Académique Documents
Professionnel Documents
Culture Documents
|
|
:
:
Prof.Bhavna Sharma Manish Kaushal
Rashmi Thakur
Roopal Tyagi
Abhijeet Pathak
2
All crimes preformed or resorted to by
abuse of electronic media or otherwise,
with the purpose of influencing the
functioning of computer or computer
system.
Anonymity
Computer¶s storage capacity.
Weakness in operating
system.
Lack of awareness of user.
`
Racking
enial of service attack.
Virus dissemination.
Software piracy.
Pornography.
IRC crime.
Credit card fraud.
Phishing.
Spoofing.
|
Net extortion.
Cyber stalking.
Cyber defamation.
Salami attack.
Threatening.
Racking is a simple term means illegal
intrusion into a computer system without
the permission of the owner/user.
2] Virus dissemination
Malicious software that attaches itself to
other software.
(virus, worms, trojan horse, logic bomb,
etc«)
6
This is an act by the criminal, who
floods the bandwidth of the victim¶s
network of fills his e-
e-mail box with
spam mail depriving him of the
services he is entitled to access or
provide.
!
Theft of software through the illegal
copying of genuine programs.
Retail revenue losses worldwide are
ever increasing due to this crime.
Can be done in various ways like-
like-
hard disk loading, illegal downloads
from the internet, etc..
- @
Pornography is first successful e-
e-
commerce product.
Anybody including children can log
on to the internet and access
websites with pornographic contents
with a click of a mouse.
Publishing any material in electronic
form which is lascivious is offence
under the provision of section 67 I.T.
Act--2000.
Act
ÿ ||
Internet Relay Chat (IRC) servers have
chat rooms wherein people from any part
of the world can come together and chat
with each other.
Rackers use it for discussing their
techniques.
Cyber stalking-
stalking- in order to harass a
woman her telephone no. is given to
others if she wants to have a boyfriends.
Paeodohiles use chat rooms to allure small
children.
D |""
"
We simply have to type credit card
no. into www page of the vendor for
online transactions.
If electronic transaction are not
secured then the credit cards no. can
be stolen by the hackers who can
misuse the card.
è #$
Copying the company¶s confidential data
in order to extort company for huge
amount.
9] Phishing
It is the technique of pulling out
confidential information from the bank or
financial institutional account holder by
deceptive means.
|%&2
o CYBER LAW IS A SYSTEM OF
REULATIONS FOR TRE ELECTRONIC
USSAE OF TRE INTERNET.
o SIMPLY SPEAKIN ELECTRONIC
CYBER LAW IS A ENERIC TERM
WRICR REFERS TO ALL LEAL &
REULATORY ASPECTS OF TRE
INTERNET , WORLS TRANSACTION
SYSTEM & ELECTRONIC COMMERCE
`#'(%|`'#|
|%&2
UE TO ANONYMOUS MATURE OF
TRE INTERNET, IT IS POSSIBLE TO
ENAE INTO A VARIETY OF
CRIMINAL ACTIVITIES ROSSLY
MISUSIN TRIS ASPECT OF TRE
INTERNET TO PERPETUATE CRIME
ECSPECIALLY IN E-
E-COMMERCE,
SPAM & MONEY TRANSACTION
USIN TRE ONLINE BANKIN
SERVICES.
|
6] enial of services
These gives hacker to bring down the
network without gaining internet access.
These attacks from multiple sources. It is
difficult to block because it uses multiple,
changing, source IP addresses.
D & +,""
Anarchists are people who just break
stuff. They usually exploit the any
target of opportunity.
Crackers are professional who break
passwords and develop Trojan
horses.
Kiddies are not real hackers. They
are ³wanna-
³wanna-be´ hackers.