Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Cyber theft !!!

751 visualizaciones

Publicado el

cyber theft..... hi tech theft !!!

Publicado en: Tecnología
  • Sé el primero en comentar

Cyber theft !!!

  1. 1.  Cyber crime refers to any crime that involves a computer and a network. Net crime refers to criminal exploitation of the Internet. Cybercrimes are defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)"
  2. 2.  Such crimes may threaten a nation’s security and financial health. can create cross border tensions. also known as CYBER TERRORISM
  3. 3. CRIMES THAT PRIMARILY TARGET COMPUTER NETWORKS OR DEVICES INCLUDE: Computer viruses Denial-of-service attacks Malware (malicious code)
  4. 4. CRIMES THAT USE COMPUTER NETWORKS OR DEVICES TO ADVANCE OTHER ENDS INCLUDE: Cyberstalking Fraud and identity theft Information warfare Phishing scams
  5. 5. COMPUTER VIRUS A computer virus is a computer program that can replicate itself and spread from one computer to another. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers.
  6. 6. DENIAL-OF-SERVICE ATTACK (DOS ATTACK) OR DISTRIBUTED DENIAL-OF-SERVICE ATTACK (DDOS ATTACK) It is an attempt to make a computer or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person, or multiple people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root name servers
  7. 7. MALWARE Malware is a general term used to describe any kind of software or code specifically designed to exploit a computer, or the data it contains, without consent. Malware includes computer viruses, worms, trojan horses, spyware adware most rootkits and other malicious programs
  8. 8. CYBER STALKING Stalking is a form of mental assault, in which the perpetrator repeatedly, unwantedly, and disruptively breaks into the life-world of the victim, with whom he has no relationship (or no longer has), with motives that are directly or indirectly traceable to the affective sphere. Moreover, the separated acts that make up the intrusion cannot by themselves cause the mental abuse, but do taken together (cumulative effect).
  9. 9. FRAUD a fraud is an intentional deception made for personal gain or to damage another individual; the related adjective is fraudulent. Defrauding people or entities of money or valuables is a common purpose of fraud, but there have also been fraudulent "discoveries", e.g., in science , to gain prestige rather than immediate monetary gain.
  10. 10. IDENTITY THEFT Identity theft is a form of stealing someones identity in which someone pretends to be someone else by assuming that persons identity, typically in order to access resources or obtain credit and other benefits in that persons name.
  11. 11. INFORMATION WARFARE The term Information Warfare (IW) is primarily an American concept involving the use and management of information technology in pursuit of a competitive advantage over an opponent. Information warfare may involve collection of tactical information, assurance(s) that ones own information is valid, spreading of propagandaor disinformation to demoralize or manipulate the enemy
  12. 12. PHISHING Phishing is a way of attempting to acquire information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public.
  13. 13. HOW TO SAVE YOURSELF FROM CYBER THEFT First of all keep updating your email passwords in every 2 months. Secondly don’t keep your private informations on public websites or social websites. Activate double security system in emails and net banking. Don’t give you’re a/c no and passwords to unknown websites.
  14. 14. ANTI CYBER CRIME Anti cyber crime organisations are contineously working to track these hackers and provide better security solotions.