cyber crime

13
An Introduction to CYBER CRIME By: ZEESHAN ALAM KHAN (MCA AMU)

Upload: zeeshan-khan

Post on 02-Jun-2015

70 views

Category:

Internet


0 download

DESCRIPTION

Its the presentation about the basic idea of Cyber Crime

TRANSCRIPT

Page 1: Cyber crime

An Introduction to CYBER CRIME

By: ZEESHAN ALAM KHAN

(MCA AMU)

Page 2: Cyber crime

Categories of Cybercrime

Distinguishing Cybercrimes from Cyber related Crimes

Table of contents

Page 3: Cyber crime

Categories of Cybercrime

Page 4: Cyber crime

Using cyber-technology in unauthorized ways to reproduce copies of proprietary software and proprietary information or distribute proprietary information across a computer network.

Using cyber-technology to gain unauthorized access to an individual's or an organization's computer system or a password-protected Web site.

Cyber Piracy

Cyber Trespass

Page 5: Cyber crime

Using cyber-technology to unleash one or more programs that disrupt the transmission of electronic information across one or more computer networks, including the Internet or destroy data resident in a computer or damage a computer system's resources or both.

Cyber Vandalism

Page 6: Cyber crime

Hacking means unauthorized attempts to bypass the security mechanisms of an information system or network. Also, in simple words Hacking is the unauthorized access to a computer system, programs, data and network resources. The person whose identity is used can suffer various consequences when they are held responsible for the perpetrator’s actions

Hacking

Page 7: Cyber crime

E-mail bombing refers to sending a large amount of e-mails to the victim resulting in interruption in the victims’ e-mail account or mail servers.

E-mail Bombing

Data Diddling

This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed.

Page 8: Cyber crime

Cyber Stalking is use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property.

Cyber Stalking

Page 9: Cyber crime

E-mail spoofing is e-mail activity in which the sender addresses and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source. E-mail spoofing is sending an e-mail to another person in such a way that it appears that the e-mail was sent by someone else

E-mail Spoofing

Denial Of Service

This involves flooding computer resources with more requests than it can handle. This causes the resources to crash thereby denying authorized users the service offered by the resources.

Page 10: Cyber crime

Identity theft is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name.

Identity Theft

Salami Attacks

These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed e.g. a bank employee inserts a program into bank’s servers, that deducts a small amount from the account of every customer

Page 11: Cyber crime

Distinguishing Cybercrimes from Cyber related Crimes

⇛ Many crimes that involve the use of cyber-technology are not genuine cyber crimes.

⇛ Crimes involving stalking can each be carried with or without the use of cyber technology.

⇛ Hence, there is nothing about these kinds of crimes that is unique to cyber technology.

⇛ These and similar crimes are better understood as instances of cyber related crimes.

Page 12: Cyber crime

ANY QUESTION ?

Page 13: Cyber crime

THANKING YOU