Cyber Crime and Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

CYBER CRIME AND SECURITY

Mohammad Hussain Roll no-150101116

Department Of Computer science, Sharda University

E-mail address- [email protected]

ABSTRACT
As we all know that Cybercrime has been one of the common practices made by the compu-
ter expert. In this paper I have mentioned some of the impact of the cybercrime. Cybercrime
is that activities made by the people for destroying organization network stealing others val-
uable data, documents, hacking bank account and transferring money to their own and so o-
n. My paper gives detailed information regarding cybercrime, its types, modes of cybercrime
and security measures including prevention to deal effectively with cybercrime...Finally I will
go for the research on the crime made by the misuse of cybercrime in some of the field and
areas like in Financial crimes, Cyber pornography, Online gambling, Intellectual Property cri-
mes, Forgery, Cyber Defamation, Cyber stalking, Email spoofing, Email bombing, Denial of S-
ervice attack, Salami attacks, Virus / worm attacks, Web jacking, Data diddling etc. and also
try to find which type of cybercrime is most practice in the world and finally I will get the
main objective of my term paper. Like this my term paper will be complete.

Keyword
Cyber crime, Hacking, Cyber Security, Technology, Computer, Piracy, Software.

1. INTRODUCTION
Cyber crimes are criminal offenses committed via the internet or otherwise aided by various
forms of computer technology such as the use of online social network to bully others or se-
nding sexually explicit digital photos with a smart phone.

2. HISTORY OF CYBER CRIME


Cybercrime first started with hackers trying to break into computer networks. Some did it j-
ust for the thrill of accessing high-level security networks, but others sought to gain sensiti-
ve, classified material. Eventually, criminals started to infect computer systems with compu-
ter viruses, which led to breakdowns on personal and business computers.
 The first recorded cyber crime took place in 1820.
 The first spam email took place in 1976 when it was sent out over the ARPANT.
 The first virus was instilled on an Apple computer in 1982 when a high school
student, Rich Skrenta , developed the EIK Cloner.

3. CATEGORIES OF CYBER CRIME

 The computer as a target:- Using a computer to attacks other computer. Eg-


Hacking , virus attacks.
 The computer as a weapon:- Using a computer to commit real world crime. Eg-
Cyber terrorism, pornography.

4. TYPES OF CYBER CRIME

 HACKING:- Hacking is simple terms means an illegal intrustion into a computer sys-
tem and network. It is also known as Cracking.
 DENIAL OF SERVICE ATTACK:- This is an act by the crimianls who floods the ba-
bandwith of the victims network or fills his E-mail box with spam mail depriving him
of the service he is entitled to access or provide.
 CHILD PORNOGRAPHY :- The internet is being highly used by its abusers to reach
and abuse children sexually, worldwide. As more homes have access to internet, mo-
re children would be using the internet and more are the chances of falling victim to
the aggression of Pedophiles.
 VIRUS DISSMINITION :- Malicious software that attaches itself to other software.
VIRUS, WORMS, TROJAN HORSE.
 COMPUTER VANDALISM :- Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism. These are program that attach themselves
to a file and them circulate.
 CYBER TERRORISM :- Terrorist attacks on the internet is by disturbed denial of
service attacks, hate websites and hate E-mails, attacks on service network etc.
 SOFTWARE PIRACY:- Theft of software through the illegal copying or genuine pr-
ograms or the counterfeiting and disturbed of products intended to pass for the ori-
ginal.
5. CYBER SECURITY

 CYBER SECURITY:- Cyber Security involves protection of sensitive personal and


business information through prevention, detection and response to different online
attacks. Cyber security actually preventing the attacks, cyber security.
 PRIVACY POLICY:- Before submitting your name, e-mail, address, on a website
look for the sites privacy policy.
 KEEP SOFTWARE UP TO DATE:- If the seller reduces patches for the software
operating system your device, install them as soon as possible. Instilling them will
prevent attackers from being able to take advantage. Use good password which will
be difficult for thieves to guess. Do not choose option that allows your computer to
remember your passwords.

6. ADVANTAGES OF CYBER SECURITY


 The cyber security will defend us from critical attacks.
 It helps us to browse the site, website.
 Internet Security process all the incoming and outgoing data on your computer.
 It will defend us from hacks and virus.
 Application of cyber security used in our PC needs update every week.

7. PREVENTION TO CYBER CRIME


 Use antivirus software’s.
 Insert firewalls.
 Uninstill unnecessary software.
 Maintain backup.
 Check security setting.
 Stay anonymous- choose a genderless screen name.
 Never give your full name or address to strangers.
 Learn more about internet privacy.

8. CYBER LAW OF INDIA


Cyber Crime can involve criminal activities that are traditional in nature, such as theft, fraud,
deformation and mischief, all of which are subjected to the India Penal code. In simple way
we can say that Cyber Crime is unlawful acts where in the computer is either a tool or both.

The abuse of computer has also given birth of new age Crime that are addresses by the
Information Technology Act, 2000.

9. CONCLUSION
Cybercrime is indeed getting the recognition it deserves. However, it is not g oing to restric-
ted that easily. Infact, it is highly likely that Cyber Crime and its hackers will continue develo-
ping and upgrading to stay ahead of the law.

So, to make us a safer we must need Cyber Security.

10. REFERENCE

 https://www.microsoft.com/en-us/research/academic-
program/write-great-research-paper/
 http://www.slideshare.net/lipsita3/cyber-crime-and-security-ppt
 http://riverdelfin.blogspot.in/2013/09/an-introduction-to-cyber-
crime.html

You might also like