Applications of Internet and Understanding Cyber Crime

Topic –
Applications of Internet , Cyber Crime  &
Types of Cyber Crime
Presented by
Mr. Bhushan S. Kulkarni
Assistant Professor
Department of 
Computer Science and IT.
Deogiri College, Aurangabad
Internet Application
Introduction to Cyber Crime
Types of Cyber Crime.
Cyber Space.
In Previous lecture we studied about internet
technology.
 Let
 us Focus on
 applications of internet, now
a  days application of internet is
 increased
 in
the world.
 
Internet have different applications, there are
as follwos:
Great source of entertainment
Provides content for studies
We can learn and courses online
We can shop online while sitting at home
We can pay bills, do recharge etc.
We can stay in touch with our loved ones via
various social networks
We can chat and communicate across the globe
very easily
Get news about the things happening across the
globe
We can watch movies, serial, videos online
Can play interesting games with friends remotely
Work from home with overseas clients
 
   
 The rise of internet technology brings
huge benefits for businesses, consumers,
entrepreneurs, and pretty much anybody who has
a message they want to share with the world. But
it also creates an entirely new set of problems.
 
For example, new technologies mean we can
arrange our finances while sitting in a train,
station, cafe or send holiday snaps halfway
around the world to our friends and family back
home.
However, with so much of our information
floating around in the digital space, there is
increased risk of “Cyber Crime”.
 
What is Cyber Crime?
 Cyber crime is the criminal activity or illegal
activity performed with the help of
technology.
In other word more briefly we can define
cyber crime as follows.
Cybercrime, or computer-oriented crime, is a
crime that involves a computer and a network.
The computer may have been used in the
commission of a crime, or it may be the target.
 Cyber crimes can be defined as:
 
"Offences that are committed against individuals
or groups of individuals with a criminal motive to
intentionally harm the reputation of the victim or
cause physical or mental harm, or loss, to the
victim directly or indirectly, using modern
telecommunication networks such as Internet.
Cyber Crimes can be categorized in two ways:
1. The crimes in which the computer is the
target. Examples of such crimes are hacking,
virus attacks, DOS attack etc.
2. The crime sin which the computer is used
as a weapon. These types of crimes include
cyber terrorism, IPR violations, credit card
frauds, NEFT frauds, pornography etc.
Unauthorized access means any kind of
access without the permission.
Hacking means an illegal intrusion into a
computer system and/or network.
Every act committed towards breaking into a
computer and/or network is hacking.
Web hijacking means taking forceful control
of another person’s website. In this case the
owner of the website loses control over his
website and its content.
In general terms, stalking can be termed
as the repeated acts of harassment
targeting the victim such as following the
victim, making harassing phone calls,
killing the victims pet, vandalizing victims
property, leaving written messages or
objects.
This is an attack in which the criminal floods the
bandwidth of the victim’s network or fills his e-mail
box with spam mail depriving him of the services he
is entitled to access or provide. This kind of attack is
designed to bring the network to crash by flooding it
with useless traffic.
Virus attacks
Viruses are the programs that have the
capability to infect other programs and
make copies of itself and spread into other
program.
Phishing is the act of sending an e-mail to a
user falsely claiming to be an established
legitimate enterprise in an attempt to scam the
user into surrendering private information that
will be used for identity theft.
Email spoofing :
Email spoofing :
Email spoofing refers to email that appears to
originate from one source but actually has been
sent from another source. Email spoofing can
also cause monetary damage.
Cyber Defamation:
When a person publishes defamatory matter
about someone on a website or sends e-
mails containing defamatory information to
all of that person’s friends, it is termed as
cyber defamation.
Cyberspace refers to the virtual computer world,
and more specifically, is an electronic medium
used to form a global computer network to
facilitate online communication. It is a large
computer network made up of many worldwide
computer networks that employ TCP/IP protocol
to aid in communication and data exchange
activities.
Cyberspace's core feature is an interactive and
virtual environment for a broad range of
participants.
Next lecture we will study about Cyber Law ,
need of cyber law etc….
Thank You…..!
 
Slide Note
Embed
Share

Delve into the diverse applications of the Internet, ranging from online learning to entertainment and remote work capabilities. Discover the growing digital landscape's benefits for businesses and individuals, alongside the escalating risks posed by cybercrime, defined as criminal activities leveraging technology to harm individuals or organizations. Gain insights into the types of cybercrimes and their impact on modern society.

  • Internet Applications
  • Cyber Crime
  • Online Learning
  • Technology Risks
  • Digital Landscape

Uploaded on Oct 08, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Topic Topic Applications of Internet , Cyber Crime & Types of Cyber Crime Presented Presented by by Mr. Bhushan S. Kulkarni Assistant Professor Department of Computer Science and IT. Deogiri College, Aurangabad

  2. Internet Application Introduction to Cyber Crime Types of Cyber Crime. Cyber Space.

  3. In Previous lecture we studied about internet technology. Let us Focus on applications of internet, now a days application of internet is increased in the world. Internet have different applications, there are as follwos:

  4. Great source of entertainment Provides content for studies We can learn and courses online We can shop online while sitting at home We can pay bills, do recharge etc. We can stay in touch with our loved ones via various social networks We can chat and communicate across the globe very easily Get news about the things happening across the globe We can watch movies, serial, videos online Can play interesting games with friends remotely Work from home with overseas clients

  5. huge entrepreneurs, and pretty much anybody who has a message they want to share with the world. But it also creates an entirely new set of problems. The rise of internet technology brings benefits for businesses, consumers, For example, new technologies mean we can arrange our finances while sitting in a train, station, cafe or send holiday snaps halfway around the world to our friends and family back home.

  6. However, with so much of our information floating around in the digital space, there is increased risk of CyberCrime . What is Cyber Crime? Cyber crime is the criminal activity or illegal activity technology. In other word more briefly we can define cyber crime as follows. performed with the help of

  7. Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cyber crimes can be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet.

  8. Cyber Crimes can be categorized in two ways: 1. The crimes in which the computer is the target. Examples of such crimes are hacking, virus attacks, DOS attack etc. 2. The crime sin which the computer is used as a weapon. These types of crimes include cyber terrorism, IPR violations, credit card frauds, NEFT frauds, pornography etc.

  9. Unauthorized access means any kind of access without the permission. Hacking means an illegal intrusion into a computer system and/or network. Every act committed towards breaking into a computer and/or network is hacking.

  10. Web hijacking means taking forceful control of another person s website. In this case the owner of the website loses control over his website and its content. In general terms, stalking can be termed as the repeated acts of harassment targeting the victim such as following the victim, making harassing phone calls, killing the victims pet, vandalizing victims property, leaving written messages or objects.

  11. This is an attack in which the criminal floods the bandwidth of the victim s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide. This kind of attack is designed to bring the network to crash by flooding it with useless traffic. Viruses are the programs that have the capability to infect other programs and make copies of itself and spread into other program.

  12. Phishing is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. Email spoofing Email spoofing refers to email that appears to originate from one source but actually has been sent from another source. Email spoofing can also cause monetary damage. Email spoofing : :

  13. Cyber Defamation: When a person publishes defamatory matter about someone on a website or sends e- mails containing defamatory information to all of that person s friends, it is termed as cyber defamation. Cyber Defamation:

  14. Cyberspace refers to the virtual computer world, and more specifically, is an electronic medium used to form a global computer network to facilitate online communication. It is a large computer network made up of many worldwide computer networks that employ TCP/IP protocol to aid in communication and data exchange activities. Cyberspace's core feature is an interactive and virtual environment for a broad range of participants.

  15. Next lecture we will study about Cyber Law , need of cyber law etc . Thank You ..!

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#