02-03-2012, 01:58 PM
CYBER CRIMES
CYBER.pptx (Size: 202.43 KB / Downloads: 143)
WHAT IS CYBER CRIME?
CYBER CRIME OR COMPUTER CRIME REFERS TO A CRIMINAL ACTIVITY WHERE A COMPUTER OR NETWORK IS USED AS A MEDIUM , TARGET OR PLACE FOR COMMITING THE CRIME .
IT CAN BE BROADLY DEFINED AS A CRIMINAL ACTIVITY WHICH INVOLVES AN IT INFRASTRUCTURE FOR ITS EXECUTION.
ITS CATEGORIES
FINANCIAL ATTACKS
BUSINESS ATTACKS
MILITARY AND INTELLIGENCE ATTACKS
TERRORIST ATTACKS
GRUDGE AND TRILL ATTACKS
TERRORIST ATTACKS
MAKING USE OF COMPUTERS AND NETWORKS FOR CARRYING OUT TERRORIST ACTIVITIES COMES UNDER THIS CATEGORY.
USING INTERNET THE TERRORISTS ARE ABLE TO CARRY OUT THEIR TASK WITHOUT THE INHERRENT DANGER OF CAPTURE OR DEATH.
GRUDGE AND TRILL ATTACKS
GRUDGE ATTACKS ARE CONCERNED WITH THE ACT PERFORMED BY AN EMPLOYEE TO TAKE THE REVENGE AGAINST HIS COMPANY FOR ILL-TREATMENT OR FOR ANY OTHER REASON.
TRILL ATTACKS ARE NOT FOR ANY REVENGE BUT JUST FOR FUN.
COMMON GRUDGE AND TRILL ATTACKS INCLUDE HACKING OF COMPUTER ,CHANGING INFORMATION ON COMPUTER ,STEALING CONFIDENTIAL INFORMATION ETC……
CYBER.pptx (Size: 202.43 KB / Downloads: 143)
WHAT IS CYBER CRIME?
CYBER CRIME OR COMPUTER CRIME REFERS TO A CRIMINAL ACTIVITY WHERE A COMPUTER OR NETWORK IS USED AS A MEDIUM , TARGET OR PLACE FOR COMMITING THE CRIME .
IT CAN BE BROADLY DEFINED AS A CRIMINAL ACTIVITY WHICH INVOLVES AN IT INFRASTRUCTURE FOR ITS EXECUTION.
ITS CATEGORIES
FINANCIAL ATTACKS
BUSINESS ATTACKS
MILITARY AND INTELLIGENCE ATTACKS
TERRORIST ATTACKS
GRUDGE AND TRILL ATTACKS
TERRORIST ATTACKS
MAKING USE OF COMPUTERS AND NETWORKS FOR CARRYING OUT TERRORIST ACTIVITIES COMES UNDER THIS CATEGORY.
USING INTERNET THE TERRORISTS ARE ABLE TO CARRY OUT THEIR TASK WITHOUT THE INHERRENT DANGER OF CAPTURE OR DEATH.
GRUDGE AND TRILL ATTACKS
GRUDGE ATTACKS ARE CONCERNED WITH THE ACT PERFORMED BY AN EMPLOYEE TO TAKE THE REVENGE AGAINST HIS COMPANY FOR ILL-TREATMENT OR FOR ANY OTHER REASON.
TRILL ATTACKS ARE NOT FOR ANY REVENGE BUT JUST FOR FUN.
COMMON GRUDGE AND TRILL ATTACKS INCLUDE HACKING OF COMPUTER ,CHANGING INFORMATION ON COMPUTER ,STEALING CONFIDENTIAL INFORMATION ETC……