SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
D3pak Kumar : C|EH , CHFI , ECSA , CCS , CCF , MCA , OPSEC , CSICS 
CYBER CRIME AND ITS NATURE 
Cybercrime is a type of crime done by the help of computer and internet. It is basically extension of traditional crime with the help of new technology. 
The nature of cybercrime is virtual because in this crime there is no need to involve manually, but effects are the same as traditional crime. Today the use of computer and internet are growing very fast. we use them for doing important works of our daily life. In fact we cannot live without computer and internet and so, the chances of being a victim of cyber crime is increasing fast. The cyber criminals target our information which we provide them accidentally while using computer and internet. There are so many types of cyber crimes which can harms a person.
D3pak Kumar : C|EH , CHFI , ECSA , CCS , CCF , MCA , OPSEC , CSICS 
 Hacking 
Hacking is a type of cyber crime. In simple words Hacking is an act by which a person access a computer system or network without permission of the owner. The person doing the hacking are called Hackers. They have best knowledge and understanding of computer and computer program. They misuse their knowledge and commit the crime of hacking. Hackers are also called crackers. There are many types of hackers like White Hat Hackers, Black Hat Hackers, Grey Hat Hackers etc. Among all of them, White Hat Hackers are the persons who use their knowledge for good purpose and check the security of any system or software. 
 Online Identity Theft 
Online theft is also a major type of Cybercrime.Nowadays, people using the Internet frequently use their sensitive data like. Bank details, credit card details, etc. on the Internet and cyber criminals target these data and commit online theft. Cyber criminals also target copyrighted content on the Internet and download and distribute it. 
This is a one part of Online Theft on the other hand there is an advanced stage of online theft that is called Identity Theft. We all know that a normal internet user has many online account including many social networking accounts and they all have their username and password. Cybercriminals target that username and password and use the account behalf of original owner of the account. It damages the online presence and reputation of owner of account holder. It may also causes financial loss sometimes. 
 Denial-of-Service Attack 
In simple word Denial-of-Service referred the act by which a user of any website or service denied to use the service or website. In this type of cyber crime criminals target the web server of the websites and flow a large number of requests to that server. This causes the use of maximum bandwidth of the website, and it goes slow down or not available for some times
D3pak Kumar : C|EH , CHFI , ECSA , CCS , CCF , MCA , OPSEC , CSICS 
 Phishing 
Phishing an act by which cyber criminals attempt to know the confidential data of any internet user. The Data may be the credit card number or username and password of any account. The main purpose of Phishing is to steal money or acquired other important data of any person, which causes financial loss. 
The act of Phishing done by sending e-mail or websites in which cyber criminals ask about your personal information or there is a link, and they tell click on it. After clicking on that link the person may be the victim of Phishing. 
 Spamming and Email Bombing 
Spam is a message also known as junk mail, send with a web link or business proposal. Clicking on this link or responding to business proposal send to a phishing website or install a malware in your computer. The sender of these emails are always unknown. You must aware to responding these type of spam mails because it tends towards some financial and data loss. 
On the other hand in email bombing an abuser sending huge numbers of email to target address and due to this that email address or mail server crashed. It feels like Denial-of-service impact. It says that spamming is a variant of Email bombing. 
 Web Jacking 
The world Web Jacking comes from Hijacking. In this type of cybercrime the cybercriminals hacks the control of a website. They may able to change the content of that website. They use that website as like owner and the real owner of website has no more control on the website. Sometime attackers asks for ransom to the owner of the website 
 Data Diddling 
Data Diddling is unauthorised altering of data. When a person enter some data to his computer and output is different from input then he may victim of data diddling.It is done by a virus progarm that change the entered data.
D3pak Kumar : C|EH , CHFI , ECSA , CCS , CCF , MCA , OPSEC , CSICS 
 Software Piracy 
Software Piracy is also a type of cybercrime and unfortunately most of Computer user are part of this crime. In this era of the Internet, you can easily download a movie or software via many websites or torrents. People often use a software without proper permission from the copyright holder of the software. They normally download the software and crack the code and use the software without buying that. This act is also a part of software piracy. 
The following type of work constitute a cyber crime of Software Piracy. 
1. Cracking the key of any software. 
2. Using unlicensed software in your personal computer. 
3. Using single licensed software to multiple computer. 
4. Distributing such type of software to other persons. 
Source : Google : DSCI 
For more: 
www.facebook.com/D3kumar 
or www.about.me/D3pak

