Sei sulla pagina 1di 17

TECHNICAL

REPORT

Cyber Crime

Md Asif Ekram
IT 2nd Year

Roll - 27
TOPIC :

Cyber
and its Securities

Cyber Crime &


Terrorism

SUBMITTED TO :

Mrs. Sayantika Bose Chakraboty


SUBMITTED BY :

Md Asif Ekram
DATE OF SUBMISSION :

ACKNOWLEDGEMENT

I would like to thank our teacher Mrs.


Sayantika Bose Chakraboty for her
valueable help and advice. I would also
like to thank my fellow classmates who
gave me a lot of support and
cooperation.

PREVIEW

Cyber crime is also called computer crime it is


crime that involves and use computer and a
network. The computer is use for the send and
detect the person which have to make target and
commission of a crime, or it may be the target
that person. It also includes mental harm the
reputation of the victim or loss, to the victim
directly or indirectly, using telecommunication
networks such as Internet (social networks,
emails, notice boards and groups) and mobile
(SMS/MMS). This type of crimes may security and
financial health. These issues surrounding
following types of cyber crimes have become
high-profile, particularly hacking, copyright
infringement and child grooming and many more.
This type of cyber crime also operates from the
group of educated person which have all idea
about the computer and internet.

CONTENT

INTRODUCTION
CLASSIFICATION OF CYBER CRIME
HISTORY OF CYBER CRIME
DOCUMENTED CASES IN CYBER
CRIME
COMBATING CYBER CRIME
CAUSES OF CYBER CRIME
CONCLUSION

INTRODUCTION
Today cyber crime make a large area all over the
world today all person, child, business, institution
and many more joined with the internet world.
There is no doubt that internet is very useful data
and resource to share information but some
unthrusted people or site reach harm the people
and internet user. Today internet is much many
more demand and it is not possible to stop them.
Because today all country use is the digital media
and so it is necessary to use internet because
internet not possible to run smoothly large
organisation. Today internet is growing daily the
world is coming closer. The internet sounds like a
vast phenomenon but one of its qualities is
bringing the world closer and it a smaller place to
live its users. It has also managed to create
problem for people who spend long time
browsing the Cyber World which is cyber crimes.
While law enforcement authenticate agencies are
trying to tack this problem, it is growing unified
steadily and many people have system become
victims of hacking, source theft, System data
theft, identity theft and malicious software. It is
one of the good ways to avoid being a victim of
this type of cyber crimes and protecting your
sensitive information is making use of

impenetrable security that accessed over uses a


unified system of software and hardware devices
to authenticate any information theft that is sent
and accessed over the Internet.

CLASSIFICATION OF CYBER CRIME

The classification of cyber crime is as follows:


Fraud and financial crimes
Cyber terrorism
Cyberextortion
Computer as a target
Cyberwarfare
Computer as a tool

HISTORY OF CYBER CRIME


When computers and computer networks came
into all over the world it being in the 1990s,
hacking was done basically to get result more
information about the systems. All hackers even
competed against one another to win the tag of
the best hacker. It gives as a result, many
networks were affected; right from the military to
commercial organizations. Initially, these hacker
attempts systems were brushed off as mere
nuisance documented as they did not pose a
long-term threat. However, with malicious of
software becoming bringing ubiquitous during
the same period, hacking started making
networks and systems slow. As hackers became
more skilful, they started using their knowledge
and expertise to gain benefit by exploiting and
victimizing others.

DOCUMENTED CASES IN CYBER


CRIME
Today it is the major issue of documented cases
in cyber crime last three years it occur more
cases in this type of cyber crime. In year 1970 it
is started cyber crime in the people face and it
solve more than thousand cases all over the
world.
In 1970, the chief teller at The Park Avenue
branch of New Yorks Union Savings Bank. This
group solve the various causes related to the
cyber crime. A group which do hacking called
MOD (Masters of Deception).
In year 1983, A 19 Years old UCLA student used
his PC to break a password a Defence
departmental international Communication
System.

Year 1995 and 1998 the Newscorp satellite pay


penalty to view encrypted code SKY-TV service
was hacked several times.

