SlideShare a Scribd company logo
1 of 19
Submitted to-
Mr.Neeraj Pratihar
Lecturer of I.T.
Presented by-
Miss Asha Mali
VIII Sem. I.T.
09eimit010
A
SEMINAR
ON
CYBER CRIME
CYBER CRIME
AGENDA
INTRODUCTION
WHAT IS CYBER CRIME ??
VARIOUS CYBERCRIME
WHO ARE CYBER CRIMINALS??
CONCLUSION.
REFERENCES.
INTRODUCTION
Cyber crime is a term used broadly to
describe activity in which computers or
networks are a tool, a target, or a place
of criminal activity.
The first recorded cyber crime took
place in the year 1820 by Joseph-Marie
Jacquard
WHAT IS CYBER CRIME ?
 It is a criminal activity committed on the internet.
This is a broad term that describes everything from
electronic cracking to denial of service attacks that
cause electronic commerce sites to lose money.
 Cyber crime is just a combination of crime and
computer.
 Any offence or crime in which a computer is used is
a cyber crime.
VARIOUS TYPES OF CYBERCRIME
HACKING PHISHING
DENIAL OF SERVICE ATTACK SPOOFING
VIRUS DISSEMINATION CYBER STALKING
SOFTWARE PIRACY CYBER DEFAMATION
PORNOGRAPHY THREATENING
IRC Crime SALAMI ATTACK
CREDIT CARD FRAUD NET EXTORTION
HACKING
The act of gaining unauthorized access to a computer system or
network (e.g., fraud, terrorism, etc.)
DENIAL OF SERVICE ATTACK:-
This is an act by the criminal, who floods the band width of
the victim’s network or fills his e-mail box with spam mail
depriving him of the services he is entitled to access or
provide.
VIRUS DISSEMINATION
Malicious software that attaches itself to other software.
(virus, worms, Trojan Horse, Time bomb, Logic
Bomb, Rabbit and Bacterium are the malicious soft wares)
SOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs
IRC CRIME
Internet Relay Chat (IRC) servers have chat rooms in which
people from anywhere the world can come together and chat
with each other
CREDIT CARD FRAUD:-
You simply have to type credit card number into www page off
the vendor for online transaction.
If electronic transactions are not secured the credit card
numbers can be stolen by the hackers who can
misuse this card by impersonating the credit card owner.
NET EXTORTION:-
Copying the company’s confidential data in order to extort
said company for huge amount.
SPOOFING
Getting one computer on a network to pretend to have the
identity of another computer, usually one with special access
privileges, so as to obtain access to the other computers on
the network.
PHISHING
It is technique of pulling out confidential
information from the bank/financial
institutional account holders by deceptive
means
CYBER STALKING
It refers to the use of the Internet, e-mail, or other
telecommunication technologies to harass or stalk another
person.
CYBER DEFAMATION:-
The criminals send e-mail containing defamatory
matters to all concerned of the victim or post the
defamatory matters on a website.
(divorced husband against wife)
THREATENING
The Criminal sends threatening email or comes
in contact in chat rooms with victim. (Any one
disgruntled may do this against boss, friend or
official
SALAMI ATTACK
In such crime criminal makes insignificant changes in such a
manner that such changes
would go unnoticed. Criminal makes such program that
deducts small amount like 2.50 per month from the account
of all the customer of the Bank and deposit the same in his
account. In this case no account holder will approach the
bank for such small amount but criminal gains huge amount.
WHO ARE CYBER CRIMINALS ??
Kids(age group 9-16)
Organized hackers
Disgruntled employees
Professional hackers
CONCLUSION:-
Technology is always a double-edged sword and can be used
for both the purposes – good or bad.
Hence, it should be the persistent efforts of rulers and law
makers to ensure that technology grows in a healthy manner
and is used for legal and ethical
business growth and not for committing crimes.
REFERNCES
 www.cisco.com
 www.berbee.com
 www.ibm.com
 www.microsoft.com
 www.rsa.com
 www.gocsi.com
 www.sans.org
 www.nist.gov
Various cyber crime

More Related Content

What's hot (19)

Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime liability report
Cyber crime liability reportCyber crime liability report
Cyber crime liability report
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cybe Crime & Its Type
Cybe Crime & Its TypeCybe Crime & Its Type
Cybe Crime & Its Type
 
Cyber safe girl e book
Cyber safe girl e bookCyber safe girl e book
Cyber safe girl e book
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Shilpa
ShilpaShilpa
Shilpa
 
Phishing
PhishingPhishing
Phishing
 
Impact of cybercrime
Impact of cybercrimeImpact of cybercrime
Impact of cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Internet trolls
Internet trollsInternet trolls
Internet trolls
 

Viewers also liked

Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"
Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"
Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"ООО "МедИнфоЦентр"
 
Advanced Multiplatform Strategy for Broadcasting Biz Stakeholders
Advanced Multiplatform Strategy for Broadcasting Biz StakeholdersAdvanced Multiplatform Strategy for Broadcasting Biz Stakeholders
Advanced Multiplatform Strategy for Broadcasting Biz StakeholdersAnjanette Delgado
 
