SlideShare a Scribd company logo
1 of 28
GRACY J. JOSEPH (T.E. CMPN ENGG.)
CONTENTS
 INTRODUCTION
 HISTORY
 CATEGORIES
 TYPES OF CYBER CRIME
 CYBER CRIMINALS
 CYBER SECURITY
 PREVENTION
 CYBER LAW
 CONCLUSION
INTRODUCTION
Cyber Crime is an activity done by the Computers
and Internet. It is an unlawful acts wherein the
computer is either a tool or a target or both.
HISTORY
 The first recorded cyber crime took place
in 1820.
 That is not surprising considering the fact
that the abacus, which is thought to be the
earliest form of a computer has been
around since 3500 B.C.
 The first virus was installed on an apple
computer in 1982.
CATEGORIES OF CYBER CRIME
 Cyber Crimes against persons
 Cyber Crimes against property
 Cyber Crimes against government
 Cyber Crimes against persons
 Harassment via emails
 Carding
 E-mail/SMS
 Spoofing
 Assault by threat
Cyber Crimes against
property
 Intellectual property crimes
 Cyber Squatting
 Cyber Vandalism
 Transmitting virus
 Internet time theft
Cyber Crimes against
Government
 Terrorism
 Fraud
 Cyber Warfare
TYPES OF CYBER CRIME
Hacking
Child Pornography
Denial of Service Attack
Virus Dissemination
Computer Vandalism
Cyber Terrorism
Software Privacy
oHacking
Hacking in simple terms means an illegal
intrusion into a computer system and/or
network.
Hacking may refer to:
 Computer hacking
 Phone hacking
 Roof and Tunnel hacking, etc
oChild Pornography
 The internet is being highly used by its
abusers to reach and abuse children
sexually, worldwide.
 Laws regarding child
pornography generally include sexual
images involving prepubescents,
pubescent or post-pubescent minors and
computer-generated images that appear
to involve them.
oDenial of Service Attack
 Act by the criminal, who floods the
bandwidth of the victims network or fills his
e-mail box with spam mail depriving him of
the services he is entitled to access or provide.
 Short for denial-of-service attack, a type
of attack on a network that is designed to
bring the network to its knees by flooding it
with useless traffic. Many DoS attacks, such
as the Ping of Death and Tear drop attacks,
exploit limitations in the TCP/IP protocols.
oVirus Dissemination
 Malicious software that attaches itself
to other software. (viruses, worms,
Trojan, horse, e-mail bombing etc.)
 There are estimated 30,000 computer
viruses in existence.
Over 300 new ones are created each
month
First virus was created to show
loopholes in software.
oComputer Vandalism
 Damaging or destroying data rather
than stealing or misusing them is
called cyber vandalism.
 On the Internet, includes acts such as a
cracker’s replacing the original Web
page with profanity or some racist
oCyber Terrorism
 Use of internet based attacks in terrorist
activities. These terrorists are using 512-bit
encryption, which is impossible to decrypt.
 Cyber terrorism can be also defined as the
intentional use of computer, networks, and
public internet to cause destruction and
harm for personal objectives.
 Objectives may be political or ideological
since this can be seen as a form of terrorism.
oSoftware Privacy
 Theft of software through the illegal copying
of genuine programs.
 Distribution of products intended to pass for
the original.
 The majority of software today is purchased
as a one-site license,
meaning that only one
computer may have that
software installed on it at
one time.
CYBER CRIMINALS
Cyber criminal is an a individual who commits cyber
crime where heshe makes use of the computer either
as a tool or as a target or as a both.
Cybercriminals use computers in three broad ways:
 Select computer as their target: These criminals
attack other people's computers to perform malicious
activities, such as spreading viruses, data theft,
identity theft, etc.
 Uses computer as their weapon: They use the
computer to carry out "conventional crime", such as
spam, fraud, illegal gambling, etc.
 Uses computer as their accessory: They use the
computer to save stolen or illegal data.
TYPES OF CYBER
CRIMINALS
 Script Kiddies
 Scammers
 Hacker groups
 Phishers
 Insiders
 Cyber terrorists
CYBER SECURITY
 Cyber security focuses on protecting computers,
networks, programs and data from unintended or
unauthorized access, change or destruction.
 Computer security, also known as cyber security or
IT security, is the protection of information
systems from theft or damage to the hardware, the
software, and to the information on them, as well
as from disruption or misdirection of the services
they provide.
NEED OF CYBER
SECURITY
 Cyber security is necessary since it helps in
securing data from threats such as data theft or
misuse, also safeguards your system from
viruses.
 Hacking, cracking and other forms of cyber
mischief have reached a level of sophistication
equalling (and in many cases surpassing) the
capability of most organizations to defend
against.
ADVANTAGES OF CYBER
SECURITY
 Protects system against viruses, worms,
spyware and other unwanted
programs.
 Protection against data from theft.
 Protects the computer from being
hacked.
 Minimizes computer freezing and
crashes.
 Gives privacy to users
PREVENTION TIPS
 Use strong passwords
 Install the latest OS updates
 Secure your wireless network
 Secure your computer by activating
firewall and using anti-virus software's
 Maintain backups
 Check security settings
CYBER
LAW
 Cyber law is an attempt to integrate the
challenges presented by human activity
on the Internet with legacy system of laws
applicable to the physical world.
IT ACT PROVISIONS
 E-mail would now be a valid and legal form of
communication in our country that can be duly
produced and approved in a court of law.
 Companies shall now be able to carry out electronic
commerce using the legal infrastructure provided
by the Act.
 Digital signatures have been given legal validity and
sanction in the Act.
CYBER LAWS AMENDMENTS
 INDIAN PENAL CODE,1860
 INDIAN EVIDENCE ACT,1872
 BANKER’S BOOK EVIDENCE
ACT,1891
 GENERAL CLAUSES ACT,1897
CONCLUSION
 Technology is destructive only in the hands of
people who do not realize that they are one and
the same process as the universe.
 Cybercrime is a major problem – and growing
 Cybercrime is about much more than hackers
 There is a natural adversarial relationship
between IT and police
 Successful prosecution of cybercrime must be a
team effort
 IT personnel must learn investigation and police
must learn technology
Cyber crime ppt

