SlideShare una empresa de Scribd logo
1 de 30
- Compiled and presented by Mubaraka Halvadwala
Cyber Crime
Introduction
• World is coming closer.
• It is smaller place to live in
• Endless opportunity
• “Cyber Crimes”
• It is growing steadily
• Fastest-growing range of illegal activity
• Can happen Anytime or Anyplace
12/15/2015SNDTWU
1
• Cyber Crime: Introduction
• What is cybercrime?
• Definition of cyber crime
• History of Cyber Crime
• Cyber Crime in Modern Society
• Types of cyber crime
– Hacking
– Cyber Stalking
– Child Pornography
– Phishing
– Spoofing
– Piracy/ theft
– Bullying and Harassment
• Preventions
Content outline
12/15/2015SNDTWU
2
At the end of this webinar, you will be able to,
• Define and describe cyber crime in your own words
• Acquire information about the various types of cyber crime
that are present in our society
• Identify and state the types of cyber crime
• Describe the types of cyber crimes in your own words
• Illustrate the types of cyber crimes with suitable examples
• Discuss the ways to prevent cybercrime
Objectives
12/15/2015SNDTWU
3
• Illegal behavior directed by means of electronic
operations
• Targets the security of computer systems
• Cyber crime is a generic term
• The computer is either a tool or a target or both.
What is cybercrime?
12/15/2015SNDTWU
4
Cybercrime is a criminal offense on the Web, a criminal offense
regarding the Internet, a violation of law on the Internet, an
illegality committed with regard to the Internet.
–By Farlex
Definition of cyber crime
12/15/2015SNDTWU
5
12/15/2015SNDTWU
6
TypesHacking
Cyber
stalking
Identity theft
Child
pornography
Phishing
Spoofing
Piracy
Bullying
Hacking
It is the act of gaining unauthorized access to a computer system or
network and making unauthorized use of this access
Types of cyber crime
12/15/2015SNDTWU
7
Scenario 1 Scenario 2 Scenario 3
Scenario 1
The victim’s email account password is stolen
and the account is then misused for
sending out malicious code (virus, worm,
Trojan etc.) to people in the victim’s
address book. The recipients of these
viruses believe that the email is coming
from a known person and run the
attachments. This infects their computers
with the malicious code.
Types of cyber crimeHacking
12/15/2015SNDTWU
8
The victim’s email account password is stolen and the hacker tries to
extort money from the victim. The victim is threatened that if he
does not pay the money, the information contained in the emails
will be misused.
Types of cyber crimeHacking Scenario 2
12/15/2015SNDTWU
9
The victim’s email account password is stolen and obscene emails are
sent to people in the victim’s address book.
Types of cyber crimeHacking Scenario 3
12/15/2015SNDTWU
10
This is a kind of online harassment wherein the victim is subjected to a
bank of online messages and emails.
Types of cyber crimeCyberStalking
12/15/2015SNDTWU
11
Types of cyber crimeCyberStalking
12/15/2015SNDTWU
12
A criminal accesses data about a person’s bank account, credit
cards, Social Security, debit card and other sensitive information
to steal money or to buy things online in the victim’s name.
IdentityTheft
12/15/2015SNDTWU
13
Types of cyber crime
Criminals reach children and practice child sex abuse.
ChildPornography
12/15/2015SNDTWU
14
Types of cyber crime
It is the act of attempting to acquire information such as usernames,
passwords, and credit card details (and sometimes, indirectly,
money) by impersonating a trustworthy object in an electronic
communication.
Phishing
12/15/2015SNDTWU
15
Scenario 1
Types of cyber crime
The victim receives an email that appears to have been sent from his
bank. The email urges the victim to click on the link in the email.
When the victim does so, he is taken to “a secure page on the bank’s
website”. The victim believes the web page to be authentic and he
enters his username, password and other information. In reality, the
website is a fake and the victim’s information is stolen and misused.
Phishing Scenario 1
12/15/2015SNDTWU
16
Types of cyber crime
Getting one computer on a network to pretend to have the identity of
another computer, or developing a fake website which closely
resembles the original one.
Spoofing
12/15/2015SNDTWU
17
Types of cyber crime
Examples
Spoofing
12/15/2015SNDTWU
18
Types of cyber crime
Spoofing
12/15/2015SNDTWU
19
Types of cyber crime
Spoofing
12/15/2015SNDTWU
20
Types of cyber crime
This crime occurs when a person violates copyrights and downloads
music, movies, games and software.
12/15/2015SNDTWU
21
Piracy/theft Types of cyber crime
There have been several cases of teenagers bullying one another over
the Internet.
12/15/2015SNDTWU
22
Scenario 1 Scenario 2 Scenario 3
Bullying/Harassment Types of cyber crime
A fake profile of a woman is created on
Orkut. The profile displays her
correct name and contact
information (such as address,
residential phone number, cell
phone number etc.). Sometimes it
even has her photograph. The
problem is that the profile describes
her as a prostitute or a woman of
“loose character” who wants to have
sexual relations with anyone. Other
Orkut members see this profile and
start calling her at all hours of the
day asking for sexual favors. This
leads to a lot of harassment for the
victim and also defames her in
society.
Scenario 1
12/15/2015SNDTWU
23
Spoofing Types of cyber crime
An online hate community
is created. This
community displays
objectionable
information against a
particular country,
religion or ethnic group
or even against
national leaders and
historical figures.
12/15/2015SNDTWU
24
Scenario 2Spoofing Types of cyber crime
Preventions
12/15/2015SNDTWU
25
Use Strong Passwords
Install the latest operating system updates
Be a Social-Media Savvy
Secure your computer
Preventions
12/15/2015SNDTWU
26
Know the online warning signs
Avoid being trapped
Call the right person for help
Keep your family safe
Preventions
12/15/2015SNDTWU
27
Protect your e-identity
Secure your wireless network
Protect Your Data
Cyber Crime - What is it ?
Cyber Crime - What is it ?

