100% found this document useful (1 vote)
68 views19 pages

Cyber Security & Cyber Crimes

Cyber crimes are illegal activities carried out using computers or the internet. The document discusses various types of cyber crimes including those against individuals, property, and government. Cyber crimes against individuals include identity theft, harassment, impersonation, and privacy violations. Crimes against property include credit card fraud, intellectual property theft, and internet time theft. Attacks against government include cyber terrorism, website defacement, and attacks on e-governance websites. The document provides examples of each type of cyber crime.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
68 views19 pages

Cyber Security & Cyber Crimes

Cyber crimes are illegal activities carried out using computers or the internet. The document discusses various types of cyber crimes including those against individuals, property, and government. Cyber crimes against individuals include identity theft, harassment, impersonation, and privacy violations. Crimes against property include credit card fraud, intellectual property theft, and internet time theft. Attacks against government include cyber terrorism, website defacement, and attacks on e-governance websites. The document provides examples of each type of cyber crime.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

CYBER SECURITY

&
CYBER CRIMES
CYBER SPACE
• Cyber space is a virtual environment created by computer

systems connected to the


Internet. It is the term used to refer to a simulated world, where
we can do many things at one place
Cyberspace is an unreal world in which communication
over computer networks occurs. It is an information
superhighway where individuals gather information,
interact, exchange ideas, provide social support, conduct
business, play games, engage in discussions and so on
• Cyberspace is a space where social interactions dominate.

Some people consider cyberspace as an uncontrolled and


unregulated electronic space where anyone is free
to do anything as they wish and express themselves freely.

• Such acts of people affect or negatively influence many

others. Hence, when an individual works on the Internet,


they have to follow some rules and ethics which are
beneficial to all users.
• This unregulated space also provides room for

criminals. Since activities like communication, financial


transactions, etc. in the cyberspace increase day by
day, it has opened a new medium for criminal
activities. Today cyberspace security has
become a serious concern.
CYBER CRIMES
We know that the Internet has opened new opportunities in entertainment, business

communication education, sports, etc. At the same time, it is a reality that some

people use the Internet for committing illegal activities

The increasing use of the Internet through smart phones and tablets for online

banking and other financial transactions has increased the risk. Rising Internet

penetration and online banking provides opportunities for cyber criminals to target

online financial transactions, using malicious software(malware) or through illegal

hacking
TITLE AND CONTENT LAYOUT WITH CHART
Cyber crime
Cyber crime against Cyber crime
against
individuals against property
government

Credit card Cyber


Identity theft
fraud terrorism

Intellectual Website
Harassment
property Theft defacement

Impersonatio Attack against


Internet time
n and e-governance
theft
cheating website

Violation of
privacy
A. CYBER CRIMES AGAINST INDIVIDUALS

The popularity of broadband Internet increased the dependence


of Internet for daily activities. This increased the risk of online
crimes. An act of a person in cyberspace that causes physical or
mental trouble to an individual is referred to as cyber crime
Harassment, assuming someone's identity, impersonation and
violation of privacy are
some examples of cyber crimes.
I. IDENTITY THEFT : Identity theft occurs when someone uses
another person's identifying information, like their name,
credit card number, etc. without their permission to commit
fraud or other crimes. It is a form of stealing a person's
identity, by which someone pretends to be someone else, to
gain access to resources like bank account, social media
accounts, etc. This is done with intention of transferring
money from the victim's bank account, payments for
purchases, defaming the person through social media, etc
ii. HARASSMENT: Posting humiliating comments focusing on gender, race,

religion nationality at specific individuals in chat rooms, social media, e-mail,

