SlideShare a Scribd company logo
Cyber Security
Unit 1 contents
• Introduction
• Cybercrime
• Information security
• Who are cyber criminals
• Classification of cyber crimes
• Cybercrime and the Indian ITA 2000
• A Global perspective on Cybercrimes
CYBER CRIME
• Cybercrime is any criminal activity that involves a computer, internet, cyber
space and world wide web.
• A crime committed using a computer and the internet to steal a person
Identity
• Alternative definitions
• Any illegal act where a special knowledge of computer technology is essential
for its perpetration investigation or prosecution
• Any traditional crime that has acquired a new dimension or order of
magnitude through the aid of computer and abuses that have come into being
used of computers
• Any financial dishonesty that takes place in computer environment
• Any threats to the computer itself such as theft of hardware or software
sabotage and demands for random
• Cyber crime is an illegal behaviour directed by means of electronic
operations that target the security of computer systems and data
process by them
• cyber crime may sometimes be used interchangeably to describe
crimes committed using computers such as computer related crime
,computer crime ,Internet crime ,Hitech crime etc
• Crimes completed either on or with a computer
• Any illegal activity done through the internet or on the computer
• All criminal activities done using the medium of computers the
internet cyberspace and www
• Cyber crime refers to the act of performing a criminal act using
cyberspace as a communication vehicle
• some people argue that cyber crime is not a crime as it is a crime
against software and not against a person or property
• however while the legal systems Around The World scramble to
introduce laws to combat cyber criminals
cs computer notes of studies in education
cs computer notes of studies in education
• Techno Crime- is defined as “a predetermined act against a system or
systems, with the intent to copy, steal, prevent access, corrupt or
otherwise deface or damage parts of or the complete computer system.”
• Techno-vandalism is defined as “the act of brainless defacement of
websites and/or other activities, such as copying of files and publicizing
their contents publicly, are usually opportunistic in nature.
Cyber terrorism
• The term cybercrime is notorious as it is attached to the word terrorism or
terrorist, i.e., cyber terrorism.
• Cyber terrorism is defined as “any person, group or organization who, with
terrorist intent, utilizes access or aids in accessing a computer or computer
network or electronic system or device by any available means, and
thereby knowingly engages in or attempts to engage in a terrorist act
commits the offence of cyber terrorism.
• In India and rest of the world, cyber terrorists generally use computer
as a tool, target, or both for their criminal activities to gain
unauthorized access to sensitive information which may lead to heavy
loss or damage to the owner of that information.
• Cyber criminals use methods like phishing, spoofing, pharming etc
for gaining access to the sensitive information.
• Real-world Crimes vs. Cyber Crimes
• Cybercrimes are easier to carry out when compared to real-world
crimes. Some of the differences between cybercrimes and real-world
crimes are as given below:
Cyber Space
• Cyberspace is “a network of computer networks or devices that uses
the TCP/IP for communication to facilitate transmission and exchange
of data.”
• Cyber squatting refers to the practice of registering, trafficking, or
using a domain name with the intent of profiting from the goodwill of
someone else's trademark. This unethical practice can lead to
confusion among consumers and harm the reputation of legitimate
businesses. It is important for individuals and organizations to protect
their trademarks and intellectual property rights to prevent cyber
squatting.
• Cyberpunk is a science fiction genre in which the future world is portrayed as
one in which society is largely controlled by computers, at the expense of daily
life and social order. Literature, movies and video games of this genre point to
a fear that the world may eventually be run solely by computers, including
unusual scenarios where nonliving forms take on life-like actions and
capabilities. Rebellion against large corporations and established organizations
is a key aspect of cyberpunk. As such, main characters are often portrayed as
alienated and marginalized by society.
• Cyber warfare refers to the use of digital tactics and technologies to launch
attacks on computer systems, networks, and infrastructure with the intent
of causing disruption, damage, or espionage. These attacks can target
government agencies, military organizations, critical infrastructure,
businesses, or individuals. Cyber warfare can involve a range of tactics,
including malware deployment, denial-of-service attacks, data breaches, and
information manipulation. It is a growing concern in the realm of national
security and requires constant vigilance and preparedness to defend against
potential cyber threats
CYBER CRIME and INFORMATION SECURITY
• Cyber security means protecting information equipment devices
computer resources communication device and information stored
there in from unauthorised Axis use disclosure disruption
modification or destruction the term incorporates both physical
security of the devices as well as information Store there covers
protection from unauthorised and axis use disclosure description
modification and destruction
who are cyber criminals
• Cyber crime involves such activities as credit card fraud, cyber
stacking ,D faming another online gaining and authorized access to
computers ignoring copyright software licensing and Trademark
protection, overriding encryption to make illegal copies software
piracy and stealing others identity to perform criminal acts cyber
criminals are those who conduct such as they can be categorized into
3 groups that reflect their motivation
• Type 1 cyber criminals hungry for recognition
• Hobby hackers
• IT professionals
• Terrorist organizations
• Politically motivated hackers
• Type 2 cyber criminals not interested in recognition
• Psychological permits
• Financially motivated hackers
• State sponsored hacking
• Organized criminals
• Type 3 cyber criminals the Insider
• Disgruntled or former employees seeking revenge
• Competing companies using employees to gain economic advantage through
damage or depth
• The typical motives behind cyber crimes are to be greed , desire to
gain power or publicity ,desired For Revenge , a sense of adventure
looking for thrill to access Forbidden information ,destructive mindset
and desire to sell network security services
• Cyber caves are known to play role in committing Cyber crimes
Classification of Cyber Crimes
• 1. Cyber crime against individual
• Electronic mail spoofing and other online fraud
• Phishing
• Spamming
• Cyber defamation
• Cyber stalking and harassment
• Computer sabotage
• Password sniffing
• 2. Cyber crime against property
• Credit card fraud
• Intellectual property crimes
• Internet time theft
• 3. Cyber crime against society
• Forgery
• Cyber terrorism
• Web jacking
• 4. Crimes and imiting from use net news groups
• 5. Cyber crime against organisation
• Unauthorised accessing of computer
• Password sniffing
• Denial of service attacks
• Virus attack/ dissemination of viruses
• Email bombing/ mail bomb
• Logic bomb
• Salami attack/ salami technique
• Trojan horse
• Data diddling
• Crimes imaginating from usenet news group
• Industrial spying/ industrial esponage
• Computer network intrusion
• Software piracy
cs computer notes of studies in education

