Cyber crime faizan project
-
Upload
syed-bokhari -
Category
Education
-
view
262 -
download
0
Transcript of Cyber crime faizan project
![Page 1: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/1.jpg)
PRESENTED BYPresented byFaizan Ahmad09-arid-1380M.Sc. Sociology 3rd
![Page 2: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/2.jpg)
CRIMINAL ACTIVITY INVOLVINGINFORMATION TECHNOLOGY INFRASTRUCTURE ILLEGAL ACCESS DATA INTERFERENCE MISUSE OF DEVICESFORGERY AND ELECTRONIC FRAUD.
![Page 3: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/3.jpg)
![Page 4: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/4.jpg)
• Children and adolescents between the age group of 6 – 18 years
• Organised hackers• Professional hackers / crackers • Discontented employees
![Page 5: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/5.jpg)
• Unauthorized access to computer systems or networks / Hacking
• Theft of information contained in electronic form• Email bombing• Data diddling• Salami attacks• Denial of Service attack• Virus / worm attacks• Logic bombs• Trojan attacks• Internet time thefts• Web jacking
![Page 6: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/6.jpg)
CLASSIFICATION
Against Individuals
Against Individual Property
Against Organization
Against Society at large
![Page 7: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/7.jpg)
Harassment via e-mails.
Cyber-stalking.
Dissemination of obscene material.
Defamation. Unauthorized control/access over computer system.
Indecent exposure
Email spoofing
Cheating & Fraud
![Page 8: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/8.jpg)
• Computer vandalism.• Transmitting virus.• Unauthorized control/access over computer system.• Intellectual Property crimes• Internet time thefts
![Page 9: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/9.jpg)
![Page 10: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/10.jpg)
Unauthorized control/access
over computer system
Possession of unauthorized information.
Cyber terrorism against the
government organization.
Distribution of pirated software etc.
![Page 11: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/11.jpg)
Pornography (basically child pornography). Polluting the youth through indecent exposure. Trafficking Financial crimes Sale of illegal articles Online gambling Forgery
![Page 12: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/12.jpg)
![Page 13: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/13.jpg)
![Page 14: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/14.jpg)
![Page 15: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/15.jpg)
• The hurry in which the legislation was passed, without sufficient public debate, did not really serve the desired purpose
• Cyber laws, in their very preamble and aim, state that they are targeted at aiding e-commerce, and are not meant to regulate cybercrime
• Cyber torts• Cyber crime in the Act is neither comprehensive nor exhaustive• Ambiguity in the definitions• Uniform law• Lack of awareness• Jurisdiction issues• Extra territorial application• Raising a cyber army• Hesitation to report offences
![Page 16: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/16.jpg)
HOW TO DEAL WITH THIS PROBLEM
International Agreements and Cooperation –Essential due to the Worldwide Nature of the Internet
Software and Hardware defenses (e.g., antispam, antivirus software, firewalls)Other practical steps….
![Page 17: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/17.jpg)
Avoid disclosing any information pertaining to oneself.
Avoid sending any photograph online particularly to strangers.
Use latest and up date anti virus software.Keep back up volumes.Never send your credit card number to any site
that is not secured.Use of firewalls may be beneficial.
![Page 18: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/18.jpg)
CONCLUSIONCONCLUSION
• The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime.
![Page 19: Cyber crime faizan project](https://reader033.fdocuments.us/reader033/viewer/2022052508/5598a7761a28ab94638b4785/html5/thumbnails/19.jpg)