12
NAME: ABHISHEK VISWAM CLASS: M.B.A. SECTION: A REG.NO: AC12MBF002 INSTITUTION: ADHIYAMAAN COLLEGE OF ENGINEERING,HOSUR TOPIC: CYBER CRIME

Cyber crime (2)

Embed Size (px)

DESCRIPTION

description abt cyber crime

Citation preview

Page 1: Cyber crime (2)

NAME: ABHISHEK VISWAM

CLASS: M.B.A.

SECTION: A

REG.NO: AC12MBF002

INSTITUTION: ADHIYAMAAN COLLEGE OF ENGINEERING,HOSUR

TOPIC: CYBER CRIME

Page 2: Cyber crime (2)

CYBER CRIME

CYBER CRIMES are defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".

cyber crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.

Page 3: Cyber crime (2)

DETAILS

Cyber crime encompasses a broad range of activities. Generally, however, it may be divided into two categories: (1) crimes that target computers directly; (2) crimes facilitated by computer networks or devices.

Crimes that primarily target computer networks or devices include:

Computer virusesA computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.

Page 4: Cyber crime (2)

a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users.Although the means to carry out, motives for, and targets of a Dos attack may vary, it generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.The term is generally used relating to computer networks, but is not limited to this field; for example, it is also used in reference to CPU resource management.

Denial-of-service attacks

Page 5: Cyber crime (2)

MALWARE

Malware includes computer viruses, worms, trojan horses, spyware, adware, and other malicious programs. Malware is a software that has a legitimate purpose but contains harmful bugs that were not corrected before release.

Crimes that use computer networks or devices to advance other ends include:Cyberstalking

Cyberstalking is a criminal offense that comes into play under state anti-stalking laws, slander laws, and harassment laws. A cyberstalking conviction can result in a restraining order, probation, or even criminal penalties against the assailant, including jail.

Page 6: Cyber crime (2)

FRAUD AND IDENTITY THEFT

Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss.Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Information Warfare The term Information Warfare is primarily an American concept involving the use and management of information technology in pursuit of a competitive advantage over an opponent.

Phishing scams

Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication

Page 7: Cyber crime (2)

Spam, or the unsolicited sending of bulk email for commercial purposes, is unlawful in some jurisdictions. While anti-spam laws are relatively new, limits on unsolicited electronic communications have existed for some time.

Obscene or offensive content

The content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons.

The extent to which these communications are unlawful varies greatly between countries, and even within nations. It is a sensitive area in which the courts can become involved in arbitrating between groups with strong beliefs.

Page 8: Cyber crime (2)

HARASSMENT

harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms, through newsgroups, and by sending hate e-mail to interested parties (see cyber bullying, cyber stalking, hate crime, Online predator, and stalking). Any comment that may be found derogatory or offensive is considered harassment.

Page 9: Cyber crime (2)

CYBER TERRORISM

Cyber terrorism in general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources (Parker 1983). As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be considered cyber terrorism.

Page 10: Cyber crime (2)

As well there are also hacking activities directed towards individuals, families, organized by groups within networks, tending to cause fear among people, demonstrate power, collecting information relevant for ruining peoples' lives, robberies, blackmailing etc.

Cyberextortion is a form of cyberterrorism in which a website, e-mail server, or computer system is subjected to repeated denial of service or other attacks by malicious hackers, who demand money in return for promising to stop the attacks.

Page 11: Cyber crime (2)

According to the Federal Bureau of Investigation, cyberextortionists are increasingly attacking corporate websites and networks, crippling their ability to operate and demanding payments to restore their service. More than 20 cases are reported each month to the FBI and many go unreported in order to keep the victim's name out of the public domain. Perpetrators typically use a distributed denial-of-service attack.

Page 12: Cyber crime (2)

THANK YOU… HTTPS://WWW.FACEBOOK.COM/ABHISHEK.VISWAM