Cyber Crime-M Yasin Pir
Cyber Crime-M Yasin Pir
Cyber Crime-M Yasin Pir
Yasin Peer
Assistant Professor, Computer Applications
Govt. College for Women,M.A.Road Srinagar.
“Cyber” refers to imaginary space, which is created when the
electronic devices(Computer,Cell Phones,PDA,Gaming
Consoles etc) communicate, like network of computers.
Those who involves in this crime, don’t just ignore it, report it
Computer viruses-It may corrupt or delete data on a
computer, use an e-mail program to spread the virus to other
computers, or even delete everything on the hard disk.
Computer viruses are most easily spread by attachments in
e-mail messages or by instant messaging messages.
Computer viruses can be disguised as attachments of funny
images, greeting cards, or audio and video files.
Fraud- Deliberate misrepresentation which causes another
person to suffer damages. Fraud can be committed through many
media, including mail, wire, phone, and the Internet (computer
crime and Internet fraud). Several types of criminal fraud include
false advertising, advance-fee fraud, bankruptcy fraud, etc
To provide legal recognition for transactions carried out by
means of electronic data interchange and other means of
electronic communication
“The Information Technology Act, 2000, was thus passed as
the Act No.21 of 2000, got President assent on 9th June and
was made effective from 17 October 2000.
Amendment Act 2008 : Subject of extensive debates,
elaborate reviews and detailed criticisms, with one arm of the
industry criticizing some sections of the Act to be draconian
and other stating it is too diluted and lenient.
1. Use Strong Passwords :Make the passwords more complicated by combining
letters, numbers, special characters and change them on a regular basis.
2. Secure your computer:
1.Activate your firewall
2. Use anti-virus/malware software
3. Block spyware attacks by installing and updating anti-spyware
software
3. Be Social-Media Savvy : Make sure your social networking profiles (e.g.
Facebook, Twitter, Youtube, MSN, etc.) are set to private.
4 . Secure your Mobile Devices : Download applications from trusted sources.
5. Install the latest operating system updates : Turn on automatic updates to
prevent potential attacks on older software.
6. Protect your Data : Use encryption for your most sensitive files, make regular
back-ups of all your important data.
7. Secure your wireless network( more vulnerable to intrusion) : Avoid
conducting financial or corporate transactions on these networks.
8. Protect your e-identity: Be cautious when giving out personal information or
financial information on the Internet. Be sure these websites are secure.
9. Avoid being scammed : Always think before you click on a link or file of
unknown origin.
10. Call the right person for help : If you need help, consult with your service
provider or a certified computer technician.
Thanks
for
Patient Hearing