SlideShare a Scribd company logo
1 of 19
By:- MANISH SINGH
BCA II (M)
 The internet in India is growing rapidly. It has given
rise to new opportunities in every field we can think of
be it entertainment, business, sports or education.
 There’re two sides to a coin. Internet also has it’s own
disadvantages is Cyber crime- illegal activity
committed on the internet.
INTRODUCTION
 Cyber crime refers to any crime that involves a
computer/mobile and a network. The computer may
have been used in the commission of a crime, or it
may be the target.
WHAT IS CYBER CRIME
??
CYBER THREAT EVOLUTION
WHAT ARE THE CURRENT
TRENDS IN CYBER
CRIME?
GROWTH OF CYBER CRIME CASES IN
INDIA 2011 – 2015
 The country has registered 107% of CAGR (Common Anual
Growth Rate) in the number of Cyber Crimes registered in
last few years.
 Nearly 13,301 Cyber Crime cases were registered in 2011
 The number increased by almost 50 percent in the following
year, reaching 22,060
 The statistics of 2013 stupor people as it shows the
unexpected increase, making the count of cyber crime cases
reach 71,780 .
 Surprisingly, in 2014 the number of cases registered under
Cyber Crime laws increased by more than 100% to 1,49,254.
OF
G
R
O
W
T
H
INDIAN TRENDS IN
CYBERCRIME IN 2015
• 3rd in list countries from where cyber attacks originate
• 11th most targeted country in the world with 5 lakh attacks
• Tops world in social media scams with 16% of all such
attacks being on Indians
• Most Indian enterprises were attacked repeatedly, with
small and medium enterprises being more likely targets
• 40% companies in banking and financial services industry,
50% in mining were attacked at least once
• 35% of all crypto-ransomware attacks of the world were
on Indians
CURRENT TRENDS IN CYBERCRIME
1) ONLINE BANKING AND CARD RELATED
FRAUD
2) RANSOMWARE
3) PHISING
ONLINE BANKING AND PLASTIC
CARD-RELATED FRAUD
 Debit card fraud occurs when a criminal gains
access to your debit card number and, in some
cases, PIN, to make unauthorized purchases and/or
withdraw cash from your account.
 The incidence of ATM, credit, debit card and net
banking-related fraud has gone up by more than 35
percent between 2012-13 and 2015-16 in India,
according to country's federal bank Reserve Bank of
India (RBI).
8,765
9,500
13,083 11,997
0
2,000
4,000
6,000
8,000
10,000
12,000
14,000
16,000
18,000
2012-13 2013-14 2014-15 2015-16
NUMBEROFCASESREPORTED
YEAR
Online Banking and Card related Fraud In India During
2012-16
RANSOMWARE
 Ransomware is not a type of attack. It is a software.
Ransomware = Ransom + ware. ie, A software used by a
criminal to extract ransom from a person
 “Ransomware attacks are high in India and it is one the
top five countries that has most infections,” Vitaly
Kamluk, Head of APAC Global Research and Analysis
Team, Kaspersky Lab, told IANS.
RANSOMWARE ATTACK IN INDIA
 India takes the first spot in the list of countries that
were attacked by Teslacrypt ransomware in
March-May 2016
 And ranked fourth in the countries that was
attacked by Locky ransomware during the same
period.
 In India, while 11,674 users were attacked by
TeslaCrypt ransomware during March-May 2016
 564 users were attacked by Locky ransomware
during the same period.
PHISING
 Phishing is a fraudulent attempt, usually made through
email, to steal your personal information
 According to Google’s Safe Browsing service, the
amount of malware websites dropped from 18,454 to
14,977 between 2014 and 2015, while the amount of
phishing sites increased from 24,864 to 33,571 during
the same period.
 The Anti-Phishing Working Group (APWG) observed
more phishing attacks in the first quarter of 2016 than
in any other three-month span since it began tracking
data in 2004
 The APWG reported that the number of phishing
websites it detected jumped a startling 250 percent
between October 2015 and March 2016.
 APWG detected a record 289,371 unique phishing
websites in Q1, 123,555 of which were found in March
2016 alone
PHISING CONTINUES….
HOW TO TACKLE SUCH ACTIVITIES??
 Awareness is the first step in protecting yourself,
your family and your business.
 Invest in Anti-virus, Firewall, and SPAM blocking
software for your PC.
 Detect secure websites when conducting
transactions online.
 Do NOT respond or act on emails sent from
unknown sources.
Trends in cyber crime

More Related Content

What's hot

What's hot (20)

Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 

Similar to Trends in cyber crime

phishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfphishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdf
chauhan323234
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
Dominic A Ienco
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
wlynn1
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
sainnrg
 

Similar to Trends in cyber crime (20)

Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
phishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfphishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdf
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Top 5 it security threats for 2015
Top 5 it security threats for 2015Top 5 it security threats for 2015
Top 5 it security threats for 2015
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
cybercrime-191029040729.pptx ciber crime
cybercrime-191029040729.pptx ciber crimecybercrime-191029040729.pptx ciber crime
cybercrime-191029040729.pptx ciber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

Trends in cyber crime

  • 2.  The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.  There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet. INTRODUCTION
  • 3.  Cyber crime refers to any crime that involves a computer/mobile and a network. The computer may have been used in the commission of a crime, or it may be the target. WHAT IS CYBER CRIME ??
  • 5. WHAT ARE THE CURRENT TRENDS IN CYBER CRIME?
  • 6. GROWTH OF CYBER CRIME CASES IN INDIA 2011 – 2015  The country has registered 107% of CAGR (Common Anual Growth Rate) in the number of Cyber Crimes registered in last few years.  Nearly 13,301 Cyber Crime cases were registered in 2011  The number increased by almost 50 percent in the following year, reaching 22,060  The statistics of 2013 stupor people as it shows the unexpected increase, making the count of cyber crime cases reach 71,780 .  Surprisingly, in 2014 the number of cases registered under Cyber Crime laws increased by more than 100% to 1,49,254. OF G R O W T H
  • 7.
  • 8.
  • 9.
  • 10. INDIAN TRENDS IN CYBERCRIME IN 2015 • 3rd in list countries from where cyber attacks originate • 11th most targeted country in the world with 5 lakh attacks • Tops world in social media scams with 16% of all such attacks being on Indians • Most Indian enterprises were attacked repeatedly, with small and medium enterprises being more likely targets • 40% companies in banking and financial services industry, 50% in mining were attacked at least once • 35% of all crypto-ransomware attacks of the world were on Indians
  • 11. CURRENT TRENDS IN CYBERCRIME 1) ONLINE BANKING AND CARD RELATED FRAUD 2) RANSOMWARE 3) PHISING
  • 12. ONLINE BANKING AND PLASTIC CARD-RELATED FRAUD  Debit card fraud occurs when a criminal gains access to your debit card number and, in some cases, PIN, to make unauthorized purchases and/or withdraw cash from your account.  The incidence of ATM, credit, debit card and net banking-related fraud has gone up by more than 35 percent between 2012-13 and 2015-16 in India, according to country's federal bank Reserve Bank of India (RBI).
  • 13. 8,765 9,500 13,083 11,997 0 2,000 4,000 6,000 8,000 10,000 12,000 14,000 16,000 18,000 2012-13 2013-14 2014-15 2015-16 NUMBEROFCASESREPORTED YEAR Online Banking and Card related Fraud In India During 2012-16
  • 14. RANSOMWARE  Ransomware is not a type of attack. It is a software. Ransomware = Ransom + ware. ie, A software used by a criminal to extract ransom from a person  “Ransomware attacks are high in India and it is one the top five countries that has most infections,” Vitaly Kamluk, Head of APAC Global Research and Analysis Team, Kaspersky Lab, told IANS.
  • 15. RANSOMWARE ATTACK IN INDIA  India takes the first spot in the list of countries that were attacked by Teslacrypt ransomware in March-May 2016  And ranked fourth in the countries that was attacked by Locky ransomware during the same period.  In India, while 11,674 users were attacked by TeslaCrypt ransomware during March-May 2016  564 users were attacked by Locky ransomware during the same period.
  • 16. PHISING  Phishing is a fraudulent attempt, usually made through email, to steal your personal information  According to Google’s Safe Browsing service, the amount of malware websites dropped from 18,454 to 14,977 between 2014 and 2015, while the amount of phishing sites increased from 24,864 to 33,571 during the same period.
  • 17.  The Anti-Phishing Working Group (APWG) observed more phishing attacks in the first quarter of 2016 than in any other three-month span since it began tracking data in 2004  The APWG reported that the number of phishing websites it detected jumped a startling 250 percent between October 2015 and March 2016.  APWG detected a record 289,371 unique phishing websites in Q1, 123,555 of which were found in March 2016 alone PHISING CONTINUES….
  • 18. HOW TO TACKLE SUCH ACTIVITIES??  Awareness is the first step in protecting yourself, your family and your business.  Invest in Anti-virus, Firewall, and SPAM blocking software for your PC.  Detect secure websites when conducting transactions online.  Do NOT respond or act on emails sent from unknown sources.