SlideShare una empresa de Scribd logo
1 de 16
CYBER CRIME MISS.JYOTI A. PATIL BCA-I, ROLL No.16.               DR.B.M.N college of home science, matunga.
INTERNET Parallel form of life and living. Dependence & reliance of mankind on this machines. Communication, net surfing, education, business, shopping , entertainment, etc.
CYBER CRIME Cyber crime - Criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It also refers to criminal exploitation of Internet. It includes- Unauthorized access to computer systems, Data alteration,  Data destruction,  Theft of intellectual property,etc.
Computer crime encompasses a broad range of potentially illegal activities. It can be divided into two broad activities:    (1) Crimes that target computer networks or devices directly, Eg.- Computer viruses, Denial of service attacks.    (2) Crimes facilitated by computer networks or devices, the primary target of which is independent of computer network or device. Eg. Cyber stalking, Fraud and identity theft, Phishing scams,etc.
VARIANTS Cyber stalking Hacking Phishing Crosssite scripting Vishing Cyber Squatting Bot Networks
1. Cyber Stalking Cyber stalking  is also called as Online harassment and Online abuse. It is use of the Internet or other electronic means to stalk someone. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property.
2. Phishing Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of financial institutions, requesting them to enter their username, password or other personal information to access their account for some reason.
3. Cross site scripting Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users.
4. Hacking Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 per cent increase this year.
5. Vishing Vishing is the criminal practice of using social engineering and Voice over IP (VoIP) to gain access to private, personal and financial information from the public for the purpose of financial reward. The term is a combination of "voice" and phishing
6. Cyber Squatting Cyber squatting is the act of registering a famous domain name and then selling it for a fortune. This is an issue that has not been tackled in IT act 2000.
7. Bot Networks A cyber crime called 'Bot Networks', wherein spamsters and other perpetrators of cyber crimes remotely take control of computers without the users realizing it. It is increasing at an alarming rate. Computers get linked to Bot Networks when users unknowingly download malicious codes such as Trojan horse sent as e-mail attachments.
CYBER CRIME CASES On 7th Feb,2000 Yahoo! Website was attacked. Yahoo was pinged at a rate of 1gb/sec. In 26 March 1999, the Melissa worm infected a document on a victim's computer, then automatically sent that document and copy of the virus via e-mail to other people. On 2nd  March 2010, Spanish investigators busted 3  infection of over 13 million computers around the world. The "botnet" of infected computers included PCs inside more than half of the Fortune 1,000 companies and more than 40 major banks.
Anti Cyber Crime Initiatives Keep an electronic eye on the users of the various cyber cafes spread over the city. Establish Computer Emergency Response Teams (CERTs) To coordinate and respond during major security incidents/events. Identify and address existing and potential threats and vulnerabilities in the system and coordinate with stakeholders to address threats.
CONCLUSION Net surfing by youngsters lures them into dangerous domain.  The need for a conscious effort to checkmate the undesirable fallout of youngsters accessing and using the Internet is of concern.  The print media has a duty to educate unwary parents and youngsters about the dangers inherent in treading dangerous areas in the cyber-world.
* THANK YOU *

Más contenido relacionado

La actualidad más candente

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in indiaNikhil Naren
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ictsafa
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patentsravijain90
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 

La actualidad más candente (20)

Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 

Destacado

Destacado (8)

Internet
InternetInternet
Internet
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Different Types of Computers
Different Types of ComputersDifferent Types of Computers
Different Types of Computers
 
E Mail Ppt
E Mail PptE Mail Ppt
E Mail Ppt
 
Types of computers
Types of computersTypes of computers
Types of computers
 
Internet
InternetInternet
Internet
 
Email ppt
Email pptEmail ppt
Email ppt
 
Ppt on internet
Ppt on internetPpt on internet
Ppt on internet
 

Similar a Internet

Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 

Similar a Internet (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
English in written
English in writtenEnglish in written
English in written
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 

Internet

  • 1. CYBER CRIME MISS.JYOTI A. PATIL BCA-I, ROLL No.16. DR.B.M.N college of home science, matunga.
  • 2. INTERNET Parallel form of life and living. Dependence & reliance of mankind on this machines. Communication, net surfing, education, business, shopping , entertainment, etc.
  • 3. CYBER CRIME Cyber crime - Criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It also refers to criminal exploitation of Internet. It includes- Unauthorized access to computer systems, Data alteration, Data destruction, Theft of intellectual property,etc.
  • 4. Computer crime encompasses a broad range of potentially illegal activities. It can be divided into two broad activities: (1) Crimes that target computer networks or devices directly, Eg.- Computer viruses, Denial of service attacks. (2) Crimes facilitated by computer networks or devices, the primary target of which is independent of computer network or device. Eg. Cyber stalking, Fraud and identity theft, Phishing scams,etc.
  • 5. VARIANTS Cyber stalking Hacking Phishing Crosssite scripting Vishing Cyber Squatting Bot Networks
  • 6. 1. Cyber Stalking Cyber stalking is also called as Online harassment and Online abuse. It is use of the Internet or other electronic means to stalk someone. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property.
  • 7. 2. Phishing Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of financial institutions, requesting them to enter their username, password or other personal information to access their account for some reason.
  • 8. 3. Cross site scripting Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users.
  • 9. 4. Hacking Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 per cent increase this year.
  • 10. 5. Vishing Vishing is the criminal practice of using social engineering and Voice over IP (VoIP) to gain access to private, personal and financial information from the public for the purpose of financial reward. The term is a combination of "voice" and phishing
  • 11. 6. Cyber Squatting Cyber squatting is the act of registering a famous domain name and then selling it for a fortune. This is an issue that has not been tackled in IT act 2000.
  • 12. 7. Bot Networks A cyber crime called 'Bot Networks', wherein spamsters and other perpetrators of cyber crimes remotely take control of computers without the users realizing it. It is increasing at an alarming rate. Computers get linked to Bot Networks when users unknowingly download malicious codes such as Trojan horse sent as e-mail attachments.
  • 13. CYBER CRIME CASES On 7th Feb,2000 Yahoo! Website was attacked. Yahoo was pinged at a rate of 1gb/sec. In 26 March 1999, the Melissa worm infected a document on a victim's computer, then automatically sent that document and copy of the virus via e-mail to other people. On 2nd March 2010, Spanish investigators busted 3 infection of over 13 million computers around the world. The "botnet" of infected computers included PCs inside more than half of the Fortune 1,000 companies and more than 40 major banks.
  • 14. Anti Cyber Crime Initiatives Keep an electronic eye on the users of the various cyber cafes spread over the city. Establish Computer Emergency Response Teams (CERTs) To coordinate and respond during major security incidents/events. Identify and address existing and potential threats and vulnerabilities in the system and coordinate with stakeholders to address threats.
  • 15. CONCLUSION Net surfing by youngsters lures them into dangerous domain. The need for a conscious effort to checkmate the undesirable fallout of youngsters accessing and using the Internet is of concern. The print media has a duty to educate unwary parents and youngsters about the dangers inherent in treading dangerous areas in the cyber-world.