Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Presented By~

ADITYA RAJ SARKAR


CLASS~ X[B], ROLL~ 1
SCHOOL~ THE REALITY PUBLIC SCHOOL
~CONTENTS~

➸ Introduction to Cyber Crime


➸ History of Cyber Crime
➸ Types of Cyber Crime
➸ Introduction to Cyber Security
➸ Advantages of Cyber Security
➸ Cyber Law of India
➸ Conclusion
~INTRODUCTION TO CYBER CRIME~

❀ Cybercrime, also called computer crime, the use of a


computer as an instrument to further illegal ends, such as
committing fraud and intellectual property, stealing
identities, or violating privacy.
❀ Cybercrime is an activity done using computers and
internet. We can say that it is an unlawful acts where in the
computer either a tool or a target or both!
~HISTORY OF CYBER CRIME~
❀ 1973 – A teller at a local New York bank used a computer to
embezzle over $2 million dollars.
❀ 1978 – The first electronic bulletin board system came online
and quickly became a preferred method of communication for
the cyber world. It allowed fast, free exchange of knowledge
including tips and tricks for hacking into computer networks.
❀ 1981 – Ian Murphy, known as Captain Zap to his fans, was the
first person convicted of a cyber crime. He hacked into the AT&T
network and changed the internal clock to charge off-hours
rates at peak times. He received 1,000 hours of community
service and 2.5 years of probation, a mere slap on the wrist
compared to today’s penalties, and was the inspiration for the
movie Sneakers.
❀ 1982 – Elk Cloner, a virus, is written as a joke by a 15 year old
kid. It is one of the first known viruses to leave its original
operating system and spread in the “wild”. It attacked Apple II
operating systems and spread by floppy disk.
❀ 1983 – The movie War Games is released and brings hacking
to the mainstream. The movie depicts a teenage boy who hacks
into a government computer system through a back door and
nearly brings the world to World War III.
~TYPES OF CYBER CRIME~
Online Identity
Scams Theft

Illegal
Content Botnets

Cyberstalki
Phishing ng
Attacks

Exploit Kits Social


Engineerin
g
Potentially
Unwanted Flood
Programs Attacks
~ INTRODUCTION TO CYBER SECURITY~

❀ Cyber Security is a process that’s designed to protect


networks and devices from external threats. Businesses
typically employ Cyber Security professionals to protect their
confidential information, maintain employee productivity,
and enhance customer confidence in products and
services.
❀ The world of Cyber Security revolves around the industry
standard of confidentiality, integrity, and availability, or CIA.
Privacy means data can be accessed only by authorized
parties; integrity means information can be added, altered,
or removed only by authorized users; and availability means
systems, functions, and data must be available on-demand
according to agreed-upon parameters.
❀ The main element of Cyber Security is the use of
authentication mechanisms. For example, a user name
identifies an account that a user wants to access, while a
password is a mechanism that proves the user is who he
claims to be.
~ADVANTAGES OF CYBER SECURITY~
~CYBER LAW OF INDIA~

❀ Cyber Crime can involve criminal activities that are


traditional in nature, such as theft, fraud, deformation and
mischief, all of which are subjected to the India Penal code.
In simple way we can say that Cyber Crime is unlawful acts
where in the computer is either a tool or both. The abuse of
computer has also given birth of new age crime that are
addressed by the Information Technology Act, 2000.
~CONCLUSION~

❀ Technology is destructive only in the hands of people who


do not realize that they are one and the same process as
the universe.
❀ Cyber Crime is indeed getting the recognition it deserves.
However, it is not going to restricted that easily. In fact, it is
highly likely that Cyber Crime and its hackers will continue
developing and upgrading to stay ahead of the law.
So, to make us a safer we must need Cyber Security!

You might also like