cyber crime
DESCRIPTION
Its the presentation about the basic idea of Cyber CrimeTRANSCRIPT
An Introduction to CYBER CRIME
By: ZEESHAN ALAM KHAN
(MCA AMU)
Categories of Cybercrime
Distinguishing Cybercrimes from Cyber related Crimes
Table of contents
Categories of Cybercrime
Using cyber-technology in unauthorized ways to reproduce copies of proprietary software and proprietary information or distribute proprietary information across a computer network.
Using cyber-technology to gain unauthorized access to an individual's or an organization's computer system or a password-protected Web site.
Cyber Piracy
Cyber Trespass
Using cyber-technology to unleash one or more programs that disrupt the transmission of electronic information across one or more computer networks, including the Internet or destroy data resident in a computer or damage a computer system's resources or both.
Cyber Vandalism
Hacking means unauthorized attempts to bypass the security mechanisms of an information system or network. Also, in simple words Hacking is the unauthorized access to a computer system, programs, data and network resources. The person whose identity is used can suffer various consequences when they are held responsible for the perpetrator’s actions
Hacking
E-mail bombing refers to sending a large amount of e-mails to the victim resulting in interruption in the victims’ e-mail account or mail servers.
E-mail Bombing
Data Diddling
This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed.
Cyber Stalking is use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property.
Cyber Stalking
E-mail spoofing is e-mail activity in which the sender addresses and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source. E-mail spoofing is sending an e-mail to another person in such a way that it appears that the e-mail was sent by someone else
E-mail Spoofing
Denial Of Service
This involves flooding computer resources with more requests than it can handle. This causes the resources to crash thereby denying authorized users the service offered by the resources.
Identity theft is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name.
Identity Theft
Salami Attacks
These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed e.g. a bank employee inserts a program into bank’s servers, that deducts a small amount from the account of every customer
Distinguishing Cybercrimes from Cyber related Crimes
⇛ Many crimes that involve the use of cyber-technology are not genuine cyber crimes.
⇛ Crimes involving stalking can each be carried with or without the use of cyber technology.
⇛ Hence, there is nothing about these kinds of crimes that is unique to cyber technology.
⇛ These and similar crimes are better understood as instances of cyber related crimes.
ANY QUESTION ?
THANKING YOU