Cards (16)

  • History of Cyber Crime​
    • The first recorded cybercrime took place in 1820. when Joseph Merrie Jacquaid, a textile manufacturer in France produced the loom.​
    • Abacus is the earliest form of computer since 35000 B.C​
    • Charles Babbage – Analytical Engine​
    • 1976 – first spam email took place when it was sent out over the ARPANET.​
    • 1982 – the first virus installed on an Apple computer, a high school student, Rich Skrenta developed EIK Cloner. ​
  • What is Cybercrime?
    Is any crime that takes place online or primarily online it consist of illegal activity conducted on computer. Traditional crimes may be committed while using computer, but cybercrime consist of more specific types of crimes such as Phishing schemes and viruses.  ​
    Is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. ​
  • Cybercrimes​
    “Offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim directly or indirectly, using modern harm telecommunication networks such as Internet(networks including but not limited to chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)   ​
  • Cybercrime in a narrow sense​
    (computer crime) ​
    • Any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them. ​
  • Cybercrime in a broader sense​
    (computer-related crime) ​
    • Any illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession and offering or distributing information by means of a computer system or network.​
  • Computer crime has two elements:​
    1. Computer​
    2. Crime​
  • Cybersecurity​
    Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. ​
  • Cybersecurity – Privacy Policy:​
    Before submitting your name, e-mail, address, on a website look for the sites privacy policy. Keep software Up to Date: if the seller reduce patches  for the software operating system your device, install them as soon as possible. Installing them will prevent attackers form being able to take advantage. Use good password which will be difficult for thieves to guess. Do not choose option  that allows your computer to remember your passwords.  ​
  • Advantages of Cyber Security​
    The cyber security will defend us from critical attacks:​
    1. It helps us to browse the site, website.​
    2. Internet Security process all the incoming and outgoing data on your computer. ​
    3. It will defend us from hacks and virus.​
    4. Application of cyber security used in our PC needs update every week. ​
  • SAFETY TIPS TO CYBER CRIME​
    1. Use antivirus Software​
    2. Insert Firewall​
    3. Uninstall unnecessary software​
    4. Maintain backup​
    5. Check security settings​
  • Classification of Computer Crimes​
    • Financial fraud crimes​ - can be broadly defined as an intentional act of deceptive involving financial transactions for purpose of personal gain. Fraud is a crime and is also a civil law violation. ​
    *Internet fraud​ - Means trying to trick or scam someone else using the internet. This usually means that the person who is being tricked loses money to the people scamming them Internet fraud can take place on a computer programs such as chat rooms, e-mail, message boards, or Web sites. ​
    • Computer fraud​ - Is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss.​
  • 4. Other forms of fraud may be facilitated using computer systems, including.​
    • bank fraud​ - Is the use of potentially illegal means to obtain money, assets, or other property owned of held by a financial institution, or obtain money from depositors by fraudulently posing as a bank or other financial institution. ​
    • carding​ - Is a form of credit card fraud in which a stolen credit card is used to charge pre-paid cards. ​
    • identity theft​ - Also known as identity fraud, is a crime   in which an imposter obtains key pieces of personally identifiable information, such  as Social Security or driver’s license numbers, in order to impersonate someone else. ​
  • Extortion​ -
    • Also called shakedown, outwrestling and exaction​
    • Is a criminal offense of obtaining money, property, or services from an individual or institution, through coercion. ​
  • Theft of classified information ​-
    • Classified information is sensitive information to which access is restricted by law or regulation to particular classes of people. ​