1. What is Cyber Crime ?
History of Cyber Crime
Types of Cyber Crime
Causes of Cyber Crime
How to tackle Cyber Crime?
2. Crime committed over internet
Involves internet
Computers used to commit crimes
Computers used as the target of the
crime
“Offenses that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental harm , or
loss to the victim directly or indirectly using modern
telecommunications such as internet and mobile phones.”
(Dr. Debarati Halder)
3. Later on , when computers and networks came into being in the 1990s, hacking
was done basically to get more information about the systems. Hackers even
competed against one another to win the tag of the best hacker. As a result, many
networks were affected, hacking started making networks and systems slow. As
hackers became more skilful, they started using their knowledge and expertise to
gain benefit by exploiting and victimizing others.
5. This is a type of crime where in a person’s
computer is broken into so that his personal or
sensitive information can be accessed. In some
cases person may not be aware that his computer is
being accessed from a remote location.
In hacking, the criminal uses a variety of
internet-based software or programs
• to enter a person’s computer ,
• to disrupt a network ,
• to gain access to a system ,
• to steal sensitive information or data,
• causing damage to software present in the
system.
6. Cyber terrorism is a phrase used to
describe the use of internet based
attacks in terrorist activities, including
acts of deliberate, large-scale
disruption of computer networks,
especially of personal computers
attached to the internet, by the means
of tools such as computer viruses.
It varies from ..
• Stealing data and hacking
• Planning terrorist attacks
• Causing violence
• Attacking information systems
7. In this cyber crime, a criminal accesses
data about a person’s bank account,
credit cards, Social Security, debit card
and other sensitive information to
siphon money or to buy things online in
the victim’s name. It can result in major
financial losses for the victim and even
spoil the victim’s credit history.
The personal information stolen can include the
person's name, social security number, birth date or
credit card numbers. This stolen information is then
used to obtain new credit cards, access bank
accounts or obtain other benefits, such as a driver's
license.
8. Cyber stalking is the use of the Internet or electronics to
stalk or harass an individual, an organization or a specific
group. Cyber stalking can include harassment of the
victim, the obtaining of financial information of the victim
or threatening the victim in order to frighten them. A cyber
stalker relies upon the anonymity afforded by the Internet
to allow them to stalk their victim without being detected.
9. Possible reasons:
Passion of youngsters
For the sake of recognition
Desire of making quick money
Misconception of fighting a just cause
Dissatisfied/disappointed employees
Drawbacks in judiciary systems
Lack of evidence
Inaccessibility to criminals
Loopholes in system
Negligence of security of data
Confidential information is online
10. One of the best ways to avoid being a victim of cyber crimes and
protecting your sensitive information is by making use of impenetrable
security that uses a unified system of software and hardware to
authenticate any information that is sent or accessed over the Internet.
This helps to keep the network and the systems using the network safe.
The best way to go about is using the solutions provided by Cross-
Domain Solutions. Cross Domain Solution offers a way to keep all
information confidential by using safe and secure domains that cannot
be tracked or accessed.