SlideShare una empresa de Scribd logo
1 de 15
By
• INTRODUCTION
• DEFINITION
• CLASSIFICATION OF Cyber Crime
• CYBER THREAT EVOLUTION (with diagram)
• CYBER CRIME VARIANTS
• CYBER SECURITY
• PREVENTION
• CONCLUSION
• Everyone who works with a computer must be
familiar with the term “Cyber Crime.” Initially, when
man invented computer & then the technology for
communicating between computers was evolved, he
would have never thought that the cyber space he is
creating could be flooded with any crime like cyber
crime.
• Cyber crime refers to all the activities done with
criminal intent in cyberspace.
• It’s an activity which is criminal in nature, where a
computer or network is the source, tool, target, or
place of a crime.
Cyber crime
against
individual
Email spoofing
Spamming
Cyber
Defamation
Harassment &
Cyber stalking
Cyber crime
against
Property
Credit Card
Fraud
Intellectual
Property crimes
Internet time
theft
Cyber crime
Against
Organisation
Email
Bombing
Salami Attack
Logic Bomb
Trojan Horse
Data diddling
Cyber crime
Against Society
Forgery
Cyber
Terrorism
Web Jacking
Cyber crime against individual-
1. Email spoofing-
A spoofed email is one in which e-mail header is forged so that mail appears
to originate from one source but actually has been sent from another source.
2. Spamming-
Spamming means sending multiple copies of unsolicited mails or mass e-mails
such as chain letters.
3. Cyber Defamation-
This occurs when defamation takes place with the help of computers & internet.
4. Harassment & Cyber stalking-
Cyber stalking means following the moves of an individual activity over the
internet.
Cyber crime against property-
1. Credit card fraud-
fraud committed using or involving a payment card, such as a credit card or
debit card, as a fraudulent source of funds in a transaction.
2. Intellectual Property crimes-
These include Software piracy: illegal copying of programs
Copyright infringement
3. Internet time theft-
the usage of the internet hours by an unauthorised person which is actually
paid by another person.
Cyber crime against Organization –
1. E-mail bombing-
Sending large numbers of mails to the individual or company or mail
servers thereby ultimately resulting into crashing.
2. Salami attack-
When negligible amount are removed & accumulated into something larger.
These attacks are used for the commission of financial crimes.
3. Logic bomb-
It is an event dependent programme, it crashes the computer, release a virus
or any other harmful possibilities.
Cyber crime against Society-
1. Forgery-
currency notes, revenue stamps , mark sheets etc can be forged using
computers & high quality scanners & printers.
2. Cyber Terrorism-
Use of computer resources to intimidate or coerce others.
3. Web Jacking-
Hackers gain access & control over the website of another, even they change
the content of website for fulfilling political objective or for money.
1. HACKING-
”Hacking” is a crime, which entails cracking systems & gaining unauthorised access to the data
stored in them.
2. Cyber Squatting-
Cyber Squatting is the act of registering a famous Domain Name & then selling it for a fortune.
3. Phishing-
It is just one of the many frauds on the internet trying to fool people into parting with their
money.
4. Vishing-
It is the criminal practice of using social engineering and Voice
over IP to gain access to private personal & financial information from the
public for the purpose of financial reward.
1. United
states of
America
23%
2. China
9%
3. Germany
6%
4. Britain
5%5. Brazil
4%
6. Spain
4%
7. Italy
3%
8. France
3%
9. Turkey
3%
10. Poland
3%
11. India
3%
12.
Russia
2%
13.
Canada
2%
14. S. Korea
2%
15. Taiwan
2%
16. Japan
2%
17.
Mexico
2%
18.
Argentina
1%
19.
Australia
1%
20. Israel
1%
Other Countries
19%
Cyber Crime Top 20 Countries
• Internet Security is a branch of computer security
specifically related to the internet.
• It’s objective is to establish rules & measure to use
against attacks over the internet.
• It can defend us from critical attacks.
• You can also browse the safe websites.
• Internet security process all the incoming & outgoing data
on our computer.
PREVENTION & SAFETY TIPS
• Don’t throw out anything with your name and
address.
• Check your statements carefully & report anything
suspicious to the bank on financial service provider
concerned.
• Use antivirus Software.
• Insert firewall.
• Uninstall necessary software.
• Maintain backup.
• Always choose strong passwords & keep them safe.
Cyber  crime

Más contenido relacionado

La actualidad más candente

Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

La actualidad más candente (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Phishing
PhishingPhishing
Phishing
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 

Destacado (8)

CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Złośliwi użytkownicy internetu
Złośliwi użytkownicy internetuZłośliwi użytkownicy internetu
Złośliwi użytkownicy internetu
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar a Cyber crime

Similar a Cyber crime (20)

Final ppt
Final pptFinal ppt
Final ppt
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 

Último

Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 

Último (18)

ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 

Cyber crime

  • 1. By
  • 2. • INTRODUCTION • DEFINITION • CLASSIFICATION OF Cyber Crime • CYBER THREAT EVOLUTION (with diagram) • CYBER CRIME VARIANTS • CYBER SECURITY • PREVENTION • CONCLUSION
  • 3. • Everyone who works with a computer must be familiar with the term “Cyber Crime.” Initially, when man invented computer & then the technology for communicating between computers was evolved, he would have never thought that the cyber space he is creating could be flooded with any crime like cyber crime.
  • 4. • Cyber crime refers to all the activities done with criminal intent in cyberspace. • It’s an activity which is criminal in nature, where a computer or network is the source, tool, target, or place of a crime.
  • 5. Cyber crime against individual Email spoofing Spamming Cyber Defamation Harassment & Cyber stalking Cyber crime against Property Credit Card Fraud Intellectual Property crimes Internet time theft Cyber crime Against Organisation Email Bombing Salami Attack Logic Bomb Trojan Horse Data diddling Cyber crime Against Society Forgery Cyber Terrorism Web Jacking
  • 6. Cyber crime against individual- 1. Email spoofing- A spoofed email is one in which e-mail header is forged so that mail appears to originate from one source but actually has been sent from another source. 2. Spamming- Spamming means sending multiple copies of unsolicited mails or mass e-mails such as chain letters. 3. Cyber Defamation- This occurs when defamation takes place with the help of computers & internet. 4. Harassment & Cyber stalking- Cyber stalking means following the moves of an individual activity over the internet.
  • 7. Cyber crime against property- 1. Credit card fraud- fraud committed using or involving a payment card, such as a credit card or debit card, as a fraudulent source of funds in a transaction. 2. Intellectual Property crimes- These include Software piracy: illegal copying of programs Copyright infringement 3. Internet time theft- the usage of the internet hours by an unauthorised person which is actually paid by another person.
  • 8. Cyber crime against Organization – 1. E-mail bombing- Sending large numbers of mails to the individual or company or mail servers thereby ultimately resulting into crashing. 2. Salami attack- When negligible amount are removed & accumulated into something larger. These attacks are used for the commission of financial crimes. 3. Logic bomb- It is an event dependent programme, it crashes the computer, release a virus or any other harmful possibilities.
  • 9. Cyber crime against Society- 1. Forgery- currency notes, revenue stamps , mark sheets etc can be forged using computers & high quality scanners & printers. 2. Cyber Terrorism- Use of computer resources to intimidate or coerce others. 3. Web Jacking- Hackers gain access & control over the website of another, even they change the content of website for fulfilling political objective or for money.
  • 10.
  • 11. 1. HACKING- ”Hacking” is a crime, which entails cracking systems & gaining unauthorised access to the data stored in them. 2. Cyber Squatting- Cyber Squatting is the act of registering a famous Domain Name & then selling it for a fortune. 3. Phishing- It is just one of the many frauds on the internet trying to fool people into parting with their money. 4. Vishing- It is the criminal practice of using social engineering and Voice over IP to gain access to private personal & financial information from the public for the purpose of financial reward.
  • 12. 1. United states of America 23% 2. China 9% 3. Germany 6% 4. Britain 5%5. Brazil 4% 6. Spain 4% 7. Italy 3% 8. France 3% 9. Turkey 3% 10. Poland 3% 11. India 3% 12. Russia 2% 13. Canada 2% 14. S. Korea 2% 15. Taiwan 2% 16. Japan 2% 17. Mexico 2% 18. Argentina 1% 19. Australia 1% 20. Israel 1% Other Countries 19% Cyber Crime Top 20 Countries
  • 13. • Internet Security is a branch of computer security specifically related to the internet. • It’s objective is to establish rules & measure to use against attacks over the internet. • It can defend us from critical attacks. • You can also browse the safe websites. • Internet security process all the incoming & outgoing data on our computer.
  • 14. PREVENTION & SAFETY TIPS • Don’t throw out anything with your name and address. • Check your statements carefully & report anything suspicious to the bank on financial service provider concerned. • Use antivirus Software. • Insert firewall. • Uninstall necessary software. • Maintain backup. • Always choose strong passwords & keep them safe.