More Related Content

PDF
Module 1 Introduction to cryptography...
PPTX
Cyber security for engg students and diploma
PPTX
Cyber Criminal and Cyber Security
PPTX
Introduction to computer forensic in IT World
PPTX
Cyber Crime
PPTX
Cyber security.pptxelectronic systems, networks, and data from malicious
PPTX
Introduction to cyber security presentation
PPTX
Introduction to cyber security presentation
Module 1 Introduction to cryptography...
Cyber security for engg students and diploma
Cyber Criminal and Cyber Security
Introduction to computer forensic in IT World
Cyber Crime
Cyber security.pptxelectronic systems, networks, and data from malicious
Introduction to cyber security presentation
Introduction to cyber security presentation

Similar to cs computer notes of studies in education (20)

PPTX
Introduction to Cyber security presentation
PPTX
Introduction to cyber security presentation
PPTX
Unit one of cybersecurity for first year students
PPTX
Presentation_on_cybersecurity_AKTU_UP.pptx
PPT
Cyber security 22-07-29=013
PPTX
Cyber crime and issues
PPTX
Cyber crime ppt
PDF
Cybercrimeppt 160421074211
PPTX
Cyber Crime
PPTX
Cyber Security PPT and how to be aware from hackers
PPTX
Cyber crimes and its security
PPTX
Cyber crimes and its security
PPTX
Cyber crime perspective, definition types, various forms of cyber crime
PPTX
Cyber crime-140128140443-phpapp02 (1)
PPTX
Cyber Crime
PPTX
Introduction to cybercrime
PPTX
Cyber Criminals,Classifications of Cybercrimes aat.pptx
PPTX
Cyber Crime
PPT
Cyber Security and Cyber Awareness
PPT
CYBER CRIME AND RETATED CONCEPTS PPT (sharmistha Bandyopadhyay, LL.M 4th Sem)...
Introduction to Cyber security presentation
Introduction to cyber security presentation
Unit one of cybersecurity for first year students
Presentation_on_cybersecurity_AKTU_UP.pptx
Cyber security 22-07-29=013
Cyber crime and issues
Cyber crime ppt
Cybercrimeppt 160421074211
Cyber Crime
Cyber Security PPT and how to be aware from hackers
Cyber crimes and its security
Cyber crimes and its security
Cyber crime perspective, definition types, various forms of cyber crime
Cyber crime-140128140443-phpapp02 (1)
Cyber Crime
Introduction to cybercrime
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Crime
Cyber Security and Cyber Awareness
CYBER CRIME AND RETATED CONCEPTS PPT (sharmistha Bandyopadhyay, LL.M 4th Sem)...
Ad

Recently uploaded (20)

