Você está na página 1de 10

Name: Batch:

What is Cybercrime?
Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs Cybercrime is nothing but where the computer used as an object or subject of crime Online activities are just as vulnerable to crime and can compromise personal safety just as effectively as common everyday crimes. Lawmakers, law enforcement, and individuals need to know how to protect themselves and the persons for which they are responsible.

Statistics

Cyber crime is now a bigger threat to India Inc than physical crime. In a recent survey by I BM, a greater number of companies (44%) listed cyber crime as a bigger threat to their profitability than physical crime (31%). The cost of cyber crime stems primarily from loss of revenue, loss of market capitalization, damage to the brand & loss of customers, in that order. About 67% local Chief Information Officers (CIOs) who took part in the survey perceived cyber crime as more costly, compared to the global benchmark of 50%.

Types of Cybercrime
1.HACKING : Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives.
2.CHILD PORNOGRAPHY: The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. . As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles. 3.DENIAL OF SERVICE ATTACK : This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide .

Types of Cybercrime
4.COMPUTER VANDALISM: Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate . They usually affect the data on a computer, either by altering or deleting it against properties. 5.CYBERTERRORISM: Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. 7.SOFTWARE PIRACY: Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.

Case Study: BPO Data Theft


Pune BPO scam was claimed to be the first scam in India. In April 2005, five employees of BPO arm of Mphasis Ltd MsourcE in Pune were arrested for defrauding US customers of Citi Bank to the tune of Rs. 1.5 Crores. The crime was obviously committed using Unauthorized Access to the Electronic Account Space of the customers. It is therefore firmly within the domain of Cyber Crime The BPO is liable for lack of security that enabled the commission of the fraud as well as because of the vicarious responsibility for the exemployees involvement. The process of getting the PIN number was during the tenure of the person as employees and hence the organization is responsible for the crime.

ICICI Bank Phishing


A few customers of ICICI Bank received an e-mail asking for their Internet login name and password to their account. The e-mail seemed so genuine that some users even clicked on the URL given in the mail to a Web page that very closely resembled the official site. The scam was finally discovered when an assistant manager of ICICI Bank's information security cell received e-mails forwarded by the bank's customers seeking to crosscheck the validity of the e-mails with the bank. Such a scam is known as 'phishing.'

Safety tips against cyber Crime


Use antivirus softwares insert firewalls

uninstall unnecessary software


maintain backup check security settings

Conclusion
Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily. In fact, it is highly likely that cybercrime and its hackers will

continue developing and upgrading to stay ahead of the law. So, to make us a safer
we must need cyber security.

A final word: Treat your password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months

Você também pode gostar