Sei sulla pagina 1di 6

FOR TITLE PAGE: SLIDE 1 Good Morning respected teachers and my dear friends.

Today I would like to discuss about the cyber crime. as you people know that today world is facing so many problems in the cyber world like hacking of passwords as well as sites, email bombing, attacks of viruses and many more. Thats way I am going to give my presentation on cyber crime where I would talk all about cyber crime and also how can we protect ourselves from these problems. FOR INTRODUCTION PART: SLIDE 2 So lets get started first from introduction of cyber crime. To understand cyber crime it will good to understand the term cyber and crime separately. Cyber is a prefix used in growing number of terms to describe new things that are being made possible by the spread of computers and crime is the breach of rules or laws for which governing authority can ultimately prescribe conviction. so we can say that cyber crime is a Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs. In short, Cybercrime is nothing but where the computer is used as an object or subject of crime. FOR HISTORY PART: SLIDE 3 The history part is very interesting because most of us dont know about the name of first virus and where it was first installed and all of you will wonder that it was built by a 15 year old kid. Yes, The first computer boot virus was built by a 15 year old kid named Rich Skrenta in 1982 for Apple II computers. Called Elk Cloner. It would activate whenever a floppy disk was booted on a computer, install itself on the computer, and

then infect other disks used later. Since viruses were not yet known and there were no antivirus, it spread around the country. The first spam email took place in 1978. It was sent by Gary Thuerk to 393 recipients on ARPANET. It was a message advertising the availability of a new model of Digital Equipment Corporation computers. Rather than send a separate message to each person, which was the standard practice at the time, he had an assistant write a single mass e-mail. CYBER CRIMINALS: SLIDE 4 Cyber Criminals are those who are doing crimes by using the computer as a target or an object. The categories of cyber criminals are i. Children and adolescent between the age group of 6 18 years The reason is that children is seen mostly due to the asking too many questions and trying to find out about what other people are doing and they are very interested in learning about many different things ii. Dissatisfied employees This group include those people who have been either sacked by their employer or are dissatisfied with their employer. iii. Professional hackers These kinds of hackers are mostly employed to hack the site of the rivals and get credible, reliable and valuable information. iv. Organized hackers

These kinds of hackers are mostly organised together to fulfil certain objective. The reason may be to fulfil their political bias, fundamentalism, etc.

CATEGORIES OF CYBER CRIME: SLIDE 5 The Cyber crimes are categorized as the following 1. Cyber crimes against persons 2. Cyber crimes against Individual Property 3. Cyber crimes against government The following are the crimes, which can be committed against above groups :1. Harassment via e-mails2. Cyber-stalking 3. Defamation 4. Computer vandalism 5. Cyber terrorism against the government organization 6. Trafficking 7. Fraud & Cheating

TYPES OF CYBER CRIME: SLIDE 6

I.

Child Pornography: The use of computer networks to create, distribute, or access materials that sexually use underage children.

II.

Denial of Service: Floods the bandwidth of the victims network or fills his e-mail box with spam mail.

III.

Software Piracy: The illegal copying of genuine programs and distribution of products intended to pass for the original.

iv.

Cyber Stalking: Threats that creates fear through the use of computer technology such as email, phones, text messages, webcams, websites or videos.

v.

Spoofing: The illegal intrusion, posing as a genuine user, a hacker logs-in to a computer illegally using a different identity than his own.

PROTECTING YOUR PRIVACY: SLIDE 7 Privacy policy : Before submitting your name, email address, or other personal information on a web site, look for the site's privacy policy. Evidence that your information is being encrypted : To protect attackers from hijacking your information, any personal information submitted online should be encrypted. Many sites use SSL or secure sockets layer, to encrypt information.

PREVENTIVE MEASURES: SLIDE 8 Keep software up to date: If the seller releases patches for the software operating your device, install them as soon as possible. Installing them will prevent attackers from being able to take advantage. Use good passwords:

Select passwords that will be difficult for thieves to guess. Do not choose options that allow your computer to remember your passwords. Disable remote connectivity: Some phones are equipped with wireless technologies, such as Bluetooth, You should disable these features when they are not in use. CONCLUSION:SLIDE 10 Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily. In fact, it is highly likely that cybercrime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security.