Cyber Threats. Ibrahim Salim Dept. of Computer Applications, MES College Marampally. Why we about study Cyber Crime. Everybody is using COMPUTERS .. From White Collar Criminals to Terrorist Organizations and from Teenagers to Adults New generation is growing up with computers
Dept. of Computer Applications, MES College Marampally
Computer crime can be defined as crime against an organization or an individual in which the perpetrator of the crime uses a computer or computer enabled technology for all or part of the crime
There should be an act which is a result of human conduct. It is the result that the law tries to prevent
Act should be accompanied with a state of guilty mind
If he destroys deletes or alters any information in the computer resource or diminishes its value or utility or affects it injuriously by any means like steeling , concealing, destroying or altering or causes any person to steal.,.,..any computer source code used for a computer resource with an intention to cause damage.
Modifier is not entitled to do so or doesn’t have the consent of any person who can be entitled for it.
Virus is a self replicating program which spreads throughout a computer system, attaching copies of itself to ordinary programs.
A male doctor took out naked videos during massage session and while conducting various beauty therapies , after that he showed the clipping to her and black mailed for have sex with him.
In forgery and counter feting of data the best example to cite will be when a person learns of a computer software and later detaches himself from organization to make copies of this popular package ,dressing them up to look like original and selling them.
Sex offenders who use the Internet to seek underage victims
have been widely characterized as “online predators.”
Lots of financial frauds has been committed with the help of identity theft.
India has the fastest growing telecom network in the world with its high population and development potential. Airtel , Idea, Reliance, BSNL, Aircel , Tata Indicom, Vodafone, MTNL, and Loop Mobile are other major operators in India. However, rural India still lacks strong infrastructure. India's public sector telecom company BSNL is the 7th largest telecom company in world.
Every GSM phone contains a unique identifier (different from the phone number), called the International Mobile Equipment Identity (IMEI).This can be found by dialling *#06#.
IMEI = TAC + FAC + SNR + SP
Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. This is similar to Fishing, where the fisherman puts a bait at the hook, thus, pretending to be a genuine food for fish