0% found this document useful (0 votes)
53 views25 pages

Class 11 PDF

class 11 pdfclass 11 pdf

Uploaded by

elonreevemusk2k
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views25 pages

Class 11 PDF

class 11 pdfclass 11 pdf

Uploaded by

elonreevemusk2k
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 25

CYBER

CRIME
Introduction to Cyber
Crime
• Crime committed using a computer and the internet to
steal a person's identity or illegal imports or malicious
programs.
• Cybercrime is nothing but where
the computer used as an object or
subject of crime.
Cyber
C
• rPerson
imin oraGroup
l s who commits Cyber Crime using
computers
• Hackers, criminals groups, hacktivists, virus writers,
terrorists
History
• The first recorded cyber crime took place in the year
1820.
• The first spam email took place in 1978 when it was
sent over the Arpanet.
• The first VIRUS was installed on an Apple computer in
1982 .
Cyber Threat Evolution
Cyber Criminals used

• The Computer as a Target : using a computer to attack


other computers. E.g Hacking, virus/worm attacks, Dos
attacks etc.
• The computer as a weapon : using a computer to
commit real world crimes. E.g. Cyber terrorism, credit
card frauds, Child pornography etc.
Categories of Cyber
Crime
Crimes against People:

• Harassment via emails, cyber


stalking, email spoofing, carding,
assault by threat.

• The potential harm of such a


crime to humanity can hardly
be overstated.
Crimes against
Property:
• Cybercrimes against all forms of property.
• Unauthorized computer
trespassing through cyberspace,
computer vandalism, transmission
of harmful programs, and
unauthorized possession of
computerized information.
Crimes against the
Government :
• Cyber Terrorism, Damaging critical information
infrastructures.
• The growth of Internet has shown that the medium of
Cyberspace is being used by individuals and groups to the
international governments as also to threaten the citizens
of a country.
• This crime manifests itself into terrorism when an
individual "cracks" into a government or military
maintained website.
Hacking
Hacking in simple terms means an illegal intrusion or
unauthorized access to or control over a computer system
and/or network.
Virus
Dissemination
Malicious software that attaches itself to other software.
(virus, worms, TrojanHorse, web jacking, e-mail bombing
etc.)
Software
Piracy
• Theft of software through the illegal copying of genuine
programs.
• The counterfeiting and
distribution of products intended
to pass for the original Software.
Credit Card
Fraud
• Personal information stolen from a card, or the theft of
a card itself, can be used to commit fraud.
• Fraudsters might use the
information to purchase
goods in your name or
obtain unauthorized
funds from an account.
Ransomw
are
Ransomware is a type of malware that prevents or limits
users from accessing their system, either by locking the
system's screen or by locking the users' files unless a
ransom is paid.
Fake Profi le
Marketing
Creating or using a fake profile, fake website or email to
create a bad image or inappropriate marketing is also
considered as cybercrime.
Website
Hacking
• Website Hacking means taking control from the
website owner to a person who hacks the website.
• Nowadays most of the
government websites are
attacked by hackers. Many
governmental websites
including the president's
website were hacked.
Eavesdropp
ing
An eavesdropping attack occurs when a hacker intercepts,
deletes, or modifies data that is transmitted between two
devices. Eavesdropping, also known as sniffing or snooping,
relies on unsecured network communications to access data
in transit between devices.
Phishin
g
To request confidential information over the internet or by
telephone under false pretenses in order to fraudulently
obtain credit card numbers, passwords, or other personal
data.
How to tackle these
activities?
• Awareness is the first step in protecting yourself, your
family and your business.
• Invest in Anti-virus, Firewall, and SPAM blocking
software for your PC.
• Detect secure websites when conducting transactions
online.
• Do NOT respond or act on emails sent from unknown
sources.
Safety Tips to Cyber
Crime
• Use antivirus • Read Privacy policy • Uninstall
software & carefully when you unnecessary
insert firewalls submit the data software
through internet.
• Maintain • Check security • Disable Remote
backup settings Connectivity
• Use hard-to-guess • Never give • Learn more
passwords. Don't use your full about
words found in a name or Internet
dictionary. Remember address to privacy
that password strangers
cracking tools exist.
Cyber
Security
• Internet security is a branch of computer security
specifically related to the Internet.
• It's objective is to establish rules and measure to use
against attacks over the Internet.
Cyber Security
Advantages:
• The cyber security will defend us from critical attacks,
hacks and virus.
• It helps us to browse the safe website.
• Internet security process all the incoming and outgoing
data on our computer.
• The application of cyber security used in our PC needs
update every week.
• The security developers will update their database
every week once. Hence the new virus also deleted
Conclusi
on
• The key to protecting yourself is being aware.
• Cybercrime is about much more than hackers & not all
cybercriminals are "hackers."
• There is a whole other world that exists in cyberspace... make
sure that your information travels safely.
• Technology is destructive only in the hands of people who do
not realize that they are one and the same process as the
universe.
• Cybercrime is a major problem — and growing .
• Stay Secure, Stay safe
THAN
K YOU

You might also like