Más contenido relacionado

La actualidad más candente

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick SurveyArindam Sarkar
 
Cyber crime
Cyber crimeCyber crime
Cyber crimedixitas
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crimevishalgohel12195
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & LawYash
 

La actualidad más candente (20)

Cyber Crime - What is it ?
Cyber Crime - What is it ?Cyber Crime - What is it ?
Cyber Crime - What is it ?
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Phishing
PhishingPhishing
Phishing
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
 

Destacado (19)

Success Mantra
Success MantraSuccess Mantra
Success Mantra
 
How to social/official network
How to social/official networkHow to social/official network
How to social/official network
 
DDOS
DDOS DDOS
DDOS
 
Phishing Scam
Phishing ScamPhishing Scam
Phishing Scam
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Chapter 17
Chapter 17Chapter 17
Chapter 17
 
Whatsapp
WhatsappWhatsapp
Whatsapp
 
Smartphone Forensic Acquisition guide
Smartphone Forensic Acquisition guideSmartphone Forensic Acquisition guide
Smartphone Forensic Acquisition guide
 
Sexting
SextingSexting
Sexting
 
IT Certification's top Ten Benefits
IT Certification's top Ten BenefitsIT Certification's top Ten Benefits
IT Certification's top Ten Benefits
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
IoT
IoTIoT
IoT
 
Edward Snowden Data-Breach
Edward Snowden Data-BreachEdward Snowden Data-Breach
Edward Snowden Data-Breach
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar a Types and Nature of Cyber Crimes

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdfgaherwarsaloni1234
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against propertyvarunbamba
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 

Similar a Types and Nature of Cyber Crimes (20)

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Más de Deepak Kumar (D3) (16)

Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Cyber Threat Intel : Overview
Cyber Threat Intel : OverviewCyber Threat Intel : Overview
Cyber Threat Intel : Overview
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
Cyber Forensics
Cyber Forensics Cyber Forensics
Cyber Forensics
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
THINK
THINKTHINK
THINK
 
Cyber Security Tips
Cyber Security TipsCyber Security Tips
Cyber Security Tips
 
CISSP INFORGRAPH MINDMAP
CISSP INFORGRAPH MINDMAPCISSP INFORGRAPH MINDMAP
CISSP INFORGRAPH MINDMAP
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
21st Century Cyber Forensics
21st Century Cyber Forensics21st Century Cyber Forensics
21st Century Cyber Forensics
 
Ransomware
Ransomware Ransomware
Ransomware
 
Facebook Security Tips
Facebook Security TipsFacebook Security Tips
Facebook Security Tips
 
Registry Registrar Registrant
Registry Registrar RegistrantRegistry Registrar Registrant
Registry Registrar Registrant
 
Information Security : A look
Information Security : A lookInformation Security : A look
Information Security : A look
 
Cryptography & Digital certificate
Cryptography & Digital certificateCryptography & Digital certificate
Cryptography & Digital certificate
 

Último

Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 

Último (20)

Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 

Types and Nature of Cyber Crimes

  • 1. D3pak Kumar : C|EH , CHFI , ECSA , CCS , CCF , MCA , OPSEC , CSICS CYBER CRIME AND ITS NATURE Cybercrime is a type of crime done by the help of computer and internet. It is basically extension of traditional crime with the help of new technology. The nature of cybercrime is virtual because in this crime there is no need to involve manually, but effects are the same as traditional crime. Today the use of computer and internet are growing very fast. we use them for doing important works of our daily life. In fact we cannot live without computer and internet and so, the chances of being a victim of cyber crime is increasing fast. The cyber criminals target our information which we provide them accidentally while using computer and internet. There are so many types of cyber crimes which can harms a person.
  • 2. D3pak Kumar : C|EH , CHFI , ECSA , CCS , CCF , MCA , OPSEC , CSICS  Hacking Hacking is a type of cyber crime. In simple words Hacking is an act by which a person access a computer system or network without permission of the owner. The person doing the hacking are called Hackers. They have best knowledge and understanding of computer and computer program. They misuse their knowledge and commit the crime of hacking. Hackers are also called crackers. There are many types of hackers like White Hat Hackers, Black Hat Hackers, Grey Hat Hackers etc. Among all of them, White Hat Hackers are the persons who use their knowledge for good purpose and check the security of any system or software.  Online Identity Theft Online theft is also a major type of Cybercrime.Nowadays, people using the Internet frequently use their sensitive data like. Bank details, credit card details, etc. on the Internet and cyber criminals target these data and commit online theft. Cyber criminals also target copyrighted content on the Internet and download and distribute it. This is a one part of Online Theft on the other hand there is an advanced stage of online theft that is called Identity Theft. We all know that a normal internet user has many online account including many social networking accounts and they all have their username and password. Cybercriminals target that username and password and use the account behalf of original owner of the account. It damages the online presence and reputation of owner of account holder. It may also causes financial loss sometimes.  Denial-of-Service Attack In simple word Denial-of-Service referred the act by which a user of any website or service denied to use the service or website. In this type of cyber crime criminals target the web server of the websites and flow a large number of requests to that server. This causes the use of maximum bandwidth of the website, and it goes slow down or not available for some times
  • 3. D3pak Kumar : C|EH , CHFI , ECSA , CCS , CCF , MCA , OPSEC , CSICS  Phishing Phishing an act by which cyber criminals attempt to know the confidential data of any internet user. The Data may be the credit card number or username and password of any account. The main purpose of Phishing is to steal money or acquired other important data of any person, which causes financial loss. The act of Phishing done by sending e-mail or websites in which cyber criminals ask about your personal information or there is a link, and they tell click on it. After clicking on that link the person may be the victim of Phishing.  Spamming and Email Bombing Spam is a message also known as junk mail, send with a web link or business proposal. Clicking on this link or responding to business proposal send to a phishing website or install a malware in your computer. The sender of these emails are always unknown. You must aware to responding these type of spam mails because it tends towards some financial and data loss. On the other hand in email bombing an abuser sending huge numbers of email to target address and due to this that email address or mail server crashed. It feels like Denial-of-service impact. It says that spamming is a variant of Email bombing.  Web Jacking The world Web Jacking comes from Hijacking. In this type of cybercrime the cybercriminals hacks the control of a website. They may able to change the content of that website. They use that website as like owner and the real owner of website has no more control on the website. Sometime attackers asks for ransom to the owner of the website  Data Diddling Data Diddling is unauthorised altering of data. When a person enter some data to his computer and output is different from input then he may victim of data diddling.It is done by a virus progarm that change the entered data.
  • 4. D3pak Kumar : C|EH , CHFI , ECSA , CCS , CCF , MCA , OPSEC , CSICS  Software Piracy Software Piracy is also a type of cybercrime and unfortunately most of Computer user are part of this crime. In this era of the Internet, you can easily download a movie or software via many websites or torrents. People often use a software without proper permission from the copyright holder of the software. They normally download the software and crack the code and use the software without buying that. This act is also a part of software piracy. The following type of work constitute a cyber crime of Software Piracy. 1. Cracking the key of any software. 2. Using unlicensed software in your personal computer. 3. Using single licensed software to multiple computer. 4. Distributing such type of software to other persons. Source : Google : DSCI For more: www.facebook.com/D3kumar or www.about.me/D3pak