Computer Assignment
Computer Assignment
CYBER CRIME
NAME : RANAJAY PAL
STREAM : BBA
SECTION : 1A
STUDENT ID :181001101314
CONTENTS
INTRODUCTION
HISTORY OF CYBER CRIME
CATAGERY OF CUBER CRIME
TYPES OF CYBER CRIME
CYBERCRIME THREATENTS NATIONAL SECURITY
CYBER SECURITY
ADVANTAGES OF CYBER SECUTITY
SAFETY TIPS OF CYBER CRIME
CYBER LAW OF INDIA
CONCLUSION
Cyber crime is an
activity
Done using
computers and
Internet . It is an
unlawful course of
action
HISTORY OF CYBER CRIME .
3500 B.c.
In India , japan and china , the era of modern computer however
began with the analytical engine of Charles Babbage
The first spam email took place in 1976 when it was sent out over the
ARPANT.
THE FIRST VIRUS WAS INSTALLED ON AN Apple computer in
1982 when a school student , Rich Skrenta developed the EIK cloner.
CATEGORIES OF CYBER CRIME
• The computer as a weapon :- Using a computer to commit real world crime e.g.
Cyber terrorism , credit card fraud, etc.
TYPES OF CYBER
CRIME
TYPES OF CYBER CRIME
Motive behind the crime called hacking greed power , publicity ,revenge ,
adventure desire to access forbidden information destructive mindset wants to
sell security services .
TYPES OF CYBER CRIME
• DANIA OF SERVICE ATTACK :- This is an act by the criminals who floods the
bandwidth of the victims network of files his E-mail box with spam mail
depriving him of the service he is entitled to access or provide many DOS
attacks , such as the ping of death and tear drop attacks .
Likewise Union home minister Shivraj patil said that the rising level of crime is an
indication of enormous threat to national security . On Google’s social networking
site orkut, Facebook have been perplexing authorities . Fan clubs of Underworld
Dons like Dawood Ibrahim and Chhota Shakeel and other wanted underworld
dons are also doing the rounds on orkut . There is huge potential for damage to
national security through cyber attacks . The internet is a means for money
bounding and funding terrorist attacks in an organized manner .
CYBER LAW IN INDIA
The abuse of computer has also given birth of new age crime
that are addressed by the information technology Act,2000.
CONCLUSION