etc. is harassment. The use of vulgar or indecent language, threatening any

illegal or immoral act through a computer or a computer network is

considered as harassment. The use of the Internet, to harass someone is

called cyber stalking. You might have read about statements from celebrities

that the Facebook accounts in their names are fake. This is because such

accounts may contain pictures or posts with defaming content. These

profiles might be created using the photographs and personal information of

the celebrity by people with criminal intentions. There are people who

defame others by sending humiliating e-mails, Facebook posts, etc


iii. IMPERSONATION AND CHEATING: Impersonation is an
act of pretending to be another person for the purpose of
harming the victim. There are people who utilise the
anonymity of the Internet to commit impersonation online
Sometimes we may receive e-mails seeking help for
transferring large amounts of money from a distant country
to India. Usually, the sender states that this money is in the
form of an asset (land, gold, etc.) that is to be sold.
iv. VIOLATION OF PRIVACY: Violation of privacy is the intrusion into the

personal life of another, without a valid reason. This gives the person

whose privacy has been invaded, the right to file a lawsuit for damages

against the person/organisation that intruded. It consists of distributing

private information like personal data, photography, workplace

monitoring videos, etc.

You might have heard of issues regarding the use of hidden cameras,

mobile cameras etc, to capture images of women in public places.

Photography of any person (men or women) without his/her permission

amounts to violation of privacy. Posting images of others in social media,

transferring them to others through e-mail/copying,


B . CYBER CRIME AGAINST PROPERTY

Cyber crimes against all forms of property like credit cards,


intellectual property, etc. are termed as cyber crime
against property. These crime includes hacking, piracy,
computer vandalism (destruction of others property),
unauthorised intrusion through cyberspace, unauthorised
possession of information stored in computers, etc. Some
classifications of cyber crimes against property are givens
I. CREDIT CARD FRAUD: Credit card fraud involves an

unauthorised usage of another person's credit card information

for the purpose of payments for purchases or transferring funds

from it. There are instances where the web servers of

organisations are hacked and credit card information of a large

number of people is stolen by Internet thieves. They use this

information to make payments or they sell this information to

other fraudsters over Internet for a small price large


• II. INTELLECTUAL PROPERTY THEFT: The infringement of

IPRs come under this category Violation of copyright,


patent, trademark, etc. are intrusions against property
Recently an Indian IT company developed software for
correcting errors in program code One of the employees of
this company copied this software in a CD and tried to sell
it to competitor for a big price. This led to huge financial
and property loss to the company. This is considered as
theft of intellectual property
• III INTERNET TIME THEFT: Today almost all modems/routers

have wireless Internet facility. They provide sharing of


Internet at homes, schools, business establishments etc. If
this is not properly secured using passwords, other people
may use our Internet.
The usage of the Internet time by unauthorised persons,
without the permission of the person who pays for it is called
Internet time theft. This leads to loss of Internet time and
money
C. CYBER CRIMES AGAINST GOVERNMENT

Increasing popularity of e-governance has made


governments vulnerable to cyber attacks. The various
governmental computer networks and websites are
vulnerable to risks and threats of cyber crimes. The
different categories of cyber attacks against
government
• I. CYBER TERRORISM: Cyber terrorism is a cyber attack against sensitive

computer networks like nuclear power plants, air traffic controls, gas line
controls, telecom, etc. These types of attacks against governments are
increasing globally. Cyber terrorism focuses on the use of the Internet by anti
nationals
to affect a nation's economic and technological infrastructure.
In 2010 a computer virus called tuxnet was used to carry out an invisible
attack on Iran's secret nuclear programme. This virus was aimed at disabling
Iran's Uranium enrichment programme. This virus infected a large number of
nuclear controls and gave false instructions leading to nuclear malfunctions
and break down.
Cyber terrorism may prove to be very costly to a country. Therefore
governments provide very powerful security mechanisms for their servers.
II. WEBSITE DEFACEMENT: This is a common cyber attack against
a government. Defacement of websites includes hacking of
government websites and posting
rogatory comments about a government in those websites.

III. ATTACKAGAINST E-GOVERNANCE WEBSITES: These types of


attacks deny a particular online government service. This is done
using a Distributed Denial of Service(DDoS) In another case the
website may be hacked and controlled by the hackers. They gain
access to website administration through content management
system and destroy the data. This causes huge loss to the
government.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy