Cyber crime final
-
Upload
zeeshan-ahmed -
Category
Social Media
-
view
60 -
download
0
Transcript of Cyber crime final
![Page 1: Cyber crime final](https://reader034.fdocuments.us/reader034/viewer/2022042723/587c119c1a28ab03768b6a83/html5/thumbnails/1.jpg)
Cyber Crime
![Page 2: Cyber crime final](https://reader034.fdocuments.us/reader034/viewer/2022042723/587c119c1a28ab03768b6a83/html5/thumbnails/2.jpg)
“What is Crime”Harmful act against the public which the
State wishes to prevent, and is punishable by fine, imprisonment, and/or death.
Examples
![Page 3: Cyber crime final](https://reader034.fdocuments.us/reader034/viewer/2022042723/587c119c1a28ab03768b6a83/html5/thumbnails/3.jpg)
Computer Crime or Cyber Crime
Crime that involves a Computer and a Network.
![Page 4: Cyber crime final](https://reader034.fdocuments.us/reader034/viewer/2022042723/587c119c1a28ab03768b6a83/html5/thumbnails/4.jpg)
Purposes of Cyber CrimeStealing a person’s identityMaking MoneyHarassing SomeoneGetting Secret Records or PasswordsAssessing someone personal Data
![Page 5: Cyber crime final](https://reader034.fdocuments.us/reader034/viewer/2022042723/587c119c1a28ab03768b6a83/html5/thumbnails/5.jpg)
Categories of Cyber CrimeComputer as a Weapon; using a Computer to
commit real World Crime.Computer as a Target; using a Computer to
attack on other Computer
![Page 6: Cyber crime final](https://reader034.fdocuments.us/reader034/viewer/2022042723/587c119c1a28ab03768b6a83/html5/thumbnails/6.jpg)
Classification of Cyber Crime Against Person
i. Hackingii. Harassment
Against Propertyi. Intellectual property crimesii. Hacking Computer System
Against Governmenti. Cyber Terrorismii. Information
![Page 7: Cyber crime final](https://reader034.fdocuments.us/reader034/viewer/2022042723/587c119c1a28ab03768b6a83/html5/thumbnails/7.jpg)
Types of Cyber CrimesHackingComputer VandalismCyber TerrorismSoftware Privacy
![Page 8: Cyber crime final](https://reader034.fdocuments.us/reader034/viewer/2022042723/587c119c1a28ab03768b6a83/html5/thumbnails/8.jpg)
Hacking Crime wherein a person’s computer is broken into so
that his personal or sensitive information can be accessed
Also known as Cracking.Government websites are the hot targets of hackers.
![Page 9: Cyber crime final](https://reader034.fdocuments.us/reader034/viewer/2022042723/587c119c1a28ab03768b6a83/html5/thumbnails/9.jpg)
Computer Vandalism
Damaging or destroying the data rather than stealing or misusing
Transmitting Viruses; These are the programs that attach themselves to a file and then circulate from one computer to other.
![Page 10: Cyber crime final](https://reader034.fdocuments.us/reader034/viewer/2022042723/587c119c1a28ab03768b6a83/html5/thumbnails/10.jpg)
Cyber TerrorismThe politically motivated use of computers
and information technology to cause severe disruption or widespread fear.
Using Computer and Network to spread fear in among civilians.
![Page 11: Cyber crime final](https://reader034.fdocuments.us/reader034/viewer/2022042723/587c119c1a28ab03768b6a83/html5/thumbnails/11.jpg)
Software Privacy Illegal copying, distribution, or use
of softwareAccording to the Business Software Alliance
(BSA), about 36% of all software in current use is stolen.
Built to protect the privacy of its users
![Page 12: Cyber crime final](https://reader034.fdocuments.us/reader034/viewer/2022042723/587c119c1a28ab03768b6a83/html5/thumbnails/12.jpg)
Safety Tips
![Page 13: Cyber crime final](https://reader034.fdocuments.us/reader034/viewer/2022042723/587c119c1a28ab03768b6a83/html5/thumbnails/13.jpg)
Safety Tips To CybercrimeUse Antivirus Software’sUninstall Unnecessary SoftwareMaintain backup Check security settingsNever give your full name or address to
strangers.
![Page 14: Cyber crime final](https://reader034.fdocuments.us/reader034/viewer/2022042723/587c119c1a28ab03768b6a83/html5/thumbnails/14.jpg)
Security
![Page 15: Cyber crime final](https://reader034.fdocuments.us/reader034/viewer/2022042723/587c119c1a28ab03768b6a83/html5/thumbnails/15.jpg)
Advantages of Cyber Security
This Security will defend us from critical attacks
Helps us to browse the safe websiteSecure all the incoming and outgoing data on
our computer
![Page 16: Cyber crime final](https://reader034.fdocuments.us/reader034/viewer/2022042723/587c119c1a28ab03768b6a83/html5/thumbnails/16.jpg)
THANKS FOR WATCHING