CYBER CRIME – PREVENTION & DETECTION
#1

CYBER CRIME – PREVENTION & DETECTION

[attachment=18028]
CYBER CRIME
1.1 Cyber Crime is an evil having its origin in the growing dependence on computers in modern life.
A simple yet sturdy definition of cyber crime would be “unlawful acts wherein the computer is either a tool or a target or both”. Defining cyber crimes, as “acts that are punishable by the information Technology Act” would be unsuitable as the Indian Penal Code also covers many cyber crimes, such as e-mail spoofing, cyber defamation etc.,

1.2 TYPES OF CYBER CRIME
Cyber Crime refers to all activities done with criminal intent in cyberspace. These fall into three slots.
• Those against persons.
• Against Business and Non-business organizations.
• Crime targeting the government.
Let us examine the acts wherein the computer is a tool for an unlawful act. This kind of activity usually involves a modification of a conventional crime by using computer. Some examples are;

1.2.1 Financial Claims: This would include cheating, credit card frauds, money laundering etc.

Cyber Pornography: This would include pornographic websites; pornographic magazines produced using computer and the Internet (to down load and transmit pornographic pictures, photos, writings etc.)

Sale of illegal articles: This would include sale of narcotics, weapons and wildlife etc., by posting information on websites, bulletin boards or simply by using e-mail communications.

Online gambling: There are millions of websites, all hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering.
Intellectual Property Crimes: These include software piracy, copyright infringement, trademarks violations etc.



2.0 PREVENTION
2.1 PREVENTIVE STEPS FOR INDIVIDUALS
2.1.1. CHILDREN:

Children should not give out identifying information such as Name, Home address, School Name or Telephone Number in a chat room. They should not give photographs to anyone on the Net without first checking or informing parents guardians. They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to –face meeting without telling parents or guardians. They should remember that people online might not be who they seem.
2.1.2 PARENTS:
Parent should use content filtering software on PC to protect children from pornography, gambling, hate speech, drugs and alcohol.
There is also software to establish time controls for use of limpets (for example blocking usage after a particulars time) and allowing parents to see which site item children have visited. Use this software to keep track of the type of activities of children.
2.1.3. GENERAL INFORMATION:
Don’t delete harmful communications (emails, chats etc). They will provide vital information about system and address of the person behind these.
Reply
#2


to get information about the topic "step to prevent and control of cyber crime" full report ppt and related topic refer the page link bellow


http://studentbank.in/report-cyber-crime...e=threaded

http://studentbank.in/report-cyber-crime...e=threaded

http://studentbank.in/report-cyber-crime...ode=linear
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: crime,
Popular Searches: topics related to cyber crime, cyber crime information in marathi language articals, what is the indian cyber crime code 478, cyber crime act, cyber crime division, what is cyber crime in gujarati language, cyber crime,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Image Processing for Skin Cancer Detection seminar paper 5 3,952 17-03-2016, 11:42 AM
Last Post: seminar report asees
  Walking Stick With Heart Attack Detection seminars report seminar addict 4 4,311 10-02-2013, 06:32 PM
Last Post: Guest
  ON PARTICLE FILTERS FOR LANDMINE DETECTION USING IMPULSE GROUND PENETRATING RADAR project uploader 0 1,045 11-06-2012, 10:37 AM
Last Post: project uploader
  TARGET DETECTION USING GPS SATELLITE seminar details 0 1,012 09-06-2012, 05:14 PM
Last Post: seminar details
  IMPLEMENTATION OF DSP BASED SENSORLESS CONTROL WITH DIRECT BACK-EMF DETECTION ....... project uploader 0 1,141 09-06-2012, 04:56 PM
Last Post: project uploader
  IMPLEMENTATION OF DSP BASED SENSORLESS CONTROL WITH DIRECT BACK-EMF DETECTION ..... project uploader 0 945 08-06-2012, 12:14 PM
Last Post: project uploader
  Threat Prevention using Artificial Intelligence project uploader 0 1,026 13-03-2012, 03:14 PM
Last Post: project uploader
  Real-Time Image Processing Applied To Traffic – Queue Detection Algorithm seminar paper 0 785 09-03-2012, 02:42 PM
Last Post: seminar paper
  An Adept Edge Detection Algorithm for Human Knee Osteoarthritis Images project uploader 0 759 03-03-2012, 12:32 PM
Last Post: project uploader
  Articial Intelligence Methods in Virus Detection & Recognition seminar paper 0 837 24-02-2012, 03:16 PM
Last Post: seminar paper

Forum Jump: