16
Presentation on Cyber C By: Ratnesh Sharma {MCA 5 th Semeste

Cybercrime

Embed Size (px)

DESCRIPTION

ppt on cyber crime in world.

Citation preview

  • 1. Presentation on Cyber CrimeBy: Ratnesh Sharma {MCA 5th Semester}

2. INTRODUCTION. HISTORY OF CYBER CRIME. CATEGORIES OF CYBER CRIME. WORLDS TOP 10 CYBER CRIMES. TYEPS OF CYBER CRIME. CYBER SECURITY. SAFETY TIPS TO CYBER CRIME. CONCLUSION. 3. Cyber crime is an activity done usingcomputers and internet. We can say that it is anunlawful acts wherein the computer either atool or target or both. It Harms the reputation of the victim or causephysical or mental harm to the victim directly orindirectly , Its don using modern telecommunicationnetworks such as Internet (Chat rooms,emails, notice boards and groups) andmobile phones (SMS/MMS) 4. The first recorded cyber crime took place in 1820. The first spam email took place in 1976 when it wassent out over the ARPANT(Advanced ResearchProjects Agency Network ). The first virus was installed on an Apple computer in1982 when a high school student, Rich skrenta,developed the EIK Cloner. 5. We can categorize cyber crime in two ways. The computer as a target :-using a computer to attacks other computer, e.g.Hacking, virus/worms attacks, Dos attack etc. The computer as a weapon :-using a computer to commit real world crime e.g.cyber terrorism, credit card fraud and pornography etc. 6. World top 10 cyber crimes. 7. TYPES OF CYBER CRIME 8. HACKING :- Hacking in simple terms means an illegal access ofinformation from a computer system or network . It is also known as CRACKING. Government websites are the hot target of the hackers due tothe press coverage, it receives. Hackers enjoy the mediacoverage.Motive behind the crime called HACKERSMotive behind the crime called hacking greed power, publicity,revenge etc. 9. Theft :This crime occurs when a person violates copyrights anddownloads music, movies, games and software.Identity Theft:In this cyber crime, a criminal accesses data about a personsbank account, credit cards, Social Security, debit card .etc 10. VIRUS attack : Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE , WEB JACKING, E-MAIL BOMBING etc.Computer Vandalism: Damaging or destroying data rather than stealing or misusingthem is called cyber vandalism. These are program that attach themselves to a file and thencirculate. 11. Cyber terrorism: Terrorist attacks on the Internet is by distributed denial of serviceattacks, hate websites and hate E-mails , attacks on servicenetwork etc. Software piracy: Stilling of software through the illegal copying of genuineprograms. For exp: patch programs ,crack keys. Etc. 12. Cyber Security :Cyber Security involves protection of sensitive personaland business information through prevention, detection andresponse to different online attacks.Privacy Policy :Before submitting your name , e-mail , address, on a websitelook for the sites privacy policy.Keep Software Up to Date:. Use good password which will be difficult for thieves toguess. Do not choose option that allows your computer toremember your passwords. 13. Use antivirus Software Insert Firewalls Uninstall unnecessary software Maintain backup Check security settings 14. As we see that cyber crimes grows at high rate in the world so wehave to strictly control the ability of unauthorized access of informationon the wed . In fact , it is highly likely that cyber crime and its hackers will continuedeveloping and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security.