SlideShare una empresa de Scribd logo
1 de 19
Submitted to-
Mr.Neeraj Pratihar
Lecturer of I.T.
Presented by-
Miss Asha Mali
VIII Sem. I.T.
09eimit010
A
SEMINAR
ON
CYBER CRIME
CYBER CRIME
AGENDA
INTRODUCTION
WHAT IS CYBER CRIME ??
VARIOUS CYBERCRIME
WHO ARE CYBER CRIMINALS??
CONCLUSION.
REFERENCES.
INTRODUCTION
Cyber crime is a term used broadly to
describe activity in which computers or
networks are a tool, a target, or a place
of criminal activity.
The first recorded cyber crime took
place in the year 1820 by Joseph-Marie
Jacquard
WHAT IS CYBER CRIME ?
 It is a criminal activity committed on the internet.
This is a broad term that describes everything from
electronic cracking to denial of service attacks that
cause electronic commerce sites to lose money.
 Cyber crime is just a combination of crime and
computer.
 Any offence or crime in which a computer is used is
a cyber crime.
VARIOUS TYPES OF CYBERCRIME
HACKING PHISHING
DENIAL OF SERVICE ATTACK SPOOFING
VIRUS DISSEMINATION CYBER STALKING
SOFTWARE PIRACY CYBER DEFAMATION
PORNOGRAPHY THREATENING
IRC Crime SALAMI ATTACK
CREDIT CARD FRAUD NET EXTORTION
HACKING
The act of gaining unauthorized access to a computer system or
network (e.g., fraud, terrorism, etc.)
DENIAL OF SERVICE ATTACK:-
This is an act by the criminal, who floods the band width of
the victim’s network or fills his e-mail box with spam mail
depriving him of the services he is entitled to access or
provide.
VIRUS DISSEMINATION
Malicious software that attaches itself to other software.
(virus, worms, Trojan Horse, Time bomb, Logic
Bomb, Rabbit and Bacterium are the malicious soft wares)
SOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs
IRC CRIME
Internet Relay Chat (IRC) servers have chat rooms in which
people from anywhere the world can come together and chat
with each other
CREDIT CARD FRAUD:-
You simply have to type credit card number into www page off
the vendor for online transaction.
If electronic transactions are not secured the credit card
numbers can be stolen by the hackers who can
misuse this card by impersonating the credit card owner.
NET EXTORTION:-
Copying the company’s confidential data in order to extort
said company for huge amount.
SPOOFING
Getting one computer on a network to pretend to have the
identity of another computer, usually one with special access
privileges, so as to obtain access to the other computers on
the network.
PHISHING
It is technique of pulling out confidential
information from the bank/financial
institutional account holders by deceptive
means
CYBER STALKING
It refers to the use of the Internet, e-mail, or other
telecommunication technologies to harass or stalk another
person.
CYBER DEFAMATION:-
The criminals send e-mail containing defamatory
matters to all concerned of the victim or post the
defamatory matters on a website.
(divorced husband against wife)
THREATENING
The Criminal sends threatening email or comes
in contact in chat rooms with victim. (Any one
disgruntled may do this against boss, friend or
official
SALAMI ATTACK
In such crime criminal makes insignificant changes in such a
manner that such changes
would go unnoticed. Criminal makes such program that
deducts small amount like 2.50 per month from the account
of all the customer of the Bank and deposit the same in his
account. In this case no account holder will approach the
bank for such small amount but criminal gains huge amount.
WHO ARE CYBER CRIMINALS ??
Kids(age group 9-16)
Organized hackers
Disgruntled employees
Professional hackers
CONCLUSION:-
Technology is always a double-edged sword and can be used
for both the purposes – good or bad.
Hence, it should be the persistent efforts of rulers and law
makers to ensure that technology grows in a healthy manner
and is used for legal and ethical
business growth and not for committing crimes.
REFERNCES
 www.cisco.com
 www.berbee.com
 www.ibm.com
 www.microsoft.com
 www.rsa.com
 www.gocsi.com
 www.sans.org
 www.nist.gov
Various cyber crime

Más contenido relacionado

La actualidad más candente (19)

Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime liability report
Cyber crime liability reportCyber crime liability report
Cyber crime liability report
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cybe Crime & Its Type
Cybe Crime & Its TypeCybe Crime & Its Type
Cybe Crime & Its Type
 
Cyber safe girl e book
Cyber safe girl e bookCyber safe girl e book
Cyber safe girl e book
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Shilpa
ShilpaShilpa
Shilpa
 
Phishing
PhishingPhishing
Phishing
 
Impact of cybercrime
Impact of cybercrimeImpact of cybercrime
Impact of cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Internet trolls
Internet trollsInternet trolls
Internet trolls
 

Destacado

Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"
Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"
Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"ООО "МедИнфоЦентр"
 
Advanced Multiplatform Strategy for Broadcasting Biz Stakeholders
Advanced Multiplatform Strategy for Broadcasting Biz StakeholdersAdvanced Multiplatform Strategy for Broadcasting Biz Stakeholders
Advanced Multiplatform Strategy for Broadcasting Biz StakeholdersAnjanette Delgado
 