PPTX
Nervous_System_Drugs_PPT.pptxXXXXXXXXXXXXXXXXX
PPTX
The Stock at arrangement the stock and product.pptx
PPTX
Sports and Dance -lesson 3 powerpoint presentation
PDF
Understanding the Rhetorical Situation Presentation in Blue Orange Muted Il_2...
PPTX
internship presentation of bsnl in colllege
PPTX
OnePlus 13R – ⚡ All-Rounder King Performance: Snapdragon 8 Gen 3 – same as iQ...
PPT
BCH3201 (Enzymes and biocatalysis)-JEB (1).ppt
PPTX
1751884730-Visual Basic -Unitj CS B.pptx
PPTX
Definition and Relation of Food Science( Lecture1).pptx
PPTX
ESD MODULE-5hdbdhbdbdbdbbdbdbbdndbdbdbdbbdbd
DOCX
How to Become a Criminal Profiler or Behavioural Analyst.docx
PPTX
E-Commerce____Intermediate_Presentation.pptx
PPTX
cse couse aefrfrqewrbqwrgbqgvq2w3vqbvq23rbgw3rnw345
PDF
Biography of Mohammad Anamul Haque Nayan
PDF
313302 DBMS UNIT 1 PPT for diploma Computer Eng Unit 2
PDF
Manager Resume for R, CL & Applying Online.pdf
PPTX
Overview Planner of Soft Skills in a single ppt
PPTX
Job-opportunities lecture about it skills
PDF
esg-supply-chain-webinar-nov2018hkhkkh.pdf
PPTX
OCCULAR MANIFESTATIONS IN LEPROSY.pptx bbb
Nervous_System_Drugs_PPT.pptxXXXXXXXXXXXXXXXXX
The Stock at arrangement the stock and product.pptx
Sports and Dance -lesson 3 powerpoint presentation
Understanding the Rhetorical Situation Presentation in Blue Orange Muted Il_2...
internship presentation of bsnl in colllege
OnePlus 13R – ⚡ All-Rounder King Performance: Snapdragon 8 Gen 3 – same as iQ...
BCH3201 (Enzymes and biocatalysis)-JEB (1).ppt
1751884730-Visual Basic -Unitj CS B.pptx
Definition and Relation of Food Science( Lecture1).pptx
ESD MODULE-5hdbdhbdbdbdbbdbdbbdndbdbdbdbbdbd
How to Become a Criminal Profiler or Behavioural Analyst.docx
E-Commerce____Intermediate_Presentation.pptx
cse couse aefrfrqewrbqwrgbqgvq2w3vqbvq23rbgw3rnw345
Biography of Mohammad Anamul Haque Nayan
313302 DBMS UNIT 1 PPT for diploma Computer Eng Unit 2
Manager Resume for R, CL & Applying Online.pdf
Overview Planner of Soft Skills in a single ppt
Job-opportunities lecture about it skills
esg-supply-chain-webinar-nov2018hkhkkh.pdf
OCCULAR MANIFESTATIONS IN LEPROSY.pptx bbb
Ad

