You are on page 1of 23

INTRODUCTION

Cyber crime is an activity


done using computers and
internet. We can say that it
is an unlawful acts wherein
the computer either a tool
or target or both.

HISTORY OF CYBER CRIME


The first recorded cyber crime took place in
1820.
In India, Japan and China, the era of modern
computer, however, began with the analytical
engine of Charles Babbage.
The first spam email took place in 1976 when it
was sent out over the ARPANT.
The first virus was installed on an Apple
computer in 1982 when a high school student,
Rich skrenta, developed the EIK Cloner.

DEFINITION OF CYBER CRIME

Crime committed using a


computer and the internet to
steal a person's identity or
illegal imports or malicious
programs
Its an unlawful act wherein the
computer is either a tool or a
target or both.

FIRST OCCURENCE OF CYBER CRIME


The first spam email took place
in 1978 when it was sent out over
the Arpanet (Advanced Research
Projects Agency Network).
The first virus was installed on
an Apple computer in 1982 when
a high school student, Rich
Skrenta, developed the Elk
cloner.

WEAPONS OF CYBER CRIME

Hacking:
Unauthorized access to any computer
systems or networks is known as
HACKING. That is accessing the
information of others without proper
authorization.

Data diddling:
This is altering raw data just before a
computer processes it and then changing
it back after the processing is completed.

Denial of Service attack:


The computer is flooded with more
requests than it can handle which cause it
to crash. Distributed Denial of Service
(DDOS) attack is a example.

Email bombing:
It refers to sending large numbers of mail
to the victim, which may be an individual
or a company by ultimately resulting into
crashing.

Trojan attacks:
This term has its origin in the word Trojan
horse. In software field this means an
unauthorized program, which passively
gains control over anothers computer by
representing itself as an authorized
program. The most common form of
installing a Trojan is through e-mail.

Web jacking:
This term is derived from the term hi
jacking. In these kinds of offences the
hacker gains access and control over the
website of another. He may even
manipulate or change the information of
the website. This may be done for
fulfilling political objectives or for money.

Virus/ Worm Attacks:


Affect the data on a computer, either
by altering or deleting it.
Worms unlike viruses do not need the
host to attach themselves to.
They merely make functional copies
of themselves and do this repeatedly
till they eat up all the available space
on the computers memory.

Salami attacks:
This kind of crime is normally
prevalent in the financial institutions or
for the purpose of committing financial
crimes. An important feature of this
type of offence is that the alteration is
so small that it would normally go
unnoticed.

Phishing:
Phishing refers to the receipt of unsolicited
emails by customers of Financial Institutions,
requesting them to enter their Username,
Password or other personal information to
access their Account for some reason. The
fraudster then has access to the customers
online bank account and to the funds
contained in that account.

Spamming:
Electronic spamming is the use of
electronic messaging systems to send
unsolicited bulk messages (spam),
especially advertising, indiscriminately.
The most widely recognized form of spam
is e-mail spam.

Cyber

Stalking:

Cyber stalking is the use of the internet or


other electronic means to stalk someone.
Stalking generally involves harassing or
threatening behavior that an individual
engages in repeatedly.

CATEGORIES OF CYBER
CRIME
Cyber crimes against persons.
Cyber crimes against property.
Cyber crimes against government.

Cyber crimes against society.

CYBER CRIMES AGAINST


PERSONS
Harassment via E-Mails
Hacking

E-Mail / SMS Spoofing


Carding
Assault by Threat

CYBER CRIMES AGAINST


PROPERTY
Intellectual Property
Crimes
Cyber Squatting
Cyber Vandalism
Transmitting Virus
Internet Time Thefts

CYBER CRIMES AGAINST


GOVERNMENT

Cyber Terrorism:
Cyber Terrorism is a phrase used to describe
the use of Internet based attacks in terrorist activities,
including acts of deliberate, large-scale disruption of
computer networks, especially of personal computers
attached to the Internet, by the means of tools such as
computer
viruses.
Examples
of Cyber Terrorism:
Hacking into computer systems.
Introducing viruses to vulnerable
networks.
Website Defacing.
Denial-of-Service(DoS) attacks.
Terroristic threats made via e-mail.

