cyber crime

25

description

:)

Transcript of cyber crime

Page 1: cyber crime
Page 2: cyber crime

Introduction of Cyber crimeVictims of these crimesTypes of cyber crimeGeneral preventation

Computer VirusesTypes of viruses

Page 3: cyber crime
Page 4: cyber crime
Page 5: cyber crime

HACKINGVIRUS SOFTWARE PrivACYIRC CrimePHISHINGCYBER STALKINGSALAMI ATTACKE mail bombing

Page 6: cyber crime

HACKING

Page 7: cyber crime
Page 8: cyber crime

A white hat hacker breaks security for helping .They are working for a security company which makes security software.

A "black hat" hacker is a hacker who "violates computer security for personal gain" destroy data

A grey hat hacker is a combination of a black hat and a white hat hacker.They first tell the victims' and then they hack

Page 9: cyber crime

*Elite hackerA social status among hackers, the most skilled and

Famous hackers.

*Script kiddies'A script kiddies  is a non-expert whobreaks into computer systems by using pre-packaged automated tools written by others, they have little knowledge.

A "n00b is someone who is new to hacking and has almost no knowledge or experience of the workings of technology and hacking

Page 10: cyber crime

For profit, protest, or challenge.

A large fraction of hacker attacks have been pranks

Financial Gain Revenge Venting anger at a company

or organization Terrorism

*For profit, protest, or challenge.

*Financial Gain *Revenge *Terrorism *just for fun

Page 11: cyber crime
Page 12: cyber crime

SOFTWARE PIRACY

SOFTWARE PRivACY

Page 13: cyber crime
Page 14: cyber crime

IRC CRIME

*Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other .

*Criminals use it for meeting

*Hackers use it for discussing  sharing the techniques

*Cyber Stalking – to tease women and girls by send Different Messages .

Page 15: cyber crime

*In such crime criminal makes very small changes in such a manner that no one can notice that.

Criminal or programer• makes such program• that deducts small •amount like Rs. 2.50• per month from the •account of all the •customer of the Bank.

SALAMI  ATTACK

Page 16: cyber crime

E-Mail Bombing:

Email bombing refers to sending a large amount of e-mails to the victim resulting in interruption in the victims’ e-mail account or mail servers

VirusVirus

Page 17: cyber crime
Page 18: cyber crime

DIFFERENT TYPES OF COMPUTER VIRUS

•Resident Viruses•Direct Action Viruses •Overwrite Viruses•Boot Virus•Macro Virus•Directory Virus•Polymorphic Virus•File Infectors•FAT Virus•Trojans or Trojan Horses

Page 19: cyber crime
Page 20: cyber crime

•Financial crimes•Cyber stalking*Sale of illegal articles*Online gambling*Unauthorized access to computerTheft of information contained in electronic form• Virus/worm attacks• Trojan attacks• Internet time theft• Password cracking

Page 21: cyber crime

General Preventions

>Spam blocker

*Turn on your spam blocker. Most Internet providers provide a spam blocking feature to prevent unwanted messages/ emails.

>Firewall protection*Use your computer's firewall protection feature, which is a digitally created barrier that prevents hackers from getting into your computer system. Always keep it turned on

Page 22: cyber crime

Anti-virus softwareInstall anti-virus software for your computer. You also need to regularly update your anti-virus software and that you do a once-a-week scan to locate and eliminate any spyware, viruses and other problems.Caution in providing personal informationThink before & Don’t provide ur personal information via a website you know nothing about, especially those that ask for your name, mailing address, bank account number or social security number.

Page 23: cyber crime

Secure shopping

Make sure that you do online shopping on a secure website, like those with a url that starts with "https“.. If you don't see these anywhere on the site, you run the risk of submitting credit card information and other personal information to a site that may be a fraud.

Page 24: cyber crime

Monitoring activities

Monitor the online activities of your children brothers small sisters. They should only have access to a computer located in a central area of your home and you should regularly check all browser and email activity

Page 25: cyber crime