Interactive Powerpoint_How to Master effective communication
Cyber Crime - What is it ?
1. - Compiled and presented by Mubaraka Halvadwala
Cyber Crime
2. Introduction
• World is coming closer.
• It is smaller place to live in
• Endless opportunity
• “Cyber Crimes”
• It is growing steadily
• Fastest-growing range of illegal activity
• Can happen Anytime or Anyplace
12/15/2015SNDTWU
1
3. • Cyber Crime: Introduction
• What is cybercrime?
• Definition of cyber crime
• History of Cyber Crime
• Cyber Crime in Modern Society
• Types of cyber crime
– Hacking
– Cyber Stalking
– Child Pornography
– Phishing
– Spoofing
– Piracy/ theft
– Bullying and Harassment
• Preventions
Content outline
12/15/2015SNDTWU
2
4. At the end of this webinar, you will be able to,
• Define and describe cyber crime in your own words
• Acquire information about the various types of cyber crime
that are present in our society
• Identify and state the types of cyber crime
• Describe the types of cyber crimes in your own words
• Illustrate the types of cyber crimes with suitable examples
• Discuss the ways to prevent cybercrime
Objectives
12/15/2015SNDTWU
3
5. • Illegal behavior directed by means of electronic
operations
• Targets the security of computer systems
• Cyber crime is a generic term
• The computer is either a tool or a target or both.
What is cybercrime?
12/15/2015SNDTWU
4
6. Cybercrime is a criminal offense on the Web, a criminal offense
regarding the Internet, a violation of law on the Internet, an
illegality committed with regard to the Internet.
–By Farlex
Definition of cyber crime
12/15/2015SNDTWU
5
8. Hacking
It is the act of gaining unauthorized access to a computer system or
network and making unauthorized use of this access
Types of cyber crime
12/15/2015SNDTWU
7
Scenario 1 Scenario 2 Scenario 3
9. Scenario 1
The victim’s email account password is stolen
and the account is then misused for
sending out malicious code (virus, worm,
Trojan etc.) to people in the victim’s
address book. The recipients of these
viruses believe that the email is coming
from a known person and run the
attachments. This infects their computers
with the malicious code.
Types of cyber crimeHacking
12/15/2015SNDTWU
8
10. The victim’s email account password is stolen and the hacker tries to
extort money from the victim. The victim is threatened that if he
does not pay the money, the information contained in the emails
will be misused.
Types of cyber crimeHacking Scenario 2
12/15/2015SNDTWU
9
11. The victim’s email account password is stolen and obscene emails are
sent to people in the victim’s address book.
Types of cyber crimeHacking Scenario 3
12/15/2015SNDTWU
10
12. This is a kind of online harassment wherein the victim is subjected to a
bank of online messages and emails.
Types of cyber crimeCyberStalking
12/15/2015SNDTWU
11
14. A criminal accesses data about a person’s bank account, credit
cards, Social Security, debit card and other sensitive information
to steal money or to buy things online in the victim’s name.
IdentityTheft
12/15/2015SNDTWU
13
Types of cyber crime
15. Criminals reach children and practice child sex abuse.
ChildPornography
12/15/2015SNDTWU
14
Types of cyber crime
16. It is the act of attempting to acquire information such as usernames,
passwords, and credit card details (and sometimes, indirectly,
money) by impersonating a trustworthy object in an electronic
communication.
Phishing
12/15/2015SNDTWU
15
Scenario 1
Types of cyber crime
17. The victim receives an email that appears to have been sent from his
bank. The email urges the victim to click on the link in the email.
When the victim does so, he is taken to “a secure page on the bank’s
website”. The victim believes the web page to be authentic and he
enters his username, password and other information. In reality, the
website is a fake and the victim’s information is stolen and misused.
Phishing Scenario 1
12/15/2015SNDTWU
16
Types of cyber crime
18. Getting one computer on a network to pretend to have the identity of
another computer, or developing a fake website which closely
resembles the original one.
Spoofing
12/15/2015SNDTWU
17
Types of cyber crime
Examples
22. This crime occurs when a person violates copyrights and downloads
music, movies, games and software.
12/15/2015SNDTWU
21
Piracy/theft Types of cyber crime
23. There have been several cases of teenagers bullying one another over
the Internet.
12/15/2015SNDTWU
22
Scenario 1 Scenario 2 Scenario 3
Bullying/Harassment Types of cyber crime
24. A fake profile of a woman is created on
Orkut. The profile displays her
correct name and contact
information (such as address,
residential phone number, cell
phone number etc.). Sometimes it
even has her photograph. The
problem is that the profile describes
her as a prostitute or a woman of
“loose character” who wants to have
sexual relations with anyone. Other
Orkut members see this profile and
start calling her at all hours of the
day asking for sexual favors. This
leads to a lot of harassment for the
victim and also defames her in
society.
Scenario 1
12/15/2015SNDTWU
23
Spoofing Types of cyber crime
25. An online hate community
is created. This
community displays
objectionable
information against a
particular country,
religion or ethnic group
or even against
national leaders and
historical figures.
12/15/2015SNDTWU
24
Scenario 2Spoofing Types of cyber crime