09-03-2011, 02:51 PM
PRESENTED BY
AZHAR HUSSAIN
[attachment=9877]
CYBER CRIME AWARENESS
Why learn about CYBER CRIME?
Because
Everybody is using COMPUTERS
From white collar criminals to terrorist organizations And from Teenagers to Adults
Conventional crimes like Forgery, extortion, kidnapping etc. are being committed with the help of computers.
New generation is growing up with computers
MOST IMPORTANT- Monetary transactions are moving on to the INTERNET
WHAT IS COMPUTER CRIME?
All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system.
IN SHORT
COMPUTER CRIME is any crime where –
Computer is a target.
Computer is a tool of crime.
Computer is incidental to crime.
Profile of Cyber Criminal
• Disgruntled employees.
• Teenagers.
• Political Hacktivist.
• Professional Hackers.
• Business Rival.
• Ex-Boy Friend.
• Divorced Husband. Etc
VICTIMS
• Gullible.
• Desperados and greedy people.
• Unskilled & Inexperienced.
• Unlucky people.
Computer Crimes are Vulnerable
Because of:-
Anonymity,
Computer’s storage capacity,
Weakness in Operating System,
Lack of Awareness of user.
Types of Cyber Crime
(This is not exhaustive list of cyber crime)
• HACKING • PHISHING
• DENIAL OF SERVICE ATTACK • SPOOFING
• VIRUS DISSEMINATION • CYBER STALKING
• SOFTWARE PIRACY • CYBER DEFAMATION
• PORNOGRAPHY • THREATENING
• CREDIT CARD FRAUD • SALAMI ATTACK
1) HACKING
Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
2) DENIAL OF SERVICE ATTACK
This is an act by the criminal, who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.
3) VIRUS DISSEMINATION
Malicious software that attaches itself to other software.
(virus, worms, Trojan Horse, Timebomb, LogicBomb, Rabbit and Bacterium are the malicious softwares)
4) SOFTWARE PIRAC
• Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
• Retail revenue losses worldwide are ever increasing due to this crime
• Can be done in various ways-
End user copying, Hard disk loading, Counterfeiting, Illegal downloads from the internet etc.
5) PORNOGRAPHY
• Pornography is the first consistently successful e-commerce product.
• Deceptive marketing tactics and mouse trapping technologies pornography encourage customers to access their websites.
• Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse.
Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient interest is an offence under the provisions of section 67 of I.T. Act-2000