Cyber Crime in A Nutshell
Cyber Crime in A Nutshell
Introduction
In the News.
1 out of 5 children received a sexual solicitation or approach over the Internet in a one-year period of time (www.missingchildren.com) California warns of massive ID theft personal data stolen from computers at University of California, Berkeley (Oct 21, 2004 IDG news service) Microsoft and Cisco announced a new initiative to work together to increase internet security (Oct 18, 2004 www.cnetnews.com)
Cybercrime in General
What is cybercrime? When did it all start? Who is involved? Why do they do it?
Pre-2000cybercrime Post-2000 cybercrime
1.
2.
The first type targets computer devices or computer networks directly. The second type targets independent computer devices or computer networks, but are facilitated by computer devices or computer networks
2.
Cybercrime effects
Effects of cyber crime Cyber Fear In Teenager: These days a worst fear in teenagers eyes is Cyber Bullying Cyber crime against woman in India: Cyber crime is a global phenomenon. 1. Harassment via e-mail 2. cyber stalking, 3. Cyber pornography 4. defamation 5. morphing 6. e-mail spoofing
Conclusion
References
1. K.Jaishankar; Cyber Criminology; CRC PRESS; 2011; . 2. Allison Gavanagh; Sociology in the age of internet; open university press; 2007;.. 3. Nir kshetri; The Global Cyber Crime Industry; Spinger; 2010; 4. Carl timm & Rechard perez; Seven Deadliest Social Network Attacks; syngress; 2010; . 5. Jeffrey lan Ross; Cybercrime; chealse house; 2010; . 6. Susan W.Brenner; Criminal threat from cyber space; Green wood; 2010; . 7. Christian w.probst ; Insider threats in cyber security; springer; 2010; . 8. Anthony reyes; cyber crime and digital forensics;syngress; 2007; . 9. Michael Cross; sense of the cyber crime; syngress;2008; . 10. IC3; Top 10 Countries by Count; Individual Complainants (Numbered by Rank); http://www.ic3.gov/media/annualreport/2010_ic3report.pdf ; 2010; 11. Mac marketing chart; top ten internet crime; http://www.marketingcharts.com/ ; 2010; . 12. Charles P.Pfleeger; analyzing computer security; paul boger;2011; .
Thank you all very much for taking the time to listen to this presentation
Sri K.Suresh Babu Assistant professor of JNTU [email protected] AbdolMajid Shahgholi M.Tech , JNTU [email protected] HamidReza Barzegar M.Tech, JNTU [email protected] School of Information Technology, Jawaharlal Nehru Technological University, Hyderabad
19