Más contenido relacionado

La actualidad más candente

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitysanjana mun
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 

La actualidad más candente (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 

Destacado

Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Destacado (9)

Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar a Cyber Crime - What is it ?

cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxsainnrg
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twinsNilantha Piyasiri
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeetaAparajeeta Salu
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptxsainnrg
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimeDevanshi Solanki
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...IJCSIS Research Publications
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 

Similar a Cyber Crime - What is it ? (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Final ppt
Final pptFinal ppt
Final ppt
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 

Último

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Último (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Cyber Crime - What is it ?

  • 1. - Compiled and presented by Mubaraka Halvadwala Cyber Crime
  • 2. Introduction • World is coming closer. • It is smaller place to live in • Endless opportunity • “Cyber Crimes” • It is growing steadily • Fastest-growing range of illegal activity • Can happen Anytime or Anyplace 12/15/2015SNDTWU 1
  • 3. • Cyber Crime: Introduction • What is cybercrime? • Definition of cyber crime • History of Cyber Crime • Cyber Crime in Modern Society • Types of cyber crime – Hacking – Cyber Stalking – Child Pornography – Phishing – Spoofing – Piracy/ theft – Bullying and Harassment • Preventions Content outline 12/15/2015SNDTWU 2
  • 4. At the end of this webinar, you will be able to, • Define and describe cyber crime in your own words • Acquire information about the various types of cyber crime that are present in our society • Identify and state the types of cyber crime • Describe the types of cyber crimes in your own words • Illustrate the types of cyber crimes with suitable examples • Discuss the ways to prevent cybercrime Objectives 12/15/2015SNDTWU 3
  • 5. • Illegal behavior directed by means of electronic operations • Targets the security of computer systems • Cyber crime is a generic term • The computer is either a tool or a target or both. What is cybercrime? 12/15/2015SNDTWU 4
  • 6. Cybercrime is a criminal offense on the Web, a criminal offense regarding the Internet, a violation of law on the Internet, an illegality committed with regard to the Internet. –By Farlex Definition of cyber crime 12/15/2015SNDTWU 5
  • 8. Hacking It is the act of gaining unauthorized access to a computer system or network and making unauthorized use of this access Types of cyber crime 12/15/2015SNDTWU 7 Scenario 1 Scenario 2 Scenario 3
  • 9. Scenario 1 The victim’s email account password is stolen and the account is then misused for sending out malicious code (virus, worm, Trojan etc.) to people in the victim’s address book. The recipients of these viruses believe that the email is coming from a known person and run the attachments. This infects their computers with the malicious code. Types of cyber crimeHacking 12/15/2015SNDTWU 8
  • 10. The victim’s email account password is stolen and the hacker tries to extort money from the victim. The victim is threatened that if he does not pay the money, the information contained in the emails will be misused. Types of cyber crimeHacking Scenario 2 12/15/2015SNDTWU 9
  • 11. The victim’s email account password is stolen and obscene emails are sent to people in the victim’s address book. Types of cyber crimeHacking Scenario 3 12/15/2015SNDTWU 10
  • 12. This is a kind of online harassment wherein the victim is subjected to a bank of online messages and emails. Types of cyber crimeCyberStalking 12/15/2015SNDTWU 11
  • 13. Types of cyber crimeCyberStalking 12/15/2015SNDTWU 12
  • 14. A criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to steal money or to buy things online in the victim’s name. IdentityTheft 12/15/2015SNDTWU 13 Types of cyber crime
  • 15. Criminals reach children and practice child sex abuse. ChildPornography 12/15/2015SNDTWU 14 Types of cyber crime
  • 16. It is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by impersonating a trustworthy object in an electronic communication. Phishing 12/15/2015SNDTWU 15 Scenario 1 Types of cyber crime
  • 17. The victim receives an email that appears to have been sent from his bank. The email urges the victim to click on the link in the email. When the victim does so, he is taken to “a secure page on the bank’s website”. The victim believes the web page to be authentic and he enters his username, password and other information. In reality, the website is a fake and the victim’s information is stolen and misused. Phishing Scenario 1 12/15/2015SNDTWU 16 Types of cyber crime
  • 18. Getting one computer on a network to pretend to have the identity of another computer, or developing a fake website which closely resembles the original one. Spoofing 12/15/2015SNDTWU 17 Types of cyber crime Examples
  • 22. This crime occurs when a person violates copyrights and downloads music, movies, games and software. 12/15/2015SNDTWU 21 Piracy/theft Types of cyber crime
  • 23. There have been several cases of teenagers bullying one another over the Internet. 12/15/2015SNDTWU 22 Scenario 1 Scenario 2 Scenario 3 Bullying/Harassment Types of cyber crime
  • 24. A fake profile of a woman is created on Orkut. The profile displays her correct name and contact information (such as address, residential phone number, cell phone number etc.). Sometimes it even has her photograph. The problem is that the profile describes her as a prostitute or a woman of “loose character” who wants to have sexual relations with anyone. Other Orkut members see this profile and start calling her at all hours of the day asking for sexual favors. This leads to a lot of harassment for the victim and also defames her in society. Scenario 1 12/15/2015SNDTWU 23 Spoofing Types of cyber crime
  • 25. An online hate community is created. This community displays objectionable information against a particular country, religion or ethnic group or even against national leaders and historical figures. 12/15/2015SNDTWU 24 Scenario 2Spoofing Types of cyber crime
  • 26. Preventions 12/15/2015SNDTWU 25 Use Strong Passwords Install the latest operating system updates Be a Social-Media Savvy Secure your computer
  • 27. Preventions 12/15/2015SNDTWU 26 Know the online warning signs Avoid being trapped Call the right person for help Keep your family safe
  • 28. Preventions 12/15/2015SNDTWU 27 Protect your e-identity Secure your wireless network Protect Your Data