Vous êtes sur la page 1sur 11

The Internet Crime

manishkulhari@gmail.com

Overview

Internet crime
Types of Crime
Security features
Future

manishkulhari@gmail.com

Internet crime
Todays world of computer crime
,Hackeris a well known word.
Hackers are people who try to get access to
computer system illegally,usually from a
personal computer,via a data
communication network.
Some hackers invade websites with taunting
boasts and their own private jokes and
victims feel violated.
manishkulhari@gmail.com

Types of crime
The trojan horse: refers to illegal
instructions placed in the middle of a
legitimate program.
Zapping: able to bypass any security
system.
Bomb: A bomb causes a program to trigger
damage under certain conditions.
manishkulhari@gmail.com

Types of crime continued


Data diddling: Which means changing
data before or as it enter the system.
Piggy backing: When an illicit user
rides into the system on the back of
another user.
manishkulhari@gmail.com

Types of crime continued


Salami:Refers to small slices of money
that may be subtracted from large
financial system undetected.
Scavenging: The scavengers search the
trash cans and dumpsters for printouts
that contain information about credit card
numbers account number.
manishkulhari@gmail.com

Security Features
Forensics: Computer forensic means the
uncovering of computer stored information
suitable for use in illegal procedures.Forensic
experts work on tracing missing inventory or a
court ordered subpoena for E-mail messages
containing sexual harassment language

manishkulhari@gmail.com

Security Features continued


Security of software data and personal computers.
Safeguarding the system against such threats as
natural disaster, fire, accident, vandalism, theft,
destruction of data and hackers.
A person should have something recognizable to
the computer and which will give him or her
access to the computer room or locked
terminal.(badge, plastic card, key, token)
Now software can verify both scanned and online
signatures.
manishkulhari@gmail.com

Security Features continued


Bio-metric security systems are coming on . The
science measures an individuals body
characteristics, when you simply insert your finger
into an identification machine. Some systems use
the characteristics of the entire hand.
Another way is the identification of the voice
pattern or sometimes the identification is based on
the retina of the eye which is harder to duplicate
than a voice pattern.
manishkulhari@gmail.com

The Future
Employee damage will increase as the computer
literacy increases.
Financial crimes will increase.
The virus will bring down the internet without any
warning, unless any changes in the anti virus
protection is made. Worse viruses can be
expected.
The use of unix is not enough to secure the
internet, We need to have stronger authentication
and end to end encryption.
manishkulhari@gmail.com

The Future continued


People will begin to feel that internet is not
reliable.
Criminals will continue to grow and smart
criminals will remain hidden.
The future of challenging automated crimes wold
be packaged in a single computer program we
have to use high level automated security.

manishkulhari@gmail.com