cyber crime full report
#11
Seminar by
Nidhi Anand

[attachment=11077]
CYBER CRIME
INTRODUCTION

 Cybercrime is a form of crime where the internet or computers are used as a medium to commit crime.
 Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright, infringement, child pornography and child grooming.
CATEGORIES OF CYBER CRIME:
• Cyber crimes can be basically divided into 3 major categories:
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government
FIRST CATEGORY
• Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other.
SECOND CATEGORY
• These crimes include computer vandalism (destruction of others' property), transmission of harmful programes.
THIRD CATEGORY
• Cyber terrorism is one distinct kind of crime in this category.
• The growth of internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.
Types Of Cyber Crime
• Hacking
• Denial of Service Attack
• Pornography
• Phising
• Spoofing
• Salami Attack
• Forgery
Hacking
• The act of gaining unauthorized access to a computer system or network and in some cases making unauthorized use of this access.
• Hacking is also the act by which other forms of cyber crime(e.g., fraud,terrorism etc.) are committed.
• Hacking is simple term means illegal intrusion into a computer system without the permission of the computer user.
DENIAL OF SERVICE ATTACK
• This is an act by the criminal , who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.
• This involves flooding computer resources with more request than it can handle.This causes the resources to crash thereby denying authorized users the service offered by the resources.
PORNOGRAPHY
• Pornography is the first consistently successful e-commerce product.
• Pornography has deceptive tactics and mouse trapping technologies which encourages customers to access their websites.
• Any body including children can log on to the internet and access websites with pornographic contents with a click of a mouse.
• Publishing , transmitting any material in electronic form which is lascivious or appeals to the prurient intrest is an offence under the provision of section 67 of I.T. Act-2000.
PHIShING
• In computing, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as user names , passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
SPOOFING
• The process of deception by which an individual or system alters its identity or creates additional identities , thereby causing another person or system to act incorrectly.
• Getting one computer on a network to pretend to have the identity of another computer , usually one with special access privileges , so as to obtain access to the other computer on the network.
• Salami Attack
• In such crime criminal makes insignificant changes in such a ,manner that such changes would go unnoticed.
• Criminal makes such program that deducts small amount like $2.50 per month from the account of all the customer of the bank and deposit the same in his account.
• In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
FORGERY
• Counter feit currency notes , postage and revenue stamps , mark sheets etc. ,can be forged using sophisticated computers , printers and scanners.
CYBER SECURITY
• Cyber security involves protection of sensitive personal and business information through prevention, detection and response to different online attack.
• Cyber security standards are security standards which enables organizations to practice safe security techniques to minimize the number of successful cyber security attacks.
ADVANTAGES OF CYBER SECURITY
• It defends us from critical attacks.
• It helps us browse safe websites.
• It defends us from hacks and virus.
• Security developers update their database every week hence new virus also gets deleted.
• Internet security process all the incoming and outgoing data on our computer.
PREVENTION
 Preventive measures should be adopted by both children as well as parents
 For instance children should not reveal any kind of identity while chatting etc.
 Parents should use content filter software on PC.
 For any individual, he/she should share any personal information online to whomsoever it might be.
• Why learn about cyber crime?
• Everybody using COMPUTERS
• From white collar criminals to terrorist organization and from teenagers to adult.
• Conventional crimes like forgery, extortion, kidnapping etc. are being committed with the help of computers.
• New generation is growing up with computers.
• MOST IMPORTANT-monetary transactions are moving on to the internet
CONCLUSION
The modern thief can steal more with a computer than with a gun.Tomorrow’s terrorists may be able to do more damage with a keyboard than with a bomb.
PREVENTION
• Disable and log off a specific user account to prevent access.
• Disable and log off a group of user accounts which access a particular service that is being attacked.
• Disable and dismount specific (network) devices, for instance disk devices that are being swamped.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: cyber crime ppt abstract, information on crime, i learned in spanish, technical seminar topics on cyber crime, spanish rhymezone, cyber crime essay in hindi pdf, spanish synonyms,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: cyber crime full report - by satabdi dash - 09-08-2010, 07:19 PM
RE: cyber crime full report - by projectsofme - 13-10-2010, 09:09 PM
RE: cyber crime full report - by seminar class - 12-03-2011, 04:00 PM
RE: cyber crime full report - by seminar class - 23-03-2011, 02:22 PM
RE: cyber crime full report - by seminar class - 26-03-2011, 02:50 PM
RE: cyber crime full report - by seminar class - 28-03-2011, 09:23 AM
RE: cyber crime full report - by seminar class - 05-04-2011, 09:34 AM
RE: cyber crime full report - by seminar class - 18-04-2011, 09:21 AM
RE: cyber crime full report - by seminar paper - 15-02-2012, 09:54 AM
RE: cyber crime full report - by seminar paper - 18-02-2012, 10:33 AM
RE: cyber crime full report - by seminar paper - 02-03-2012, 01:58 PM
RE: cyber crime full report - by seminar details - 18-10-2012, 01:46 PM
RE: cyber crime full report - by Guest - 27-02-2013, 10:53 PM
RE: cyber crime full report - by Guest - 03-04-2013, 12:53 PM
RE: cyber crime full report - by computer topic - 04-04-2013, 01:01 PM
yzurkj ltifzs kwmink - by MichaelPn - 17-03-2014, 09:40 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 45,692 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 32,933 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 27,028 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 28,725 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 69,607 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 77,615 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 25,568 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 43,711 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 47,012 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,856 01-05-2015, 03:36 PM
Last Post: seminar report asees

Forum Jump: