Cyber crime

29
CYBERCRIME COMPILED BY : 1.) AJEETH.M.RAMANAN 2.) BHAVNA BANSAL 3.)GURPINDER KAUR GILL 4.) CHETAN SHANDILYA SUBMITTED TO MS.ANKITA DEVNATH ASSISTANT PROFESSOR

Transcript of Cyber crime

Page 1: Cyber crime

CYBERCRIME

COMPILED BY:

1.) AJEETH.M.RAMANAN

2.) BHAVNA BANSAL

3.)GURPINDER KAUR GILL

4.) CHETAN SHANDILYA

SUBMITTED TO

MS.ANKITA DEVNATHASSISTANT PROFESSOR

Page 2: Cyber crime

CYBER CRIME !!The expression ‘Crime’ is defined as an act, which subjects the doer to legal punishment or any offence against morality, social order or any unjust or shameful act. The “Offence" is defined in the Code of Criminal Procedure to mean as an act or omission made punishable by any law for the time being in force. Cyber Crime is emerging as a serious threat. World wide governments, police departments and intelligence units have started to react.

Page 3: Cyber crime

WHAT IS CYBERCRIME?“Cybercrime is criminal activity done using computers and the Internet.”

-Wikipedia

 “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”(12) 

-Indian Penal Code

One way of viewing cybercrimes is that they may be digital versions of traditional, real world offenses. They could be considered traditional, or “real world” crimes if not for the incorporated element of virtual or cyberspace

-US Congressional View

Page 4: Cyber crime

TYPES OF CYBERCRIME

Page 5: Cyber crime
Page 6: Cyber crime

HACKINGI. Practice of modifying computer

hardware and software to accomplish a goal outside of the creator’s original purpose.

II. Modification of code intended by the original programmer.

III. Identity Theft

Page 7: Cyber crime
Page 8: Cyber crime

Phishing is a fraudulent attempt, usually made through email, to steal personal information.

In order for Internet criminals to successfully “phish” a personal information, they must go from an email to a website.

Page 9: Cyber crime

EXAMPLE OF PHISHING

Page 10: Cyber crime
Page 11: Cyber crime

It is the use of the Internet or other electronic means to stalk someone.

This term is used interchangeably with online harassment and online abuse.

Page 12: Cyber crime
Page 13: Cyber crime

SOFTWARE PIRACY

Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original

Page 14: Cyber crime
Page 15: Cyber crime

SOFTWARE PIRACY

Software Piracy is done by:

I. End user copyingII. Hard disk loading III.CounterfeitingIV.Illegal downloads from the

internet etc

Page 16: Cyber crime

COMPUTER VIRUS

A. A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.

B. The original may modify the copies or the copies may modify themselves.

C. It can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer.

Page 17: Cyber crime

WAYS TO PREVENT CYBER CRIME

Page 18: Cyber crime

ANTIVIRUS AND ANTI-SPYWARE

PROGRAMSAntivirus software consists of computer programs that attempt to identify and eliminate computer viruses and other malicious software. Anti spy wares are used to restrict backdoor program, Trojans and other spy wares to be installed on the computer.

Page 19: Cyber crime
Page 20: Cyber crime

FIREWALLS A firewall protects a computer network from unauthorized access.

A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted

Page 21: Cyber crime
Page 22: Cyber crime

CYBER LAWSCyber laws are being formulated to stop cyber crimes.

Internet Service Providers should also provide high level of security at their servers in order to keep their clients secure from all types of viruses and malicious programs.

Page 23: Cyber crime

If a computer virus or an invading hacker deletes our files, or either one corrupts our files, the easiest way to restore our computer may be to reformat the hard drive(s) and then copy files from a recent backup.

Backups also offer protection from more common (and less exotic) threats such as accidental deletion of a file by an authorized user or failure of a hard disk drive.

Page 24: Cyber crime

ENCRYPTION

Page 25: Cyber crime

ENCRYPTIONThe most popular form of security which people rely on is ENCRYPTION , the process of encoding information in such a way that only the person (or computer) with the key candecode it.

Page 26: Cyber crime

AWARENESSAlways keep a check that you do secure browsing

For example:

While browsing on some website, if “https” is written in address bar instead of “http” that website provides secure browsing.

Page 27: Cyber crime
Page 28: Cyber crime

AWARENESS

Awareness should be very important. We should treat very cautiously when we use the public domain such as internet. We should keep a check on how much we share on the new to keep our self safe.

We should not fall for phishing schemes.

Its always good to remember the old saying --

“If its too good to be true, it probably is”

Page 29: Cyber crime

THANK YOU!!