мовленнєвий розвиток 1клас копия
мовленнєвий розвиток 1клас   копиямовленнєвий розвиток 1клас   копия
мовленнєвий розвиток 1клас копияlyuda_p
 
Annotating the script
Annotating the scriptAnnotating the script
Annotating the scriptMica Brown
 
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. Gallen
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. GallenWorkshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. Gallen
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. GallenPenny Schiffer
 

Viewers also liked (13)

Webspoofing
WebspoofingWebspoofing
Webspoofing
 
Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"
Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"
Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"
 
Advanced Multiplatform Strategy for Broadcasting Biz Stakeholders
Advanced Multiplatform Strategy for Broadcasting Biz StakeholdersAdvanced Multiplatform Strategy for Broadcasting Biz Stakeholders
Advanced Multiplatform Strategy for Broadcasting Biz Stakeholders
 
Presentation1
Presentation1Presentation1
Presentation1
 
Op art 1
Op art 1Op art 1
Op art 1
 
мовленнєвий розвиток 1клас копия
мовленнєвий розвиток 1клас   копиямовленнєвий розвиток 1клас   копия
мовленнєвий розвиток 1клас копия
 
Annotating the script
Annotating the scriptAnnotating the script
Annotating the script
 
Foundations seminar
Foundations seminarFoundations seminar
Foundations seminar
 
Bss552 lect 1
Bss552 lect 1Bss552 lect 1
Bss552 lect 1
 
Op art
Op artOp art
Op art
 
Pointilism
PointilismPointilism
Pointilism
 
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. Gallen
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. GallenWorkshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. Gallen
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. Gallen
 
Natural forms
Natural formsNatural forms
Natural forms
 

Similar to Various cyber crime

Similar to Various cyber crime (20)

Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Unit 1
Unit 1Unit 1
Unit 1
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Internet
InternetInternet
Internet
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 

Recently uploaded

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Various cyber crime

  • 1. Submitted to- Mr.Neeraj Pratihar Lecturer of I.T. Presented by- Miss Asha Mali VIII Sem. I.T. 09eimit010 A SEMINAR ON CYBER CRIME
  • 3. AGENDA INTRODUCTION WHAT IS CYBER CRIME ?? VARIOUS CYBERCRIME WHO ARE CYBER CRIMINALS?? CONCLUSION. REFERENCES.
  • 4. INTRODUCTION Cyber crime is a term used broadly to describe activity in which computers or networks are a tool, a target, or a place of criminal activity. The first recorded cyber crime took place in the year 1820 by Joseph-Marie Jacquard
  • 5. WHAT IS CYBER CRIME ?  It is a criminal activity committed on the internet. This is a broad term that describes everything from electronic cracking to denial of service attacks that cause electronic commerce sites to lose money.  Cyber crime is just a combination of crime and computer.  Any offence or crime in which a computer is used is a cyber crime.
  • 6. VARIOUS TYPES OF CYBERCRIME HACKING PHISHING DENIAL OF SERVICE ATTACK SPOOFING VIRUS DISSEMINATION CYBER STALKING SOFTWARE PIRACY CYBER DEFAMATION PORNOGRAPHY THREATENING IRC Crime SALAMI ATTACK CREDIT CARD FRAUD NET EXTORTION
  • 7. HACKING The act of gaining unauthorized access to a computer system or network (e.g., fraud, terrorism, etc.)
  • 8. DENIAL OF SERVICE ATTACK:- This is an act by the criminal, who floods the band width of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.
  • 9. VIRUS DISSEMINATION Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious soft wares)
  • 10. SOFTWARE PIRACY Theft of software through the illegal copying of genuine programs IRC CRIME Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other CREDIT CARD FRAUD:- You simply have to type credit card number into www page off the vendor for online transaction. If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
  • 11. NET EXTORTION:- Copying the company’s confidential data in order to extort said company for huge amount. SPOOFING Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges, so as to obtain access to the other computers on the network.
  • 12. PHISHING It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means
  • 13. CYBER STALKING It refers to the use of the Internet, e-mail, or other telecommunication technologies to harass or stalk another person. CYBER DEFAMATION:- The criminals send e-mail containing defamatory matters to all concerned of the victim or post the defamatory matters on a website. (divorced husband against wife)
  • 14. THREATENING The Criminal sends threatening email or comes in contact in chat rooms with victim. (Any one disgruntled may do this against boss, friend or official
  • 15. SALAMI ATTACK In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed. Criminal makes such program that deducts small amount like 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
  • 16. WHO ARE CYBER CRIMINALS ?? Kids(age group 9-16) Organized hackers Disgruntled employees Professional hackers
  • 17. CONCLUSION:- Technology is always a double-edged sword and can be used for both the purposes – good or bad. Hence, it should be the persistent efforts of rulers and law makers to ensure that technology grows in a healthy manner and is used for legal and ethical business growth and not for committing crimes.
  • 18. REFERNCES  www.cisco.com  www.berbee.com  www.ibm.com  www.microsoft.com  www.rsa.com  www.gocsi.com  www.sans.org  www.nist.gov