   Oil merchant in Nigeria and I have been diagnosed with Esophageal cancer. It
   has defied all forms of medical treatment, and right now I have only about a few
   months to live, according to medical experts. I want God to be merciful to me
   and accept my soul so, I have decided to give alms to charity organizations, as I
   want this to be one of the last good deeds I do on earth. So far, I have
   distributed money to some charity organizations in Austria, Cameroon, Liberia,
   Algeria and Malaysia. Now that my health has deteriorated badly, I cannot do it
   myself anymore. The last of my money which no one knows of is the huge cash
   deposit of Eighty million dollars $80,000,000 that I have with a finance/Security
   Company abroad. I will want you to help me collect this deposit and dispatched
   it to charity organizations. I have set aside 20% for you and for your time. God
   be with you. ~ Mr Adada Muhammadu"
Most Common Business Scams
                       First and foremost, let me make it clear. There is some
  Get Paid Programs    good news for all you get paid program enthusiasts. Not all
                       get paid programs are fake but 99%. They Cheat by
                       demanding a subscription fee or a membership fee



                         Once again, a majority of these programs are downright fake. Most of
                         them promise home based business opportunities and jobs involving
Work From Home Scams     typing, data entry, etc. However, all of them vanish from existence
                         once they've managed to lay their hands on the 'small' subscription
                         fee that you pay them.




                       It's not what it sounds like. The banks haven't started getting into
                       Internet crime (and thank God for that!). It's just that some cunning
    Bank Scams:
                       fraudsters create duplicate (read FAKE) websites which are complete
                       with the bank's logo, hyperlink, etc. Then they send fake emails on
                       behalf of the 'bank', asking you to visit the bank website (obviously
                       the fake one) and enter your account details as well as other
                       sensitive information.
THANK YOU!
inqilab@ruknuddin.com

Mais conteúdo relacionado

Mais procurados

Cyber Security By Preetish Panda
Cyber Security By Preetish PandaCyber Security By Preetish Panda
Cyber Security By Preetish PandaPreetish Panda
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidanceDavid Atkinson
 
Abc of hoax site investigation
Abc of hoax site investigationAbc of hoax site investigation
Abc of hoax site investigationFrankSobotka
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 
FNC Personal Protect Workshop
FNC Personal Protect WorkshopFNC Personal Protect Workshop
FNC Personal Protect Workshopforensicsnation
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gtemi
 
The internet is a dangerous place
The internet is a dangerous placeThe internet is a dangerous place
The internet is a dangerous placeemsisoft
 

Mais procurados (18)

Webspoofing
WebspoofingWebspoofing
Webspoofing
 
Cyber Security By Preetish Panda
Cyber Security By Preetish PandaCyber Security By Preetish Panda
Cyber Security By Preetish Panda
 
Web spoofing
Web spoofingWeb spoofing
Web spoofing
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidance
 
Abc of hoax site investigation
Abc of hoax site investigationAbc of hoax site investigation
Abc of hoax site investigation
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
FNC Personal Protect Workshop
FNC Personal Protect WorkshopFNC Personal Protect Workshop
FNC Personal Protect Workshop
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
The internet is a dangerous place
The internet is a dangerous placeThe internet is a dangerous place
The internet is a dangerous place
 

Destaque

Modern developments in the use of internet by inqilab patel
Modern developments in the use of internet  by inqilab patelModern developments in the use of internet  by inqilab patel
Modern developments in the use of internet by inqilab patelInqilab Patel
 
2.3 databases for O Level Computer
2.3 databases for O Level Computer2.3 databases for O Level Computer
2.3 databases for O Level ComputerInqilab Patel
 
Security and ethics ffor O Level by Inqilab Patel
Security and ethics ffor O Level by Inqilab PatelSecurity and ethics ffor O Level by Inqilab Patel
Security and ethics ffor O Level by Inqilab PatelInqilab Patel
 
IGCSE & O Level Computer Workbook for P2 by Inqilab Patel
IGCSE & O Level Computer Workbook for P2 by Inqilab PatelIGCSE & O Level Computer Workbook for P2 by Inqilab Patel
IGCSE & O Level Computer Workbook for P2 by Inqilab PatelInqilab Patel
 
Computer crime
Computer crimeComputer crime
Computer crimenurdiva123
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
L Scope
L ScopeL Scope
L ScopeCTIN
 
Chapter3presentation
Chapter3presentationChapter3presentation
Chapter3presentationHolly Dunagan
 
Internet principles of operation
Internet principles of operationInternet principles of operation
Internet principles of operationInqilab Patel
 
