SlideShare a Scribd company logo
1 of 32
Introduction
History of cyber crime
What is cyber crime?
Classification
Types of cyber crime
Cyber criminals
Prevention
Conclusion
 Cyber crime is an “unlawful acts wherein the computer
is either a tool or target or both”
The term “cyber crime” was first coined by Barry
Collins in 1980’s.
Criminals simply devise different ways to undertake
standard criminal activities such as fraud theft, blackmail,
forgery using the new medium, often involving the
Internet.
 The first recorded cyber crime took place in the year
1820!
The first spam email took place in 1978 when it was
sent out over the Arpanet.
 The first virus was installed on an Apple computer in
1982.
Denial of Service (DoS) attacks by „Mafia Boy‟ on
eBay, Yahoo! and other popular sites (2000)
 FBI's e-mail system is hacked (Feb,2005)
“Cybercrime is criminal activity done using computers and the Internet.”

Criminal activity involving






Information technology infrastructure
Illegal access
Data interference
Misuse of devices
Forgery and
Electronic fraud.
 Against Individuals

 Against Organization

 Against Society
 Harassment via e-mails

 Email spoofing
 Defamation. Unauthorized control/access

over computer system
 Cheating & Fraud
 Phishing
Unauthorized

control/access over
computer system.
Possession

of unauthorized information.

Cyber

terrorism against the government
organization.
Distribution

of pirated software etc.
Polluting the youth through

indecent exposure.
 Trafficking
 Financial crimes
 Sale of illegal articles
 Online gambling
 Forgery











Hacking
Phishing
Cyber Stalking
Denial of service attack
Virus Dissemination
Computer Vandalism
Cyber Terrorism
Software Piracy
Email spoofing
Trojan attacks
 Hacking in simple terms means an illegal intrusion
into a computer system and/or network .Also called
as cracking!

Hacking means finding out weaknesses in an
established system and exploiting them. A
computer hacker is a person who finds out
weaknesses in the computer and exploits it.









For profit, protest, or challenge.
A large fraction of hacker attacks have been
pranks
Financial Gain
Revenge
Venting anger at a company or organization
Terrorism
A deception designed to steal valuable personal data,
such as credit card numbers, passwords, account data,
or other information.
In order for Internet criminals to successfully “phish”
a personal information, they must go from an email to a
website.
It is the use of the Internet or other electronic
means to stalk someone.
This term is used interchangeably with online
harassment and online abuse.
 Attack through which a person can render a system
unusable or significantly slow down the system for
legitimate users by overloading the system so that no
one else can use it.
 Act by the criminal, who floods the bandwidth of
the victims network.
Malicious software that attaches itself to other
software. (virus, worms, Trojan Horse etc.)
 Damaging or destroying data rather than stealing.
 Transmitting virus
Use of Internet based attacks in terrorist activities.
Technology savvy terrorists are using 512-bit
encryption, which is impossible to decrypt.
Theft of software through the illegal copying of
genuine programs.
Distribution of products intended to pass for
the original.
A spoofed email is one that appears to originate from
one source but actually has been sent from another
source.
The program that act like something useful but do
the things that are quiet damping. The programs of
this kind are called as Trojans.
Insider Threats

Hackers

Hactivists'

(employees)

(teenage thrill-seekers to
sophisticated criminals)

(overloads e-mail servers or hack
web sites to send political
message)

Virus writers

Criminal
groups

Sensitive
intrusions

(attack systems & steal
password for financial gain)

(sensitive information is
obtained via computer
intrusions)

Terrorists

Cyber Warfare

(who have potential to disrupt
government systems with
computer attacks)

(attack by sovereigns --- Crime
or Declaration of war)

(writes viruses to that infect
systems)

Information
warfare
(alternative to military attacks)
Cyber Crime

In

India

 The majority of cybercrimes are centered on fraud and Phishing,
 India is the third-most targeted country for Phishing attacks after
the US and the UK,
 Social networks as well as ecommerce sites are major targets,
 6.9 million bot-infected systems in 2010,
 14,348 website defacements in 2010,
 6,850 .in and 4,150 .com domains were defaced during 2011,
 15,000 sites hacked in 2011,
 India is the number 1 country in the world for generating spam.
 Anti-virus software

 Firewalls.
 Safe surfing.

 Frequent virus checks.
 Email filters.
Frequent password changing.
History is the witness that no legislation has succeeded in
totally eliminating crime.
We need to bring changes in the Information Technology
Act to make it more effective to combat cyber crime.
 User awareness is key to a secure computer/network
 Do not open suspicious files/emails
 Avoid using P2P programs
 Avoid downloading freeware
Cybercrime
Cybercrime

More Related Content

What's hot

Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa
 

What's hot (20)

Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Ppt
PptPpt
Ppt
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 

Viewers also liked

computer crime
computer crimecomputer crime
computer crime
00jitesh00
 
Computer crime
Computer crimeComputer crime
Computer crime
nurdiva123
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
Harsha Matta
 
Giai phap chu_yeu_nham_nang_cao_nang_luc_canh_tranh_cua_cong_ty_chung_khoan_t...
Giai phap chu_yeu_nham_nang_cao_nang_luc_canh_tranh_cua_cong_ty_chung_khoan_t...Giai phap chu_yeu_nham_nang_cao_nang_luc_canh_tranh_cua_cong_ty_chung_khoan_t...
Giai phap chu_yeu_nham_nang_cao_nang_luc_canh_tranh_cua_cong_ty_chung_khoan_t...
Tran Quyen
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 

Viewers also liked (20)

computer crime
computer crimecomputer crime
computer crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime : Incident Highlights of 2011-2012
Cyber Crime : Incident Highlights of 2011-2012Cyber Crime : Incident Highlights of 2011-2012
Cyber Crime : Incident Highlights of 2011-2012
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Self study presentation
Self study presentationSelf study presentation
Self study presentation
 
Tr ee executive planning
Tr ee   executive planningTr ee   executive planning
Tr ee executive planning
 
Förändringsstegen
FörändringsstegenFörändringsstegen
Förändringsstegen
 
Nidhila .i
Nidhila .iNidhila .i
Nidhila .i
 
Co-operative education
 Co-operative education Co-operative education
Co-operative education
 
Breaks
BreaksBreaks
Breaks
 
Logo
LogoLogo
Logo
 
Hello_blue
Hello_blueHello_blue
Hello_blue
 
Giai phap chu_yeu_nham_nang_cao_nang_luc_canh_tranh_cua_cong_ty_chung_khoan_t...
Giai phap chu_yeu_nham_nang_cao_nang_luc_canh_tranh_cua_cong_ty_chung_khoan_t...Giai phap chu_yeu_nham_nang_cao_nang_luc_canh_tranh_cua_cong_ty_chung_khoan_t...
Giai phap chu_yeu_nham_nang_cao_nang_luc_canh_tranh_cua_cong_ty_chung_khoan_t...
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 

Similar to Cybercrime

Internet
InternetInternet
Internet
Jodip
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 

Similar to Cybercrime (20)

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Internet
InternetInternet
Internet
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Final ppt
Final pptFinal ppt
Final ppt
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 

Recently uploaded

Recently uploaded (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Cybercrime

  • 1.
  • 2. Introduction History of cyber crime What is cyber crime? Classification Types of cyber crime Cyber criminals Prevention Conclusion
  • 3.  Cyber crime is an “unlawful acts wherein the computer is either a tool or target or both” The term “cyber crime” was first coined by Barry Collins in 1980’s. Criminals simply devise different ways to undertake standard criminal activities such as fraud theft, blackmail, forgery using the new medium, often involving the Internet.
  • 4.  The first recorded cyber crime took place in the year 1820! The first spam email took place in 1978 when it was sent out over the Arpanet.  The first virus was installed on an Apple computer in 1982. Denial of Service (DoS) attacks by „Mafia Boy‟ on eBay, Yahoo! and other popular sites (2000)  FBI's e-mail system is hacked (Feb,2005)
  • 5. “Cybercrime is criminal activity done using computers and the Internet.” Criminal activity involving      Information technology infrastructure Illegal access Data interference Misuse of devices Forgery and Electronic fraud.
  • 6.  Against Individuals  Against Organization  Against Society
  • 7.  Harassment via e-mails  Email spoofing  Defamation. Unauthorized control/access over computer system  Cheating & Fraud  Phishing
  • 8. Unauthorized control/access over computer system. Possession of unauthorized information. Cyber terrorism against the government organization. Distribution of pirated software etc.
  • 9. Polluting the youth through indecent exposure.  Trafficking  Financial crimes  Sale of illegal articles  Online gambling  Forgery
  • 10.           Hacking Phishing Cyber Stalking Denial of service attack Virus Dissemination Computer Vandalism Cyber Terrorism Software Piracy Email spoofing Trojan attacks
  • 11.
  • 12.  Hacking in simple terms means an illegal intrusion into a computer system and/or network .Also called as cracking! Hacking means finding out weaknesses in an established system and exploiting them. A computer hacker is a person who finds out weaknesses in the computer and exploits it.
  • 13.       For profit, protest, or challenge. A large fraction of hacker attacks have been pranks Financial Gain Revenge Venting anger at a company or organization Terrorism
  • 14.
  • 15. A deception designed to steal valuable personal data, such as credit card numbers, passwords, account data, or other information. In order for Internet criminals to successfully “phish” a personal information, they must go from an email to a website.
  • 16. It is the use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse.
  • 17.  Attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the system so that no one else can use it.  Act by the criminal, who floods the bandwidth of the victims network.
  • 18. Malicious software that attaches itself to other software. (virus, worms, Trojan Horse etc.)
  • 19.  Damaging or destroying data rather than stealing.  Transmitting virus
  • 20. Use of Internet based attacks in terrorist activities. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 21. Theft of software through the illegal copying of genuine programs. Distribution of products intended to pass for the original.
  • 22. A spoofed email is one that appears to originate from one source but actually has been sent from another source.
  • 23. The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans.
  • 24. Insider Threats Hackers Hactivists' (employees) (teenage thrill-seekers to sophisticated criminals) (overloads e-mail servers or hack web sites to send political message) Virus writers Criminal groups Sensitive intrusions (attack systems & steal password for financial gain) (sensitive information is obtained via computer intrusions) Terrorists Cyber Warfare (who have potential to disrupt government systems with computer attacks) (attack by sovereigns --- Crime or Declaration of war) (writes viruses to that infect systems) Information warfare (alternative to military attacks)
  • 25.
  • 26. Cyber Crime In India  The majority of cybercrimes are centered on fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam.
  • 27.  Anti-virus software  Firewalls.  Safe surfing.  Frequent virus checks.  Email filters. Frequent password changing.
  • 28.
  • 29.
  • 30. History is the witness that no legislation has succeeded in totally eliminating crime. We need to bring changes in the Information Technology Act to make it more effective to combat cyber crime.  User awareness is key to a secure computer/network  Do not open suspicious files/emails  Avoid using P2P programs  Avoid downloading freeware