AN INSTANCE OF CYBER TERRORISM


Ahmedabad Bomb Blast(26-0708)
o A mail with id alarbi_gujrat@
yahoo.com was being sent by a
group of Terrorists.
o Person named Kenneth
Haywoods unsecured WIFI
router in his house was being
misused by terrorists.
o 3 more mails were sent after
the blast with the same misuse

CYBER CRIMES AGAINST


SOCIETY
Cyber Trafficking
Online Gambling
Forgery

CYBER CRIMES IN INDIA

The majority of cybercrimes are centered


on forgery, fraud and Phishing.
India is the third-most targeted country
for Phishing attacks after the US and the
UK.
Social networks as well as ecommerce
sites are major targets.
6.9 million bot-infected systems in 2013.
14,348 websites defacements in 2013.
15,000 sites hacked in 2013.
India is number 1 country in the world for
generating spams.
29.9 million people fell victim to cyber
crime.
17% of adults online have experienced
cybercrime on their mobile phone.

CYBER SECURITY
DEFINATION :Cyber security standards are security
standards which enable organizations to practice safe
security techniques to minimize the number of
successful cyber security attacks.

LEGISLATIVE ACTION
AGAINST CYBER CRIME:
The Information Technology Act 2000
was passed and enforced on 17th
May 2000.
OBJECTIVE: To legalise e-commerce
and further amend the Indian Penal
Code 1860, the Indian Evidence Act
1872, the Bankers Book Evidence
Act 1891 and the Reserve Bank of

SAFETY TIPS TO AVOID CYBERCRIME

Use antivirus software and firewalls


keep them up to date.
Keep your operating systems up to
date with critical security updates and
patches.
Dont open emails or attachments from
unknown sources.
Read Privacy policy carefully when you
submit the data through internet.
Disable Remote Connectivity.
Use hard-to-guess passwords. Dont
use words found in a dictionary.
Remember that password cracking
tools exist.
Back-up your computer data on disks
or CDs often.

5P mantra for
online security
Precaution
Prevention
Protection
Preservation
Perseverance

CONCLUDING REMARKS
Cybercrime is indeed getting
the recognition it deserves.
However, it is not going to
restricted that easily.
In fact, it is highly likely that
cybercrime and its hackers
will continue developing and
upgrading to stay ahead of
the law.
So, to make us a safer we
must need cyber security.

CYBER SECURITY
Cyber Security : Cyber Security involves protection of
sensitive personal and business information through
prevention, detection and response to different online
attacks. Cyber security actually preventing the attacks,
cyber security.
Privacy Policy : Before submitting your name , e-mail ,
address, on a website look for the sites privacy policy.
Keep Software Up to Date: If the seller reduces patches for
the software operating system your device ,install them as
soon as possible. Installing them will prevent attackers
from being able to take advantage. Use good password
which will be difficult for thieves to guess .Do not choose
option that allows your computer to remember your
passwords.

CYBER SECURITY

DISABLE REMOTE CONNECTIVITY : Some


PDAs and phones are equipped with
wireless technologies, such as Bluetooth,
that can be used to connect to other devices
or computers. You should disable these
features when they are not in use.

ADVANTAGES OF CYBER SECURITY


The cyber security will defend us from critical
attacks.
It helps us to browse the site, website.
Internet Security process all the incoming
and outgoing data on your computer.
It will defend us from hacks and virus.
Application of cyber security used in our PC
needs update every week

SAFETY TIPS TO CYBER CRIME


Use antivirus Software
Insert Firewalls
Uninstall unnecessary software
Maintain backup
Check security settings

CYBER LAW OF INDIA


Cyber crime can involve criminal activities that
are traditional in nature, such as theft, fraud,
deformation and mischief, all of which are
subjected to the India Penal code. In simple way
we can say that cyber crime is unlawful acts
where in the computer is either a tool or both.
The abuse of computer has also given birth of
new age crime that are addressed by the
Information Technology Act, 2000.

CONCLUSION
Cybercrime is indeed getting the recognition
it deserves. However, it is not going to
restricted that easily . In fact , it is highly
likely that cyber crime and its hackers will
continue developing and upgrading to stay
ahead of the law.
So, to make us a safer we must need cyber
security.

You might also like