Search PPTs

Friday, July 26, 2013

PPT On Cyber Crime

Presentation On Cyber Crime

Cyber Crime Presentation Transcript:
1.Cyber Crime

2.What is Cyber?
“Cyber” refers to imaginary space, which is created when the electronic devices communicate, like network of computers.

3.Cyber crime refers to anything done in the cyber space with a criminal intent.
These could be either the criminal activities in the conventional sense or could be activities, newly evolved with the growth of the new medium.
Cyber crime includes acts such as hacking, uploading obscene content on the Internet, sending obscene e-mails and hacking into a person's e-banking account to withdraw money.

4.Computer crime, or cybercrime, refers                        to any crime that involves a computer and a network, where the computers played an instrumental part in the commission of a crime.
The concept of cyber crime is not radically different from the concept of conventional crime. Both include conduct whether act or omission, which cause breach of rules of law and counterbalanced by the sanction of the state.

5.Reasons for Cyber Crime
Hart in his work “ The Concept of Law” has said ‘human beings are vulnerable so rule of law is required to protect them’. Applying this to the cyberspace we may say that computers are vulnerable so rule of law is required to protect and safeguard them against cyber crime. The reasons for the vulnerability of computers may be said to be:
a) Capacity to store data in comparatively small space-
The computer has unique characteristic of storing data                       in a very small space. This affords to remove or derive information either through physical or virtual medium makes it much more easier.

6.b) Easy to access-The problem encountered in guarding a computer system from unauthorized access is that, there is every                             possibility of breach not due to human error but due to              the complex technology. By secretly implanted logic bomb,                 key loggers that can steal access codes, advanced voice               recorders, retina imagers etc. that can fool biometric systems and                          bypass firewalls can be utilized to get past many a                    security system.

c) Complex-The computers work on operating systems and these operating systems in turn are composed of millions of codes. Human mind is fallible and it is not possible that there might not be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate into the computer system.

7.d) Negligence-Negligence is very closely connected with human conduct. It is therefore very                                  probable that while protecting the                                  computer system there might be any                               negligence, which in turn provides a                                 cyber criminal to gain access and                                   control over the computer system.

e) Loss of evidence-Loss of evidence is a very common & obvious problem as all the data are routinely destroyed. Further collection of data outside the territorial extent also paralyses this system of crime investigation.

8.Unauthorized access to computer systems or networks / Hacking.

Theft of information contained in electronic form.

Email bombing.

9.Data diddling-This kind of an attack involves altering raw data just before a computer processes it and then changing it back after the processing is completed.

10.This kind of crime is normally prevalent in the financial institutions or for purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed.

No comments:

Related Posts Plugin for WordPress, Blogger...

Blog Archive