Cyber crime

Post on 14-May-2015

616 views 0 download

Tags:

Transcript of Cyber crime

CYBERCRIME

COMPILED BY:

1.) AJEETH.M.RAMANAN

2.) BHAVNA BANSAL

3.)GURPINDER KAUR GILL

4.) CHETAN SHANDILYA

SUBMITTED TO

MS.ANKITA DEVNATHASSISTANT PROFESSOR

CYBER CRIME !!The expression ‘Crime’ is defined as an act, which subjects the doer to legal punishment or any offence against morality, social order or any unjust or shameful act. The “Offence" is defined in the Code of Criminal Procedure to mean as an act or omission made punishable by any law for the time being in force. Cyber Crime is emerging as a serious threat. World wide governments, police departments and intelligence units have started to react.

WHAT IS CYBERCRIME?“Cybercrime is criminal activity done using computers and the Internet.”

-Wikipedia

 “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”(12) 

-Indian Penal Code

One way of viewing cybercrimes is that they may be digital versions of traditional, real world offenses. They could be considered traditional, or “real world” crimes if not for the incorporated element of virtual or cyberspace

-US Congressional View

TYPES OF CYBERCRIME

HACKINGI. Practice of modifying computer

hardware and software to accomplish a goal outside of the creator’s original purpose.

II. Modification of code intended by the original programmer.

III. Identity Theft

Phishing is a fraudulent attempt, usually made through email, to steal personal information.

In order for Internet criminals to successfully “phish” a personal information, they must go from an email to a website.

EXAMPLE OF PHISHING

It is the use of the Internet or other electronic means to stalk someone.

This term is used interchangeably with online harassment and online abuse.

SOFTWARE PIRACY

Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original

SOFTWARE PIRACY

Software Piracy is done by:

I. End user copyingII. Hard disk loading III.CounterfeitingIV.Illegal downloads from the

internet etc

COMPUTER VIRUS

A. A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.

B. The original may modify the copies or the copies may modify themselves.

C. It can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer.

WAYS TO PREVENT CYBER CRIME

ANTIVIRUS AND ANTI-SPYWARE

PROGRAMSAntivirus software consists of computer programs that attempt to identify and eliminate computer viruses and other malicious software. Anti spy wares are used to restrict backdoor program, Trojans and other spy wares to be installed on the computer.

FIREWALLS A firewall protects a computer network from unauthorized access.

A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted

CYBER LAWSCyber laws are being formulated to stop cyber crimes.

Internet Service Providers should also provide high level of security at their servers in order to keep their clients secure from all types of viruses and malicious programs.

If a computer virus or an invading hacker deletes our files, or either one corrupts our files, the easiest way to restore our computer may be to reformat the hard drive(s) and then copy files from a recent backup.

Backups also offer protection from more common (and less exotic) threats such as accidental deletion of a file by an authorized user or failure of a hard disk drive.

ENCRYPTION

ENCRYPTIONThe most popular form of security which people rely on is ENCRYPTION , the process of encoding information in such a way that only the person (or computer) with the key candecode it.

AWARENESSAlways keep a check that you do secure browsing

For example:

While browsing on some website, if “https” is written in address bar instead of “http” that website provides secure browsing.

AWARENESS

Awareness should be very important. We should treat very cautiously when we use the public domain such as internet. We should keep a check on how much we share on the new to keep our self safe.

We should not fall for phishing schemes.

Its always good to remember the old saying --

“If its too good to be true, it probably is”

THANK YOU!!