View
49
Download
1
Tags:
Embed Size (px)
Citation preview
Cyber Crime- The New War of the 21st Century
Computer related fraud. Illegal accessment. Illegal interception. Data interference. System interference. Misuse of devices.
What is Cyber Crime ?
Types of Cyber Crime
Hacking- Illegal intrusion into a computer
system and/or network .
Unauthorized access to data
storage.
Motive behind the crime called
HACKERS:
Curiosity and/or desire to learn.
Gang mentality.
Psychological needs.
Misguided trust in other
individuals.
Destructive mindset.
Revenge and malicious reasons.
Types of Cyber Crime
Child pornography- Aggression of pedophiles. Sexual harrasement.
How do they operate- False identity. Connecting in various chat
rooms. Interacting with other
children.
Types of Cyber Crime (Cont...)
DENIAL OF SERVICE ATTACKS- Filling e-mail with spam mails. Derpriving from the original service. For
Example: The Ping of death and Tear Drop attacks.
COMPUTER VANDALISM- Destroying or damaging data rather than
stealing. Misusing a file for circulation.
Types of Cyber Crime (Cont...)
CYBER TERRORISM- DOS attacks. Hate websites or hate e-mails. Service network attacks.
SOFTWARE PIRACY- Illegal copying of genuine program. Counterfeiting and distribution of products.
Types of Cyber Crime (Cont...)
Phishing- Grabing one’s personal information to access.
Using unsolicited e-mails.
Vishing- Using social engineering and Voice Over IP.
Working out on Landline telephone service .
Types of Cyber Crime (Cont...)
Cyber Security-
Protection of sensitive information.
Prevention,detection and response to different online attacks.
Privacy Policy- Take a look before submitting anything for a site.
Keep Software Up to Date-
Installing device.
Using a valid password.
DISABLE REMOTE CONNECTIVITY-
Disabling features.
Disconnecting wireless technologies after using.
.
Use antivirus Software.
Insert Firewalls.
Uninstall unnecessary software.
Maintain backup.
Check security settings.
By exchanging information.
By building investigation capability.
By arranging regional working parties.
@
Act as a global region. Work with the law enforcing forces. Keep updated with the changing situation. Following Cyber ethics and rules.
http://www.slideshare.net/aemankhan/cybercrimeppt- 27376284
https://www.youtube.com/watch?v=C2MXuIDgGBc http://www.webcrawler.com/info.wbcrwl.net