Post on 24-May-2015
description
CYBER CRIMES
• Prepared By : P.RISHITH
13BCE0297
M.Sai Siddharth
13BCE0681
Introduction
• The usage of internet is growing rapidly.
• It has given new oppurtunities in every field we can think of- be it entertainment,business,sports or education.
• Internet has its own advantages and disadvantages
• One of the major disadvantage is Cyber Crime
What is Cyber Crime?
•Use of Computer/Internet to something that would be a crime in any case.
• It is an unlawful act where the computer is either a tool or a target or both
• Acts that are punishable by Information Technology Act.
History
• In the early decades of modern information technology (IT), computer crimes were largely committed by individual disgruntled and dishonest employees.
• Physical damage to computer systems was a prominent threat until the 1980s.
• Programmers in the 1980s began writing malicious software, including self-replicating programs, to interfere with personal computers.
• As the Internet increased access to increasing numbers of systems worldwide, criminals used unauthorized access to poorly protected systems for vandalism, political action and financial gain.
Categories of Cyber crime:
• Three categories-
• 1.Cyber crime against persons
• 2.Cyber crime against property
• 3.Cyber crime against government
First categorie:
• Includes various harassements such as
Sexual
Racial
Religious
Nationality etc
Any content that may be found derogatory or offensive is considered harassment.
Second category
• These crimes include :
-Computer vandalism(destruction of others property)
-Transmission of harmful programs
-Unauthorised trespassing
-Unauthorised possession of computer information
Third Category
• Cyber terrorism is one distinct kind of crime in this category.
• Cyber space is being used by individuals and groups to threaten the organizations and international governments.
-Also to terrorize the citizens of a country.
Various Cyber Crimes :
• Unauthorised access to computer system or networks
• Theft of information contained in electronic form
• Data didling(manipulation of data)
• Hacking through various programmes
• Virus/worm attacks
• Trojan attacks
• Key loggers
• Malware(malicious code)
• Internet time thefts(gaining access to other internet without his knowledge.
• Web jacking(forcefully taking control of the website)
• Theft of computer system
• Physically damaging a computer system
Hacking
• It has been noted that hackers have hacked millions of computers across the globe and the number is increasing with every passing day.
• Some hackings are done just for fun others are done for stealing information yet others are done for personal reasons such as taking revenge from someone and so on.
• Stealing someone's personal data for own use, breaking through into a company's account and making changes in their database
Cyber Criminals
• Australian nationwide survey conducted in 2006 found that two in three convicted cyber-criminals were between the ages of 15 and 26
• Organised hackers
• Professional Hackers
• Discontended Employees
Prevention
• Set a good firewall
• Disable and log off a specific user account to prevent access
• Disable specific applications for example , an e-mail system subjected to a Spam attack
• Install intrusion prevention system
• Using various Anti virus , internet security , anti malware software’s
Thank you
Source:
• Britannica.com
• technocache.wordpress.com
• cybercrimeindia.org
• wikipedia