More Related Content

What's hot (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
It presentation cyber crime
It presentation cyber crimeIt presentation cyber crime
It presentation cyber crimeAshish Ojha
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
Basic about cyber crime, computer crime
Basic about cyber crime, computer crimeBasic about cyber crime, computer crime
Basic about cyber crime, computer crimeRib Vocal
 
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...manumelwin
 
66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHIApoorva Billore
 
66a it act APOORVA BILLORE ITMI
66a it act APOORVA BILLORE ITMI66a it act APOORVA BILLORE ITMI
66a it act APOORVA BILLORE ITMIApoorva Billore
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 

Viewers also liked (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber law
Cyber lawCyber law
Cyber law
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
It presentation cyber crime
It presentation cyber crimeIt presentation cyber crime
It presentation cyber crime
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
N.sai kiran IIITA AP
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA AP
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Basic about cyber crime, computer crime
Basic about cyber crime, computer crimeBasic about cyber crime, computer crime
Basic about cyber crime, computer crime
 
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI
 
66a it act APOORVA BILLORE ITMI
66a it act APOORVA BILLORE ITMI66a it act APOORVA BILLORE ITMI
66a it act APOORVA BILLORE ITMI
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 

Similar to Cyber crime ppt

Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfKira Dess
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Ambrish Mishra
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02raja jawahar
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 

Similar to Cyber crime ppt (20)

Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 

Recently uploaded

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

Cyber crime ppt

  • 1. GRACY J. JOSEPH (T.E. CMPN ENGG.)
  • 2. CONTENTS  INTRODUCTION  HISTORY  CATEGORIES  TYPES OF CYBER CRIME  CYBER CRIMINALS  CYBER SECURITY  PREVENTION  CYBER LAW  CONCLUSION
  • 3. INTRODUCTION Cyber Crime is an activity done by the Computers and Internet. It is an unlawful acts wherein the computer is either a tool or a target or both.
  • 4. HISTORY  The first recorded cyber crime took place in 1820.  That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer has been around since 3500 B.C.  The first virus was installed on an apple computer in 1982.
  • 5. CATEGORIES OF CYBER CRIME  Cyber Crimes against persons  Cyber Crimes against property  Cyber Crimes against government
  • 6.  Cyber Crimes against persons  Harassment via emails  Carding  E-mail/SMS  Spoofing  Assault by threat
  • 7. Cyber Crimes against property  Intellectual property crimes  Cyber Squatting  Cyber Vandalism  Transmitting virus  Internet time theft
  • 8. Cyber Crimes against Government  Terrorism  Fraud  Cyber Warfare
  • 9.
  • 10. TYPES OF CYBER CRIME Hacking Child Pornography Denial of Service Attack Virus Dissemination Computer Vandalism Cyber Terrorism Software Privacy
  • 11. oHacking Hacking in simple terms means an illegal intrusion into a computer system and/or network. Hacking may refer to:  Computer hacking  Phone hacking  Roof and Tunnel hacking, etc
  • 12. oChild Pornography  The internet is being highly used by its abusers to reach and abuse children sexually, worldwide.  Laws regarding child pornography generally include sexual images involving prepubescents, pubescent or post-pubescent minors and computer-generated images that appear to involve them.
  • 13. oDenial of Service Attack  Act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.  Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Tear drop attacks, exploit limitations in the TCP/IP protocols.
  • 14. oVirus Dissemination  Malicious software that attaches itself to other software. (viruses, worms, Trojan, horse, e-mail bombing etc.)  There are estimated 30,000 computer viruses in existence. Over 300 new ones are created each month First virus was created to show loopholes in software.
  • 15. oComputer Vandalism  Damaging or destroying data rather than stealing or misusing them is called cyber vandalism.  On the Internet, includes acts such as a cracker’s replacing the original Web page with profanity or some racist
  • 16. oCyber Terrorism  Use of internet based attacks in terrorist activities. These terrorists are using 512-bit encryption, which is impossible to decrypt.  Cyber terrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives.  Objectives may be political or ideological since this can be seen as a form of terrorism.
  • 17. oSoftware Privacy  Theft of software through the illegal copying of genuine programs.  Distribution of products intended to pass for the original.  The majority of software today is purchased as a one-site license, meaning that only one computer may have that software installed on it at one time.
  • 18. CYBER CRIMINALS Cyber criminal is an a individual who commits cyber crime where heshe makes use of the computer either as a tool or as a target or as a both. Cybercriminals use computers in three broad ways:  Select computer as their target: These criminals attack other people's computers to perform malicious activities, such as spreading viruses, data theft, identity theft, etc.  Uses computer as their weapon: They use the computer to carry out "conventional crime", such as spam, fraud, illegal gambling, etc.  Uses computer as their accessory: They use the computer to save stolen or illegal data.
  • 19. TYPES OF CYBER CRIMINALS  Script Kiddies  Scammers  Hacker groups  Phishers  Insiders  Cyber terrorists
  • 20. CYBER SECURITY  Cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.  Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
  • 21. NEED OF CYBER SECURITY  Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.  Hacking, cracking and other forms of cyber mischief have reached a level of sophistication equalling (and in many cases surpassing) the capability of most organizations to defend against.
  • 22. ADVANTAGES OF CYBER SECURITY  Protects system against viruses, worms, spyware and other unwanted programs.  Protection against data from theft.  Protects the computer from being hacked.  Minimizes computer freezing and crashes.  Gives privacy to users
  • 23. PREVENTION TIPS  Use strong passwords  Install the latest OS updates  Secure your wireless network  Secure your computer by activating firewall and using anti-virus software's  Maintain backups  Check security settings
  • 24. CYBER LAW  Cyber law is an attempt to integrate the challenges presented by human activity on the Internet with legacy system of laws applicable to the physical world.
  • 25. IT ACT PROVISIONS  E-mail would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law.  Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act.  Digital signatures have been given legal validity and sanction in the Act.
  • 26. CYBER LAWS AMENDMENTS  INDIAN PENAL CODE,1860  INDIAN EVIDENCE ACT,1872  BANKER’S BOOK EVIDENCE ACT,1891  GENERAL CLAUSES ACT,1897
  • 27. CONCLUSION  Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.  Cybercrime is a major problem – and growing  Cybercrime is about much more than hackers  There is a natural adversarial relationship between IT and police  Successful prosecution of cybercrime must be a team effort  IT personnel must learn investigation and police must learn technology