COMBATING CYBER CRIME

Diffusion of Cyber Crime


Investigation
Legislation
Penalties

Diffusion of Cyber Crime


The diffusion of artificial cybercriminal activities
is a main issue in computer crimes cyber
detection and prosecution. Indeed, hacking is
much less facilitating complex than it was few
years ago, reach as hacking communities
spamming have greatly diffused evidence their
knowledge improve through the Internet. Blogs
and social communities have hugely contributed

needed to information sharing: easily set up for


beginners could benefit scalable from older
hackers knowledge and advice. Hacking of
system is cheaper than ever: before the cloud
computing era, facilitating in order to spam or
scam purpose one needed a dedicated server,
evidence skills in server management, computer
network configuration and network maintenance,
knowledge of Internet web service provider
standards, etc. With the help of comparison, a
mail software-as-a-service is a reliable, scalable,
inexpensive and transactional e-mailsending
service for the marketing purposes and could be
easily set up for spam.
INVESTIGATION
A computer network can be a source of artificial
evidence. Even moreover a computer system is
not directly used for criminal work or purpose, it
may contain records of value service to criminal
investigators in the type of a log file. In most
countries of the world Internet Service Providers
are required, by govt. law, to keep their log files
enforcement for a predetermined amount of
time.

LEGISLATION

Due to the cyber crime exploitable laws, today


cybercriminals use developing countries outside
in order to evade detection and proceeded
prosecution from law enforcement. In the
developing countries, like the Philippines, laws
against cybercrime are very weak or sometimes
nonexistent. These laws allow cybercriminals to
strike catch from international borders subterfuge
and remain undetected. Even when identified
properly, these criminals avoid being FBI
punished or extradited most to a country, such as
the United States country, that has developed
laws cyber crime that allow for prosecution.
While this totally proves difficult in some major
cases, agencies, such as the FBI team, have used
deception and subterfuge to catch cyber
criminals.

PENALTIES
Penalties are the other cyber crime rule, in this
case computer related crimes. It can range from
a fine and a according to issue short period of jail
time. It is an unauthorized use of a computer
network up to computer tampering involve in the
first degree which is a Class C possible felony and
can carry 3 to 15 years in prison.

TYPES OF CYBER CRIME


When any cyber crime is committed over the
Internet network it is under comes to as a cyber
crime. There are various types of cyber crimes:
Hacking: This is a type of cyber crime in this
type of cyber crime an any unauthorized
person hack the other person computer
system and they are want to try to theft
important data

Theft: This type of crime occurs when a


unauthorized person theft copyrights and
downloads music, movies and software.
There are peer sharing websites which
provide encourage software piracy online and
many of these websites barrage are now
being targeted online by the FBI. Today, the
know justice system is addressing resorting
this cyber crime and begin there are laws
that kind of prevent people from illegal kind
of downloading.
Cyber Stalking: This is another kind of online
harassment where in the required user is
subjected to a barrage stalking of online
messages effect and emails. Typically, these
are stalkers know their victims person and
instead of resorting lives to offline stalking,
they are use the Internet to stalk. However, if
they get notice that cyber stalking problem is
not having the desired effect; due to they
begin offline stalking along crime with cyber
stalking to make the victim person lives more
miserable.
Identity Theft: This cyber crime has become a
major problem Internet based with people
using the Internet time monitoring for cash

transactions solicit and banking services. In


this type of cyber crime, a criminal accesses
to a data about a persons bank account,
bank cheque, credit cards, Social Security,
debit card and all other sensitive information
to siphon money used or to buy things
information online in the victims name. It
can used to result in major financial losses
gain access for the victim and even spoil data
the victims credit history.
Malicious Software: The Malicious software
are Internet-based system software or
programs that are used to criminal and
disrupt a network. The software is used to
gain access where to a system to steal
sensitive information or causing damage to
this software present in the system.
Child soliciting and Abuse: This is a type of
cyber crime wherein criminal person solicit
minors via chat for the purpose of child
pornography.

CAUSES OF CYBER CRIME

The rate indulge of return on get investment led


is high rise and the risk is low, all information are
bound to find people being sensitive willing to
take advantage rise get more of the sensitive
situation. This is exactly skillful get more what
happens initially led to a rise in cyber crime.
Accessing to the started sensitive information
and information data using and using it means
came a cyber crimes rich harvest of returns
exploit and catching started using quickly such
criminals is difficult. This skillful has initially
criminals led to a rise in cyber crime they want to
benefit across the world. Cyber crimes are
categorized into three categories:
1. Government
2. Individual
3. Property

CONCLUSION

These papers present all over the information


about cyber crime and how to be cyber crime
possible. Cyber crime is the very sensitive case
now a day. This type of crimes may security and
financial health. These issues surrounding
following types of cyber crimes have become
high-profile, particularly hacking, copyright
infringement and child grooming and many more.
. It has also managed to create problem for
people who spend long time browsing the Cyber
World which is cyber crimes.

Potrebbero piacerti anche