Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Cyber crime
1.
2. Crime committed using a computer and the internet to
steal a persons identity or disrupt operations with
malevolent programs.
Cyber crime is emerging as a serious threat.
Threatening email , assuming someone’s identity , sexual
harassment , deformation are examples where computers
are used to commit crime.
3. In this world of 21st century every one is engaged with
internet through face book , whats app , twitter , net –
banking & lots of other platforms are there.
And some criminal minded persons commit crimes here
which is included under cyber crimes .
So we should be aware about crimes happening around in
the cyber space.
4. Cyber crime refers to all activities done with criminal intent in
cyber space .
These fall into three slots.
Those against persons.
Against business and non business organisations .
Crime targeting the government.
6. Hacking is a crime , which entails cracking systems
and gaining unauthorized access to the data stored in
them.
CYBER SQUATTING
Cyber squatting is the act of registering a famous
Domain Name and then selling it for a fortune.
7. Acquiring information such as usernames , password and
credit card details by disguising as a trustworthy entity.
India is among the top 15 countries hosting “phishing” sites
which aims at stealing confidential information such as
password and credit card details.
EMAIL BOMBING
To sending a large amount of e-mails to the victim resulting
in cashing of victims e-mail account or mail servers.
8. To the use of the internet , e-mail ,or other electronic
communications devices to stalk another person.
WEB JACKING
This occurs when some one forcefully takes control of a
website (by cracking the password). The actual owner
of the website does not have any more control over
what appears on that website.
9. A spoofed email is one that appears to originate from
one source but actually has been sent from another
source . This can also be termed as E-Mail forging.
CYBER TERRORISUM
Is the premeditated use of disruptive activities , or the
threat thereof , in cyber space , with the intention to
further social , ideological , religious , political or
similar objectives , or to intimidate any person in
furtherance of such objectives.
10. The ability to charge a phone bill via SMS billing and
phone calls. Malware uses these mechanisms to steal
directly from user accounts.
11.
12.
13. Use anti-virus software and firewalls – keep them up to
date.
Don’t open emails or attachments from unknown
sources.
Back-up your computer data on disks or CDs often
Don’t share access to your computers with strangers
If you have a Wi-Fi network, password protect it
Disconnect from the internet when not in use
Re evaluate your security on a regular basis
14. “Treat your password like you treat your brush.
Never give to any one else to use , and change it
every few months.”