cs computer notes of studies in education

  • 2. Unit 1 contents • Introduction • Cybercrime • Information security • Who are cyber criminals • Classification of cyber crimes • Cybercrime and the Indian ITA 2000 • A Global perspective on Cybercrimes
  • 3. CYBER CRIME • Cybercrime is any criminal activity that involves a computer, internet, cyber space and world wide web. • A crime committed using a computer and the internet to steal a person Identity • Alternative definitions • Any illegal act where a special knowledge of computer technology is essential for its perpetration investigation or prosecution • Any traditional crime that has acquired a new dimension or order of magnitude through the aid of computer and abuses that have come into being used of computers • Any financial dishonesty that takes place in computer environment • Any threats to the computer itself such as theft of hardware or software sabotage and demands for random
  • 4. • Cyber crime is an illegal behaviour directed by means of electronic operations that target the security of computer systems and data process by them • cyber crime may sometimes be used interchangeably to describe crimes committed using computers such as computer related crime ,computer crime ,Internet crime ,Hitech crime etc • Crimes completed either on or with a computer • Any illegal activity done through the internet or on the computer • All criminal activities done using the medium of computers the internet cyberspace and www
  • 5. • Cyber crime refers to the act of performing a criminal act using cyberspace as a communication vehicle • some people argue that cyber crime is not a crime as it is a crime against software and not against a person or property • however while the legal systems Around The World scramble to introduce laws to combat cyber criminals
  • 8. • Techno Crime- is defined as “a predetermined act against a system or systems, with the intent to copy, steal, prevent access, corrupt or otherwise deface or damage parts of or the complete computer system.” • Techno-vandalism is defined as “the act of brainless defacement of websites and/or other activities, such as copying of files and publicizing their contents publicly, are usually opportunistic in nature. Cyber terrorism • The term cybercrime is notorious as it is attached to the word terrorism or terrorist, i.e., cyber terrorism. • Cyber terrorism is defined as “any person, group or organization who, with terrorist intent, utilizes access or aids in accessing a computer or computer network or electronic system or device by any available means, and thereby knowingly engages in or attempts to engage in a terrorist act commits the offence of cyber terrorism.
  • 9. • In India and rest of the world, cyber terrorists generally use computer as a tool, target, or both for their criminal activities to gain unauthorized access to sensitive information which may lead to heavy loss or damage to the owner of that information. • Cyber criminals use methods like phishing, spoofing, pharming etc for gaining access to the sensitive information.
  • 10. • Real-world Crimes vs. Cyber Crimes • Cybercrimes are easier to carry out when compared to real-world crimes. Some of the differences between cybercrimes and real-world crimes are as given below:
  • 11. Cyber Space • Cyberspace is “a network of computer networks or devices that uses the TCP/IP for communication to facilitate transmission and exchange of data.” • Cyber squatting refers to the practice of registering, trafficking, or using a domain name with the intent of profiting from the goodwill of someone else's trademark. This unethical practice can lead to confusion among consumers and harm the reputation of legitimate businesses. It is important for individuals and organizations to protect their trademarks and intellectual property rights to prevent cyber squatting.
  • 12. • Cyberpunk is a science fiction genre in which the future world is portrayed as one in which society is largely controlled by computers, at the expense of daily life and social order. Literature, movies and video games of this genre point to a fear that the world may eventually be run solely by computers, including unusual scenarios where nonliving forms take on life-like actions and capabilities. Rebellion against large corporations and established organizations is a key aspect of cyberpunk. As such, main characters are often portrayed as alienated and marginalized by society. • Cyber warfare refers to the use of digital tactics and technologies to launch attacks on computer systems, networks, and infrastructure with the intent of causing disruption, damage, or espionage. These attacks can target government agencies, military organizations, critical infrastructure, businesses, or individuals. Cyber warfare can involve a range of tactics, including malware deployment, denial-of-service attacks, data breaches, and information manipulation. It is a growing concern in the realm of national security and requires constant vigilance and preparedness to defend against potential cyber threats
  • 13. CYBER CRIME and INFORMATION SECURITY • Cyber security means protecting information equipment devices computer resources communication device and information stored there in from unauthorised Axis use disclosure disruption modification or destruction the term incorporates both physical security of the devices as well as information Store there covers protection from unauthorised and axis use disclosure description modification and destruction
  • 14. who are cyber criminals • Cyber crime involves such activities as credit card fraud, cyber stacking ,D faming another online gaining and authorized access to computers ignoring copyright software licensing and Trademark protection, overriding encryption to make illegal copies software piracy and stealing others identity to perform criminal acts cyber criminals are those who conduct such as they can be categorized into 3 groups that reflect their motivation
  • 15. • Type 1 cyber criminals hungry for recognition • Hobby hackers • IT professionals • Terrorist organizations • Politically motivated hackers • Type 2 cyber criminals not interested in recognition • Psychological permits • Financially motivated hackers • State sponsored hacking • Organized criminals • Type 3 cyber criminals the Insider • Disgruntled or former employees seeking revenge • Competing companies using employees to gain economic advantage through damage or depth
  • 16. • The typical motives behind cyber crimes are to be greed , desire to gain power or publicity ,desired For Revenge , a sense of adventure looking for thrill to access Forbidden information ,destructive mindset and desire to sell network security services • Cyber caves are known to play role in committing Cyber crimes
  • 17. Classification of Cyber Crimes • 1. Cyber crime against individual • Electronic mail spoofing and other online fraud • Phishing • Spamming • Cyber defamation • Cyber stalking and harassment • Computer sabotage • Password sniffing
  • 18. • 2. Cyber crime against property • Credit card fraud • Intellectual property crimes • Internet time theft • 3. Cyber crime against society • Forgery • Cyber terrorism • Web jacking • 4. Crimes and imiting from use net news groups
  • 19. • 5. Cyber crime against organisation • Unauthorised accessing of computer • Password sniffing • Denial of service attacks • Virus attack/ dissemination of viruses • Email bombing/ mail bomb • Logic bomb • Salami attack/ salami technique • Trojan horse • Data diddling • Crimes imaginating from usenet news group • Industrial spying/ industrial esponage • Computer network intrusion • Software piracy