IGCSE & O Level Computer Workbook for P1 by Inqilab Patel
IGCSE & O Level Computer Workbook for P1 by Inqilab PatelIGCSE & O Level Computer Workbook for P1 by Inqilab Patel
IGCSE & O Level Computer Workbook for P1 by Inqilab PatelInqilab Patel
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
Computer Crime and Safety Measure
Computer Crime and Safety MeasureComputer Crime and Safety Measure
Computer Crime and Safety MeasurePurushottam Dahal
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime'sMar Soriano
 

Destaque (20)

Modern developments in the use of internet by inqilab patel
Modern developments in the use of internet  by inqilab patelModern developments in the use of internet  by inqilab patel
Modern developments in the use of internet by inqilab patel
 
2.3 databases for O Level Computer
2.3 databases for O Level Computer2.3 databases for O Level Computer
2.3 databases for O Level Computer
 
Security and ethics ffor O Level by Inqilab Patel
Security and ethics ffor O Level by Inqilab PatelSecurity and ethics ffor O Level by Inqilab Patel
Security and ethics ffor O Level by Inqilab Patel
 
IGCSE & O Level Computer Workbook for P2 by Inqilab Patel
IGCSE & O Level Computer Workbook for P2 by Inqilab PatelIGCSE & O Level Computer Workbook for P2 by Inqilab Patel
IGCSE & O Level Computer Workbook for P2 by Inqilab Patel
 
Lecture set 3
Lecture set 3Lecture set 3
Lecture set 3
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Presentation1
Presentation1Presentation1
Presentation1
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Computer crime (1)
Computer crime (1)Computer crime (1)
Computer crime (1)
 
L Scope
L ScopeL Scope
L Scope
 
Chapter3presentation
Chapter3presentationChapter3presentation
Chapter3presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Internet principles of operation
Internet principles of operationInternet principles of operation
Internet principles of operation
 
Computer crime
Computer crimeComputer crime
Computer crime
 
IGCSE & O Level Computer Workbook for P1 by Inqilab Patel
IGCSE & O Level Computer Workbook for P1 by Inqilab PatelIGCSE & O Level Computer Workbook for P1 by Inqilab Patel
IGCSE & O Level Computer Workbook for P1 by Inqilab Patel
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Computer Crime and Safety Measure
Computer Crime and Safety MeasureComputer Crime and Safety Measure
Computer Crime and Safety Measure
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 

Semelhante a Computer crime by inqilab patel

CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
GE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxGE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxMarlynLiagao
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)Dhrumit Patel
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Naga Rohit
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfanjandavid
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHINGsanthuana sg
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 

Semelhante a Computer crime by inqilab patel (20)

Security Primer
Security PrimerSecurity Primer
Security Primer
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
GE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxGE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptx
 
Phishing
PhishingPhishing
Phishing
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
 
Phishing
PhishingPhishing
Phishing
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Phis
PhisPhis
Phis
 
Phishing
PhishingPhishing
Phishing
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 

Mais de Inqilab Patel

2 problem solving and programming workbook by inqilab patel
2 problem solving and programming workbook by inqilab patel2 problem solving and programming workbook by inqilab patel
2 problem solving and programming workbook by inqilab patelInqilab Patel
 
Pseudo code Errors & Imrovements by Inqilab Patel
Pseudo code Errors & Imrovements by Inqilab PatelPseudo code Errors & Imrovements by Inqilab Patel
Pseudo code Errors & Imrovements by Inqilab PatelInqilab Patel
 
Hamara Karachi: an informative presentation
Hamara Karachi: an informative presentationHamara Karachi: an informative presentation
Hamara Karachi: an informative presentationInqilab Patel
 
Manufacturing accounts by inqilab patel
Manufacturing accounts by inqilab patelManufacturing accounts by inqilab patel
Manufacturing accounts by inqilab patelInqilab Patel
 

Mais de Inqilab Patel (6)

2 problem solving and programming workbook by inqilab patel
2 problem solving and programming workbook by inqilab patel2 problem solving and programming workbook by inqilab patel
2 problem solving and programming workbook by inqilab patel
 
Pseudo code Errors & Imrovements by Inqilab Patel
Pseudo code Errors & Imrovements by Inqilab PatelPseudo code Errors & Imrovements by Inqilab Patel
Pseudo code Errors & Imrovements by Inqilab Patel
 
133 input devices
133 input devices133 input devices
133 input devices
 
Hamara Karachi: an informative presentation
Hamara Karachi: an informative presentationHamara Karachi: an informative presentation
Hamara Karachi: an informative presentation
 
Manufacturing accounts by inqilab patel
Manufacturing accounts by inqilab patelManufacturing accounts by inqilab patel
Manufacturing accounts by inqilab patel
 
Nishan e-haider
Nishan e-haiderNishan e-haider
Nishan e-haider
 

Último

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Último (20)

