SlideShare una empresa de Scribd logo
1 de 20
Cyber Crime & Money
Laundering Group no. 5
( Roll no.21 to 25)
What is Cyber Crime?
• U s e of a computer/internet to do something that would be a crime in any case.
•
Dictionary definition is
“Criminal activity or a crime that involves the Internet, a
computer system or computer technology; identity theft, phishing
and other kinds of cyber crime”
•CREDIT
CARDFRAUD
•IDENTITY
THEFT
•S PA M •VIRUSES
HISTORY OF CYBER CRIME
• The first recorded cyber crime took place in 1820.
• That is not surprising considering the fact that the abacus, which is thought
to be the earliest from of a computer, has been around since 3500 B.C.
• In India, Japan and China, the era of modern computer, however, began with
the analytical engine of Charles Babbage.
• The first spam email took place in 1976 when it was sent out over the
ARPANT.
• The first virus was installed on an Apple computer in 1982 when a high
school student, Rich skrenta, developed the EIK Cloner.
Categories of Cyber Crime
The computer as a target
• using a computer to attacks
other computer, e.g. Hacking,
virus/worms attacks, Dos
attack etc.
The computer as a weapon
• using a computer to commit
real world crime e.g. cyber
terrorism, credit card fraud
and pornography etc.
TYPES OF CYBER CRIME
Hacking
CyberTerrorism
InformationTheft
Phishing
Software Piracy
Virus Dissemination
CYBER CRIMES THREATENS NATIONAL SECURITY IN INDIA
Likewise Union home minister Rajnath Singh said that the rising level of cyber crime is an
indication of enormous threat to national security. On Google’s social networking site
Facebook, Twitter have been perplexing authorities . Fan clubs of Underworld Dons like
Dawood Ibrahim and Chhota Shakeel and other wanted underworld dons are also doing
the rounds on twitter. There is huge potential for damage to national security through
cyber attacks. The internet is a means for money bounding and funding terrorist attacks in
an organized manner.
CYBER SECURITY
• Cyber Security
• Privacy Policy
• Keep Software Up to Date
• DISABLE REMOTE CONNECTIVITY
ADVANTAGES OF CYBER SECURITY
• The cyber security will defend us from critical attacks.
• It helps us to browse the site, website.
• Internet Security process all the incoming and outgoing
data on your computer.
• It will defend us from hacks and virus.
• Application of cyber security used in our PC needs update
every week
SAFETYTIPSTO CYBER CRIME
• Use antivirus Software
• Insert Firewalls
• Uninstall unnecessary software
• Maintain backup
• Check security settings
CYBER LAW OF INDIA
•Information
Technology
Act, 2000
•Indian
Penal Code
How much of a problem is Cybercrime?
 Cybercrime is a global plague
 New and evolving technologies provide almost complete anonymity to
criminals seeking to exploit this arena.
 40% of the world population (2.5 billion) use the internet
 Forecast that another 1.5 billion people will get access to the internet over
the next four years.
 The number of connected devices will almost triple by 2020 from 13.4
billion to 38.5 billion
 Global losses inflicted by cybercrime exceeds US$400 Billion
Why is cybercrime so difficult to detect?
• Cybercrime can be committed from anywhere in the world
• Relatively easy and cost effective crime. All you need is a computer and
access to the Internet
• Difficult to trace identities
• There are criminal organisations that exist whose sole job is to commit
cyber offences – Hacktivists
• Those who are the victims of cybercrime do not always want to disclose
the fact to investigating authorities
SUDDENLY
WHAT HAPPEN
IN PUNE ????
What is Money Laundering ?
Money laundering is any
transaction which seeks to
conceal or disguise
proceeds from illegal
activities.
2. PLACEMENT
3.
LAYERING
4.
INTEGRATION
•The last stage in the laundering
process.
•Occurs when the laundered
proceeds are distributed back to
the criminal.
•Creates appearance of legitimate
wealth.
• Involves distancing the money
from its criminal source:
• movements of $ into different
accounts
• movements of money to
different countries
• Increasingly difficult to detect
• Initial introduction of criminal
proceeds into the stream of
commerce
• Most vulnerable stage of
money laundering process
1.Crimes
• Corruption and Bribery
• Fraud
• Organized crime
• Drug and human
trafficking
• Environmental crime
• Terrorism
Money LaunderingCycle
Banks Brokerage firms
Financial services
Crooked
LAWYERS and
ACCOUNTANTS
Money is laundered
through…
Simple Bribe and Money LaunderingTransaction
Company A
• Needs to generate 10
million for bribe to
Finance Minister.
• Uses invoices from
company in Country 2
Country 1
Country 2
Company BankAccount
Country 3
Company owned by Minister’s cousin
Country 4
10.0,00,000 - Purchase
of Real Estate
50,0,00,000 - Purchase
of Bearer Share
Money laundering, why should we care?
Is a global
threat;
Is fuel to
expand
criminal
enterprise;
Helps hide
corrupt
payments;
Uneven
playing field
for honest
business;
• Economic:
• Deters private investment
• Destroys competition
• Revenue impact
• Financial:
• Perpetuates corruption, obstructs good
governance
• Erodes confidence
• Destabilizes financial institutions
Cybercrime is indeed getting the recognition it deserves. However, it is not going to
restricted that easily . In fact , it is highly likely that cyber crime and its hackers will
continue developing and upgrading to stay ahead of the law.
So, to make us a safer we must need cyber security.
1) Wikipedia
2) Google.com
3) www.legalindia.com
4) Times of India
CYBERCRIME AND MONEY LAUNDERING

Más contenido relacionado

La actualidad más candente

Cyber laws
Cyber lawsCyber laws
Cyber laws
madhu190
 
Money laundering
Money launderingMoney laundering
Money laundering
liozaja
 

La actualidad más candente (20)

Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Money Laundering Presentation
Money Laundering PresentationMoney Laundering Presentation
Money Laundering Presentation
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Money Laundering and Corruption
Money Laundering and CorruptionMoney Laundering and Corruption
Money Laundering and Corruption
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
ANTI-MONEY LAUNDERING ACT, 2010
ANTI-MONEY LAUNDERING ACT, 2010 ANTI-MONEY LAUNDERING ACT, 2010
ANTI-MONEY LAUNDERING ACT, 2010
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
MasterSnacks: Cryptocurrency - Fraud and Forensic Accounting for Digital Assets
MasterSnacks: Cryptocurrency - Fraud and Forensic Accounting for Digital AssetsMasterSnacks: Cryptocurrency - Fraud and Forensic Accounting for Digital Assets
MasterSnacks: Cryptocurrency - Fraud and Forensic Accounting for Digital Assets
 
Case of baazee
Case of baazeeCase of baazee
Case of baazee
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Anti money laundering
Anti money launderingAnti money laundering
Anti money laundering
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 

Similar a CYBERCRIME AND MONEY LAUNDERING

Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 

Similar a CYBERCRIME AND MONEY LAUNDERING (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Final ppt
Final pptFinal ppt
Final ppt
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

CYBERCRIME AND MONEY LAUNDERING

  • 1. Cyber Crime & Money Laundering Group no. 5 ( Roll no.21 to 25)
  • 2. What is Cyber Crime? • U s e of a computer/internet to do something that would be a crime in any case. • Dictionary definition is “Criminal activity or a crime that involves the Internet, a computer system or computer technology; identity theft, phishing and other kinds of cyber crime” •CREDIT CARDFRAUD •IDENTITY THEFT •S PA M •VIRUSES
  • 3. HISTORY OF CYBER CRIME • The first recorded cyber crime took place in 1820. • That is not surprising considering the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.C. • In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. • The first spam email took place in 1976 when it was sent out over the ARPANT. • The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 4. Categories of Cyber Crime The computer as a target • using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. The computer as a weapon • using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
  • 5. TYPES OF CYBER CRIME Hacking CyberTerrorism InformationTheft Phishing Software Piracy Virus Dissemination
  • 6. CYBER CRIMES THREATENS NATIONAL SECURITY IN INDIA Likewise Union home minister Rajnath Singh said that the rising level of cyber crime is an indication of enormous threat to national security. On Google’s social networking site Facebook, Twitter have been perplexing authorities . Fan clubs of Underworld Dons like Dawood Ibrahim and Chhota Shakeel and other wanted underworld dons are also doing the rounds on twitter. There is huge potential for damage to national security through cyber attacks. The internet is a means for money bounding and funding terrorist attacks in an organized manner.
  • 7. CYBER SECURITY • Cyber Security • Privacy Policy • Keep Software Up to Date • DISABLE REMOTE CONNECTIVITY
  • 8. ADVANTAGES OF CYBER SECURITY • The cyber security will defend us from critical attacks. • It helps us to browse the site, website. • Internet Security process all the incoming and outgoing data on your computer. • It will defend us from hacks and virus. • Application of cyber security used in our PC needs update every week
  • 9. SAFETYTIPSTO CYBER CRIME • Use antivirus Software • Insert Firewalls • Uninstall unnecessary software • Maintain backup • Check security settings
  • 10. CYBER LAW OF INDIA •Information Technology Act, 2000 •Indian Penal Code
  • 11. How much of a problem is Cybercrime?  Cybercrime is a global plague  New and evolving technologies provide almost complete anonymity to criminals seeking to exploit this arena.  40% of the world population (2.5 billion) use the internet  Forecast that another 1.5 billion people will get access to the internet over the next four years.  The number of connected devices will almost triple by 2020 from 13.4 billion to 38.5 billion  Global losses inflicted by cybercrime exceeds US$400 Billion
  • 12. Why is cybercrime so difficult to detect? • Cybercrime can be committed from anywhere in the world • Relatively easy and cost effective crime. All you need is a computer and access to the Internet • Difficult to trace identities • There are criminal organisations that exist whose sole job is to commit cyber offences – Hacktivists • Those who are the victims of cybercrime do not always want to disclose the fact to investigating authorities
  • 14. What is Money Laundering ? Money laundering is any transaction which seeks to conceal or disguise proceeds from illegal activities.
  • 15. 2. PLACEMENT 3. LAYERING 4. INTEGRATION •The last stage in the laundering process. •Occurs when the laundered proceeds are distributed back to the criminal. •Creates appearance of legitimate wealth. • Involves distancing the money from its criminal source: • movements of $ into different accounts • movements of money to different countries • Increasingly difficult to detect • Initial introduction of criminal proceeds into the stream of commerce • Most vulnerable stage of money laundering process 1.Crimes • Corruption and Bribery • Fraud • Organized crime • Drug and human trafficking • Environmental crime • Terrorism Money LaunderingCycle
  • 16. Banks Brokerage firms Financial services Crooked LAWYERS and ACCOUNTANTS Money is laundered through…
  • 17. Simple Bribe and Money LaunderingTransaction Company A • Needs to generate 10 million for bribe to Finance Minister. • Uses invoices from company in Country 2 Country 1 Country 2 Company BankAccount Country 3 Company owned by Minister’s cousin Country 4 10.0,00,000 - Purchase of Real Estate 50,0,00,000 - Purchase of Bearer Share
  • 18. Money laundering, why should we care? Is a global threat; Is fuel to expand criminal enterprise; Helps hide corrupt payments; Uneven playing field for honest business; • Economic: • Deters private investment • Destroys competition • Revenue impact • Financial: • Perpetuates corruption, obstructs good governance • Erodes confidence • Destabilizes financial institutions
  • 19. Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily . In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security. 1) Wikipedia 2) Google.com 3) www.legalindia.com 4) Times of India