0% found this document useful (0 votes)
7 views

Computer Assignment

The document discusses various forms of cybercrime, including spamming, fraud, cyberstalking, and phishing, highlighting their definitions and implications. It also outlines protective measures against these threats, such as using antivirus software and strong passwords. Additionally, the document emphasizes the importance of netiquette for respectful online interactions.

Uploaded by

rimshamodak14
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Computer Assignment

The document discusses various forms of cybercrime, including spamming, fraud, cyberstalking, and phishing, highlighting their definitions and implications. It also outlines protective measures against these threats, such as using antivirus software and strong passwords. Additionally, the document emphasizes the importance of netiquette for respectful online interactions.

Uploaded by

rimshamodak14
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

COMPUTER ASSIGNMENT

BY: RIMSHA MODAK &


DEEPTISHREE NAYAK
CLASS :9 ROSE & LILY
TH

ROLL NO : 20 & 2
ONLINE CRIME OR COMPUTER CRIME OR CYBER
CRIME
COMPUTER CRIME ,CYBERCRIME, E-CRIME, HI-TECH
CRIME OR ELECTRONIC CRIME IS A CRIMINAL
ACTIVITY WHERE A COMPUTER OR NETWORK IS
AFFECTED BY SOME OTHER COMPUTER OR
NETWORK .AS THE USE OF COMPUTERS IS GROWING
,THE COMPUTER CRIME IS ALSO SPREADING
CYBERCRIME ENCOMPASSES A WIDE RANGE OF
CRIMINAL ACTIVITIES THAT ARE CARRIED OUT
USING DIGITAL DEVICES AND/OR NETWORKS. THESE
CRIMES INVOLVE THE USE OF TECHNOLOGY TO
COMMIT FRAUD, IDENTITY THEFT, DATA BREACHES,
COMPUTER VIRUSES, SCAMS, AND EXPANDED UPON
IN OTHER MALICIOUS ACTS
SOME OF THE SPECIFIC CYBER CRIME ARE
1. SPAMMING
IN CYBER SECURITY, SPAMMING MEANS SENDING UNWANTED
MESSAGES TO MANY PEOPLE, OFTEN FOR BUSINESS OR MALICIOUS
REASONS. YOU CAN USE EMAILS, TEXTS, OR INSTANT MESSAGES TO
DO THIS. SPAMMING CAN BE USED TO SHARE HARMFUL SOFTWARE,
TAKE PERSONAL INFO, OR TRICK PEOPLE WITH SCAMS AND FAKE
MESSAGES. IT CAN ALSO SLOW DOWN OR BREAK NETWORKS AND
SERVERS. IT'S IMPORTANT TO BE CAREFUL WHEN YOU GET EMAILS OR
MESSAGES FROM PEOPLE YOU DON'T KNOW, AND DON'T CLICK ON
UNKNOWN LINKS OR SHARE PERSONAL INFO.

2. FRAUD
COMPUTER FRAUD IS A DISHONEST ACT WHERE THE USER MAY
BECOME THE VICTIM OF FRAUD AND CAUSES BIG LOSS.THE FRAUD
WILL RESULT IN OBTAINING A BENEFIT BY: ALTERING COMPUTER INPUT
IN AN UNAUTHORIZED WAY, ALTERING ,DESTROYING, SUPPRESSING ,
OR STEALING OUTPUT , DOING UNAUTHORIZED TRANSACTIONS ,
DELETING DATA STORED PERMANENTLY , MISUSING EXISTING SYSTEM
3. CYBER STALKING
CYBERSTALKING IS A CRIME COMMITTED WHEN SOMEONE USES
THE INTERNET AND OTHER TECHNOLOGIES TO HARASS OR STALK
ANOTHER PERSON ONLINE. CYBERSTALKING IS THE USE OF
THE INTERNET OR OTHER ELECTRONIC MEANS TO STALK OR
HARASS AN INDIVIDUAL, GROUP, OR ORGANIZATION. IT MAY
INCLUDE FALSE ACCUSATIONS, DEFAMATION, MONITORING,
IDENTITY THEFT, THREATS, OR BLACKMAIL.[1] THESE UNWANTED
BEHAVIORS ARE PERPETRATED ONLINE AND CAUSE INTRUSION
INTO AN INDIVIDUAL'S DIGITAL LIFE AS WELL AS NEGATIVELY
IMPACT A VICTIM'S MENTAL AND EMOTIONAL WELL-BEING, AS
WELL AS THEIR SENSE OF SAFETY AND SECURITY ONLINE.

4. CYBER HARRASEMENT

CYBER HARASSMENT IS A THREAT VIA THE USE OF


DIGITAL TECHNOLOGIES. IT CAN TAKE PLACE ON SOCIAL
MEDIA, MESSAGING PLATFORMS AND CELL PHONES. IT IS
A REPEATED BEHAVIOR, AIMED AT THREATENING,
5. CYBER TERRORISM
CYBERTERRORISM IS THE USE OF THE INTERNET TO CONDUCT VIOLENT
ACTS THAT RESULT IN, OR THREATEN, THE LOSS OF LIFE OR SIGNIFICANT
BODILY HARM, IN ORDER TO ACHIEVE POLITICAL OR IDEOLOGICAL GAINS
THROUGH THREAT . CYBERTERRORISM CAN BE ALSO DEFINED AS THE
INTENTIONAL USE OF COMPUTERS, NETWORKS, AND PUBLIC INTERNET TO
CAUSE DESTRUCTION AND HARM FOR PERSONAL OBJECTIVES.
CYBERTERRORIST ACTS ARE CARRIED OUT USING COMPUTER SERVERS,
OTHER DEVICES AND NETWORKS VISIBLE ON THE PUBLIC INTERNET. OTHER
TARGETS INCLUDE THE BANKING INDUSTRY, MILITARY INSTALLATIONS,
POWER PLANTS, AIR TRAFFIC CONTROL CENTERS, AND WATER SYSTEMS.

6. PLAGIARISM
CYBER PLAGIARISM IS THE ACT OF COPYING OR DOWNLOADING
SOMEONE ELSE'S WORK FROM THE INTERNET AND CLAIMING IT AS
YOUR OWN WITHOUT GIVING PROPER CREDIT. THIS INCLUDES COPYING
AND SELLING SOMEONE ELSE'S WORK ONLINE WITHOUT THEIR
PERMISSION. PLAGIARISM IS THE REPRESENTATION OF ANOTHER
PERSON'S LANGUAGE, THOUGHTS, IDEAS, OR EXPRESSIONS AS ONE'S
OWN ORIGINAL WORK.THE WORK MAY BE AN IDEA , PROJECT ,
DOCUMENT , ACADEMIC WORK , ETC
7. CHILD SOLICITING AND ABUSE
THIS CYBER CRIME INCLUDE SOLICIT
MINORS VIA CHAT ROOMS FOR THE
PURPOSE OF CHILD ABUSE AND
HARASSMENT BY CRIMINALS.
8. MALICIOUS SOFTWARE
THESE ARE THE INTERNET-BASED
SOFTWARE OR PROGRAMS THAT ARE USED
TO DISRUPT A NETWORK. THE SOFTWARE
IS USED TO GAIN ACCESS TO A SYSTEM TO
STEAL SENSITIVE INFORMATION OR DATA
OR CAUSING DAMAGE TO SOFTWARE
PRESENT IN THE SYSTEM.
9. PHISHING
PHISHING IS A TYPE OF ONLINE SCAM WHERE CRIMINALS
TRICK PEOPLE INTO GIVING AWAY PERSONAL
INFORMATION, SUCH AS PASSWORDS, BANK DETAILS, OR
CREDIT CARD NUMBERS. THE GOAL IS TO STEAL MONEY
OR IDENTITY. PHISHING IS A FORM OF
SOCIAL ENGINEERING AND A SCAM WHERE ATTACKERS
DECEIVE PEOPLE INTO REVEALING
SENSITIVE INFORMATION [1] OR INSTALLING MALWARE
SUCH AS VIRUSES, WORMS . PHISHING ATTACKS HAVE
BECOME INCREASINGLY SOPHISTICATED AND OFTEN
TRANSPARENTLY MIRROR THE SITE BEING TARGETED,
ALLOWING THE ATTACKER TO OBSERVE EVERYTHING
WHILE THE VICTIM NAVIGATES THE SITE, AND
TRANSVERSES ANY ADDITIONAL SECURITY BOUNDARIES
WITH THE VICTIM
.

