Professional Documents
Culture Documents
( Unethical Practices )
Cyberspace
Cyberspace is like a big city. There are libraries,
universities, museums, places to have fun, and
plenty of opportunities to meet wonderful people.
But, like any community, there are also some people
and areas that you need to avoid and others that
you should approach with caution.
Characteristics of Cyber Crime:
Silent in Nature
Global in character
Computer specific or
Targeted crime
Incidental Crime
Tools of Cybercrime
Software piracy
Cyber terrorism
Hacking Credit Card Fraud
Child Pornography Unauthorized Access
Cyber Stalking/Harassment
Attacks Using Virus, Worms & Spam
Phishing
Hacking Or
Cracking
A hacker as an "expert or enthusiast of any kind."
Note that a hacker need not be a computer
enthusiast.
e.g., someone can be an astronomy hacker
Cracking in simple terms means an illegal intrusion into a computer
Mitnick broke into his first computer network in 1979 at age 16.
computer expert, Kohli was able to trace the culprit. Now, the
hackers
16% of people who receive fraudulent lottery
Phone number
Pictures
Guidelines..
2 .Do not agree to get together with someone
you
meet online.
Chat rooms are the most dangerous area on the
Internet.
You never know for certain if they are who they
say they are.
Discuss it with your parents and meet in a public
place with your parents
Guidelines..
3. Do not download or install from Internet
or open e-mail attachments.
Don’t open e-mail if you don’t know who sent it to
you, you could spread a virus. It would be best to
delete the message.
It is possible to get a virus from someone you
know. It is best to purchase a virus scanning
software program.
Guidelines..
4. Do not send or display offensive
or
Go to www.cybertipline.com
Call 1-800-843-5678
References :-
http://en.wikipedia.org
www.crime-research.org
www.uspto.gov
http://cybercrime.planetindia.net/intro.h
http://www.cyberkeralam.in:8888/berke
Thank You
Dasvidanya