Exploring Applications of Internet and Understanding Cyber Crime

Slide Note
Embed
Share

Delve into the diverse applications of the Internet, ranging from online learning to entertainment and remote work capabilities. Discover the growing digital landscape's benefits for businesses and individuals, alongside the escalating risks posed by cybercrime, defined as criminal activities leveraging technology to harm individuals or organizations. Gain insights into the types of cybercrimes and their impact on modern society.


Uploaded on Oct 08, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Topic Topic Applications of Internet , Cyber Crime & Types of Cyber Crime Presented Presented by by Mr. Bhushan S. Kulkarni Assistant Professor Department of Computer Science and IT. Deogiri College, Aurangabad

  2. Internet Application Introduction to Cyber Crime Types of Cyber Crime. Cyber Space.

  3. In Previous lecture we studied about internet technology. Let us Focus on applications of internet, now a days application of internet is increased in the world. Internet have different applications, there are as follwos:

  4. Great source of entertainment Provides content for studies We can learn and courses online We can shop online while sitting at home We can pay bills, do recharge etc. We can stay in touch with our loved ones via various social networks We can chat and communicate across the globe very easily Get news about the things happening across the globe We can watch movies, serial, videos online Can play interesting games with friends remotely Work from home with overseas clients

  5. huge entrepreneurs, and pretty much anybody who has a message they want to share with the world. But it also creates an entirely new set of problems. The rise of internet technology brings benefits for businesses, consumers, For example, new technologies mean we can arrange our finances while sitting in a train, station, cafe or send holiday snaps halfway around the world to our friends and family back home.

  6. However, with so much of our information floating around in the digital space, there is increased risk of CyberCrime . What is Cyber Crime? Cyber crime is the criminal activity or illegal activity technology. In other word more briefly we can define cyber crime as follows. performed with the help of

  7. Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cyber crimes can be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet.

  8. Cyber Crimes can be categorized in two ways: 1. The crimes in which the computer is the target. Examples of such crimes are hacking, virus attacks, DOS attack etc. 2. The crime sin which the computer is used as a weapon. These types of crimes include cyber terrorism, IPR violations, credit card frauds, NEFT frauds, pornography etc.

  9. Unauthorized access means any kind of access without the permission. Hacking means an illegal intrusion into a computer system and/or network. Every act committed towards breaking into a computer and/or network is hacking.

  10. Web hijacking means taking forceful control of another person s website. In this case the owner of the website loses control over his website and its content. In general terms, stalking can be termed as the repeated acts of harassment targeting the victim such as following the victim, making harassing phone calls, killing the victims pet, vandalizing victims property, leaving written messages or objects.

  11. This is an attack in which the criminal floods the bandwidth of the victim s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide. This kind of attack is designed to bring the network to crash by flooding it with useless traffic. Viruses are the programs that have the capability to infect other programs and make copies of itself and spread into other program.

  12. Phishing is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. Email spoofing Email spoofing refers to email that appears to originate from one source but actually has been sent from another source. Email spoofing can also cause monetary damage. Email spoofing : :

  13. Cyber Defamation: When a person publishes defamatory matter about someone on a website or sends e- mails containing defamatory information to all of that person s friends, it is termed as cyber defamation. Cyber Defamation:

  14. Cyberspace refers to the virtual computer world, and more specifically, is an electronic medium used to form a global computer network to facilitate online communication. It is a large computer network made up of many worldwide computer networks that employ TCP/IP protocol to aid in communication and data exchange activities. Cyberspace's core feature is an interactive and virtual environment for a broad range of participants.

  15. Next lecture we will study about Cyber Law , need of cyber law etc . Thank You ..!

More Related Content