мовленнєвий розвиток 1клас копия
мовленнєвий розвиток 1клас   копиямовленнєвий розвиток 1клас   копия
мовленнєвий розвиток 1клас копияlyuda_p
 
Annotating the script
Annotating the scriptAnnotating the script
Annotating the scriptMica Brown
 
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. Gallen
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. GallenWorkshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. Gallen
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. GallenPenny Schiffer
 

Destacado (13)

Webspoofing
WebspoofingWebspoofing
Webspoofing
 
Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"
Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"
Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"
 
Advanced Multiplatform Strategy for Broadcasting Biz Stakeholders
Advanced Multiplatform Strategy for Broadcasting Biz StakeholdersAdvanced Multiplatform Strategy for Broadcasting Biz Stakeholders
Advanced Multiplatform Strategy for Broadcasting Biz Stakeholders
 
Presentation1
Presentation1Presentation1
Presentation1
 
Op art 1
Op art 1Op art 1
Op art 1
 
мовленнєвий розвиток 1клас копия
мовленнєвий розвиток 1клас   копиямовленнєвий розвиток 1клас   копия
мовленнєвий розвиток 1клас копия
 
Annotating the script
Annotating the scriptAnnotating the script
Annotating the script
 
Foundations seminar
Foundations seminarFoundations seminar
Foundations seminar
 
Bss552 lect 1
Bss552 lect 1Bss552 lect 1
Bss552 lect 1
 
Op art
Op artOp art
Op art
 
Pointilism
PointilismPointilism
Pointilism
 
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. Gallen
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. GallenWorkshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. Gallen
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. Gallen
 
Natural forms
Natural formsNatural forms
Natural forms
 

Similar a Various cyber crime

Similar a Various cyber crime (20)

Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Unit 1
Unit 1Unit 1
Unit 1
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Internet
InternetInternet
Internet
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 

Último

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 

Último (20)

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 

Various cyber crime

  • 1. Submitted to- Mr.Neeraj Pratihar Lecturer of I.T. Presented by- Miss Asha Mali VIII Sem. I.T. 09eimit010 A SEMINAR ON CYBER CRIME
  • 3. AGENDA INTRODUCTION WHAT IS CYBER CRIME ?? VARIOUS CYBERCRIME WHO ARE CYBER CRIMINALS?? CONCLUSION. REFERENCES.
  • 4. INTRODUCTION Cyber crime is a term used broadly to describe activity in which computers or networks are a tool, a target, or a place of criminal activity. The first recorded cyber crime took place in the year 1820 by Joseph-Marie Jacquard
  • 5. WHAT IS CYBER CRIME ?  It is a criminal activity committed on the internet. This is a broad term that describes everything from electronic cracking to denial of service attacks that cause electronic commerce sites to lose money.  Cyber crime is just a combination of crime and computer.  Any offence or crime in which a computer is used is a cyber crime.
  • 6. VARIOUS TYPES OF CYBERCRIME HACKING PHISHING DENIAL OF SERVICE ATTACK SPOOFING VIRUS DISSEMINATION CYBER STALKING SOFTWARE PIRACY CYBER DEFAMATION PORNOGRAPHY THREATENING IRC Crime SALAMI ATTACK CREDIT CARD FRAUD NET EXTORTION
  • 7. HACKING The act of gaining unauthorized access to a computer system or network (e.g., fraud, terrorism, etc.)
  • 8. DENIAL OF SERVICE ATTACK:- This is an act by the criminal, who floods the band width of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.
  • 9. VIRUS DISSEMINATION Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious soft wares)
  • 10. SOFTWARE PIRACY Theft of software through the illegal copying of genuine programs IRC CRIME Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other CREDIT CARD FRAUD:- You simply have to type credit card number into www page off the vendor for online transaction. If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
  • 11. NET EXTORTION:- Copying the company’s confidential data in order to extort said company for huge amount. SPOOFING Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges, so as to obtain access to the other computers on the network.
  • 12. PHISHING It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means
  • 13. CYBER STALKING It refers to the use of the Internet, e-mail, or other telecommunication technologies to harass or stalk another person. CYBER DEFAMATION:- The criminals send e-mail containing defamatory matters to all concerned of the victim or post the defamatory matters on a website. (divorced husband against wife)
  • 14. THREATENING The Criminal sends threatening email or comes in contact in chat rooms with victim. (Any one disgruntled may do this against boss, friend or official
  • 15. SALAMI ATTACK In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed. Criminal makes such program that deducts small amount like 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
  • 16. WHO ARE CYBER CRIMINALS ?? Kids(age group 9-16) Organized hackers Disgruntled employees Professional hackers
  • 17. CONCLUSION:- Technology is always a double-edged sword and can be used for both the purposes – good or bad. Hence, it should be the persistent efforts of rulers and law makers to ensure that technology grows in a healthy manner and is used for legal and ethical business growth and not for committing crimes.
  • 18. REFERNCES  www.cisco.com  www.berbee.com  www.ibm.com  www.microsoft.com  www.rsa.com  www.gocsi.com  www.sans.org  www.nist.gov