Cyber Crime-M Yasin Pir

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 12

M.

Yasin Peer
Assistant Professor, Computer Applications
Govt. College for Women,M.A.Road Srinagar.
 “Cyber” refers to imaginary space, which is created when the
electronic devices(Computer,Cell Phones,PDA,Gaming
Consoles etc) communicate, like network of computers.

 Cyber crime refers to anything done in the cyber space with a


criminal intent. These could be either the criminal activities in
the conventional sense or could be activities, newly evolved
with the growth of the new medium.
 Cyber crime includes acts such as hacking, uploading
obscene content on the Internet, sending obscene e-mails
and hacking into a person's e-banking account to withdraw
money.
 There are three major categories of cyber
crimes which are crimes against the
person, property and the government.
1. Against person: harassment via email or cyber-stalking.
 Cyber Stalking means following the moves of an

individual's activity over internet.


 It can be done with the help of many protocols available

such at e- mail, chat rooms,etc while, harassment can be


included sexual, racial, religious, or others. This crime
usually happens to women and teenager.
Example: There is a case happened to a girl in Ahmedabad, Gujarat India. She was
lured to a private place through cyber chat by a man with his friends, attempted to
rape her. Luckily she was rescue by passersby that heard she cried she was
rescued.
2. Against all forms of property- includes computer
vandalism by transmission of harmful programmes to
other computer through internet.
 The other example is cyber criminal can take the contents

of individual bank account.


 One widespread method of getting people's bank account

details is the money transfer email scam.


 People receive emails requesting help with transferring

funds from another country. Hacking into company


websites is property trespass, and stealing information is
property theft. Internet time theft also one of the cyber
crime against property.
 It is done by an authorized person in the usage of the

internet hours which is actually paid by another person.


3. Against Governments- Cyber terrorism is the most serious
type of crime in this category.
 Hacking into a government website, particularly the

military sites, is one manifestation of cyber terrorism.


 The example of cyber crime against government is web

jacking. By web jacking, hackers gain access and control


over the website of another, even they change the content
of website for fulfilling political objective or for money.
 Identity Theft(ID Theft): A criminal obtains key pieces of
personal information, such as Social Security or driver's
license numbers, in order to pose as someone else.
 The thief might open a new credit card account, establish
cellular phone service, or open a new checking account in
order to obtain blank checks.
 Storing illegal information: Criminals often use the Internet
to obtain and transfer illegal images-it means images and in
some cases text, which you see or may be inadvertently
exposed to on a website, which contains any of the following:
 Child abuse images (also known as ‘child pornography’).
 Criminally obscene content which means images featuring acts of extreme and violent
sexual activity.

Those who involves in this crime, don’t just ignore it, report it
 Computer viruses-It may corrupt or delete data on a
computer, use an e-mail program to spread the virus to other
computers, or even delete everything on the hard disk.
 Computer viruses are most easily spread by attachments in
e-mail messages or by instant messaging messages.
 Computer viruses can be disguised as attachments of funny
images, greeting cards, or audio and video files.
 Fraud- Deliberate misrepresentation which causes another
person to suffer damages. Fraud can be committed through many
media, including mail, wire, phone, and the Internet (computer
crime and Internet fraud). Several types of criminal fraud include
false advertising, advance-fee fraud, bankruptcy fraud, etc
 To provide legal recognition for transactions carried out by
means of electronic data interchange and other means of
electronic communication
 “The Information Technology Act, 2000, was thus passed as
the Act No.21 of 2000, got President assent on 9th June and
was made effective from 17 October 2000.
 Amendment Act 2008 : Subject of extensive debates,
elaborate reviews and detailed criticisms, with one arm of the
industry criticizing some sections of the Act to be draconian
and other stating it is too diluted and lenient.
1. Use Strong Passwords :Make the passwords more complicated by combining
letters, numbers, special characters and change them on a regular basis.
2. Secure your computer:
1.Activate your firewall
2. Use anti-virus/malware software
3. Block spyware attacks by installing and updating anti-spyware
software
3. Be Social-Media Savvy : Make sure your social networking profiles (e.g.
Facebook, Twitter, Youtube, MSN, etc.) are set to private.
4 . Secure your Mobile Devices : Download applications from trusted sources.
5. Install the latest operating system updates : Turn on automatic updates to
prevent potential attacks on older software.
6. Protect your Data : Use encryption for your most sensitive files, make regular
back-ups of all your important data.
7. Secure your wireless network( more vulnerable to intrusion) : Avoid
conducting financial or corporate transactions on these networks.
8. Protect your e-identity: Be cautious when giving out personal information or
financial information on the Internet.  Be sure these websites are secure.
9. Avoid being scammed : Always think before you click on a link or file of
unknown origin.
10. Call the right person for help : If you need help,  consult with your service 
provider or a certified computer technician.
Thanks
for
Patient Hearing

You might also like