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 

Computer crime by inqilab patel

  • 1. Computer Crime By Inqilab Ruknuddin Patel (MCS) KN Academy Malir
  • 2. Cyber Crime "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)“
  • 5. Hacking Definition Protection Hacking is unauthorized use of Make your passwords long and complicated, and with a good mix of computer and network letters and numbers, as well as utilizing resources. case-sensitive letters. Don't use anything familiar, such as your birthday, your The activity of breaking into a children's names or anything like that. If a computer system to gain an hacker wants to attempt to break into your unauthorized access is known as email accounts, at least make him work hacking. The act of defeating the for it. Don't ever allow your browser to security capabilities of a computer remember your passwords. True, it may system in order to obtain an illegal be a bit of an inconvenience to enter your access to the information stored on password every time you log in. the computer system is called hacking. Activate Firewall
  • 6. Phishing (fishing) Disguising as a trustworthy source Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source. Phishing is carried out through emails or by luring the users to enter personal information through fake websites. Criminals often use websites that have a look and feel of some popular website, which makes the users feel safe to enter their details there.
  • 7.
  • 8. Phishing Phishing Protection • The most powerful weapon against phishing is common sense and the following rules that every user should oblige to. • If you are not a customer of the site delete the email immediatly. Don´t click on the link or reply. • If you are a customer and you are not sure if the email is legit do one of the following: • Contact the institute by phone or contact at the official website ( do not use the email link of course) and ask if the mail is official. • Instead of using the link provided open the website by typing in the official link there. The site should have news about the email on their starting page. (most of the time). If not, use 2a to verify the email.
  • 9. Pharming DNS Poisoning Pharming in Simple Steps: Hacker creates a fake website which appears similar to the original website. Hacker poisons the DNS servers thus domain names are resolved into fake IP address. User types the URL of the original website in the browser. The DNS server directs User to the fake website designed by hacker. User not knowing that it is a fake website, shares his confidential information such as login, password... etc. Hacker gets the user confidential information from his fake web site and uses it to access the original website. Hacker exploits user's confidential information to his liking.
  • 10. Pharmin DNS g Poisoning Pharming in Simple Steps: Hacker creates a fake website which appears similar to the original website. Hacker poisons the DNS servers thus domain names are resolved into fake IP address. User types the URL of the original website in the browser. The DNS server directs User to the fake website designed by hacker. User not knowing that it is a fake website, shares his confidential information such as login, password... etc. Hacker gets the user confidential information from his fake web site and uses it to access the original website. Hacker exploits user's confidential information to his liking.
  • 11. Pharming Protection from Pharming 1 Check the URL of 2 Use a trusted, 3 Check the any site that asks legitimate certificate. It you to provide Internet Service takes just a few personal Provider. seconds to tell if information. Make sure your session Rigorous a site you land begins at the security at the on is legitimate. known authentic ISP level is your Block suspicious address of the site, first line of Websites with no additional defense against automatically characters pharming. appended to it.
  • 12. Internet Business Scams Dear Friend, as you read this, I don't want you to feel sorry for me, because, I believe everyone will die someday. My name is Mr Adada Muhammadu, a Crude Oil merchant in Nigeria and I have been diagnosed with Esophageal cancer. It has defied all forms of medical treatment, and right now I have only about a few months to live, according to medical experts. I want God to be merciful to me and accept my soul so, I have decided to give alms to charity organizations, as I want this to be one of the last good deeds I do on earth. So far, I have distributed money to some charity organizations in Austria, Cameroon, Liberia, Algeria and Malaysia. Now that my health has deteriorated badly, I cannot do it myself anymore. The last of my money which no one knows of is the huge cash deposit of Eighty million dollars $80,000,000 that I have with a finance/Security Company abroad. I will want you to help me collect this deposit and dispatched it to charity organizations. I have set aside 20% for you and for your time. God be with you. ~ Mr Adada Muhammadu"
  • 13. Most Common Business Scams First and foremost, let me make it clear. There is some Get Paid Programs good news for all you get paid program enthusiasts. Not all get paid programs are fake but 99%. They Cheat by demanding a subscription fee or a membership fee Once again, a majority of these programs are downright fake. Most of them promise home based business opportunities and jobs involving Work From Home Scams typing, data entry, etc. However, all of them vanish from existence once they've managed to lay their hands on the 'small' subscription fee that you pay them. It's not what it sounds like. The banks haven't started getting into Internet crime (and thank God for that!). It's just that some cunning Bank Scams: fraudsters create duplicate (read FAKE) websites which are complete with the bank's logo, hyperlink, etc. Then they send fake emails on behalf of the 'bank', asking you to visit the bank website (obviously the fake one) and enter your account details as well as other sensitive information.