Cyber Crime and Security

Topics: Computer, Computer security, Malware Pages: 5 (1407 words) Published: April 29, 2013
Slide 2: 
What is Cybercrime? Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs Cybercrime is nothing but where the computer used as an object or subject of crime Online activities are just as vulnerable to crime and can compromise personal safety just as effectively as common everyday crimes. Lawmakers, law enforcement, and individuals need to know how to protect themselves and the persons for which they are responsible.

Slide 3: 
HISTORY OF CYBER CRIME HISTORY OF CYBER CRIME: The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage . The first spam email took place in 1978 when it was sent out over the Arpanet (Advanced Research Projects Agency Network),. The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk cloner .

Slide 4: 
categorize of Cybercrime We can categorize Cyber crimes in two ways : The Computer as a Target :- using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc The computer as a weapon :- using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.Cyber Crime regulated by Cyber Laws or Internet Laws.

Slide 6: 
Types of Cybercrime 1.HACKING : Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motive Behind The Crime called HACKING : Motive Behind The Crime called HACKING Greed Power Publicity Revenge Adventure Desire to access forbidden information Destructive mindset Wants to sell n/w security services.

Slide 7: 
Types of Cybercrime 2.CHILD PORNOGRAPHY: The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. . As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles. How do they Operate : How do they Operate Pedophiles use false identity to trap the children/teenagers Pedophiles contact children/teens in various chat rooms which are used by children/teen to interact with other children/teen Befriend the child/teen. Extract personal information from the child/teen by winning his confidence.

Slide 8: 
Types of Cybercrime Gets the e-mail address of the child/teen and starts making contacts on the victimizes e-mail address as well. Starts sending pornographic images/text to the victim including child pornographic images in order to help child/teen shed his inhibitions so that a feeling is created in the mind of the victim that what is being fed to him is normal and that everybody does it. Extract personal information from child/teen At the end of it, the pedophile set up a meeting with the child/teen out of the house and then drag him into the net to further sexually assault him or to use him as a sex object.

Slide 9: 
Types of Cybercrime 3.DENIAL OF SERVICE ATTACK : This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide . Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCp/IP protocols. 4.VIRUS DISSEMINITION : Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc)

Slide 10: 
Types of Cybercrime 5.COMPUTER VANDALISM: Damaging or destroying data rather than stealing or misusing them is called cyber...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Cyber Crime and Security Essay
  • Cyber Crime and Security Essay
  • Essay on cyber crime
  • cyber crime and security Essay
  • Cyber Crime Essay
  • Essay about Cyber Crimes
  • Cyber Crime Essay

Become a StudyMode Member

Sign Up - It's Free