PROTECTION AGAINST MALICIOUS INTENT OR MALICIOUS CODE

1. SOFTWARE UPDATES
REGULARLY UPDATE YOUR SOFTWARE AND MOBILE APPS TO FIX
VULNERABILITIES AND PREVENT MALWARE.
2. ANTIVIRUS SOFTWARE
INSTALL ANTIVIRUS SOFTWARE TO PROTECT YOUR COMPUTER
AND NETWORK FROM MALWARE, PHISHING ATTEMPTS, AND
OTHER MALICIOUS ATTACKS.
3. STRONG PASSWORDS
USE STRONG, UNIQUE PASSWORDS FOR ALL ONLINE ACCOUNTS
AND USE MULTI-FACTOR AUTHENTICATION WHEN POSSIBLE.
4. AUTHENTICATION
USE AUTHENTICATION SYSTEMS TO VERIFY THE IDENTITY OF
USERS BEFORE GRANTING THEM ACCESS TO SECURE
NETWORKS OR SYSTEMS
5. BE CAUTIOUS WITH EMAILS AND ATTACHMENTS
BE CAREFUL WHEN OPENING EMAILS OR ATTACHMENTS FROM UNKNOWN OR
UNTRUSTED SOURCES.
6. AVOID DOWNLOADING MALICIOUS CODE
AVOID DOWNLOADING FILES FROM UNSECURE OR PUBLIC WI-FI NETWORKS, AND
VERIFY THE LEGITIMACY OF DOWNLOAD SOURCES.
7. AVOID SUSPICIOUS LINKS
AVOID CLICKING ON LINKS IN EMAILS, POP-UPS, OR WEBSITES THAT APPEAR
SUSPICIOUS OR REDIRECT TO UNFAMILIAR DOMAINS.
8. ENDPOINT PROTECTION
USE ENDPOINT PROTECTION SOLUTIONS TO PROTECT CORPORATE DEVICES FROM
MALWARE AND MALICIOUS APPLICATIONS.
9. BLOCK POP-UP ADVERTISEMENTS.
POP-UP BLOCKERS DISABLE WINDOWS THAT COULD POTENTIALLY CONTAIN
MALICIOUS CODE. MOST BROWSERS HAVE A FREE FEATURE THAT CAN BE ENABLED TO
BLOCK POP-UP ADVERTISEMENTS.
10. AVOID USING PUBLIC WI-FI.
UNSECURED PUBLIC WI-FI MAY ALLOW AN ATTACKER TO INTERCEPT YOUR DEVICE'S
NETWORK TRAFFIC AND GAIN ACCESS TO YOUR PERSONAL INFORMATION.
NETIQUETTE
NETIQUETTE, OR INTERNET ETIQUETTE, IS A SET OF
GUIDELINES FOR ACCEPTABLE ONLINE BEHAVIOR. IT'S
IMPORTANT TO PRACTICE NETIQUETTE TO ENSURE
THAT YOUR ONLINE INTERACTIONS ARE RESPECTFUL
AND CONSIDERATE. THE TERM “N” MEANS NET OR
INTERNET AND “ETIQUETTE” MEANS CODE OF
CONDUCT. THE RULES OR PROTOCAL THAT GOVERN
THE USERS BEHAVIOUR WHEN INTERACTING ON THE
INTERNET WITH OTHERS CAN BE TERMED AS
NETIQUETTE. THE PROTOCOL OR CODE OF CONDUCT
FOR ACCEPTABLE ONLINE COMMUNICATION AND
BEHAVIOUR IS KNOWN AS NETIQUETTE. THE E-MAIL ,
ONLINE CHATTING AND NEWSGROUPS ARE THREE
RULES OR CODE OF CONDUCT OF

NETIQUETTE
BE RESPECTFUL: RESPECT OTHER PEOPLE'S PRIVACY AND TIME, AND DON'T
SHARE ANYTHING EMBARRASSING OR ILLEGAL.

• BE CONSIDERATE: CONSIDER WHAT YOU SHARE AND HOW IT MIGHT AFFECT


OTHERS.

• BE CAREFUL WITH YOUR LANGUAGE: AVOID USING ALL CAPS AND


SARCASM.

• BE AWARE OF YOUR CONTEXT: DIFFERENT WEBSITES AND COMMUNITIES


HAVE THEIR OWN NETIQUETTE RULES.

• BE PREPARED TO LEARN: READ PREVIOUS DISCUSSION POSTS BEFORE


RESPONDING TO A NEW ONE.

• BE THOROUGH: IF YOU HAVE A QUESTION, TRY TO FIND THE ANSWER


YOURSELF BEFORE ASKING OTHERS.

• BE FORGIVING: FORGIVE OTHER PEOPLE'S MISTAKES.

• BE UP TO DATE: KEEP YOUR INFORMATION CURRENT, ESPECIALLY IF YOU


OWN A BUSINESS OR ARE LOOKING FOR A JOB.

• BE CAREFUL WITH DOWNLOADS: DON'T OPEN EMAILS OR MESSAGES FROM


PEOPLE YOU DON'T KNOW, ESPECIALLY IF THEY CONTAIN DOWNLOADS.
THANKYOU

You might also like