SlideShare a Scribd company logo
1 of 23
The most critical and increasing
problem.
What is Cyber Crime?

      Crime committed using a computer
      and the internet to steal a person’s
      identity or illegal imports or
      malicious programs cybercrime is
      nothing but where the computer
      used as an object or subject of crime

      .
HISTORY:
The first recorded cyber crime took place in the
year 1820 That is not surprising considering the
fact that the abacus, which is thought to be the
earliest form of a computer, has been around since
3500 B.C.
TYPES OF CYBER CRIME:
Hacking.
Denial   of service
Attacks.
IRC Crime
Credit Card Fraud
Phishing
Spoofing
Salami Attacks
Pornography
Net Extortion
Software Piracy
HACKING:
Hacking in simple terms
means an illegal intrusion
into a computer system
and/or network. It is also
known as CRACKING.
Government websites are
the hot targets of the
hackers due to the press
coverage, it receives.
Hackers enjoy the media
coverage..
DENIAL OF SERVICE
        ATTACKS:
This is an act by the
criminal, who floods
the band width of
the victim’s network
or fills his e-mail box
with spam mail
depriving him of the
services he is entitled
to access or provide.
IRC (INTERNET RELAY
CHAT):

Internet Relay Chat (IRC) servers have chat rooms in
which people from anywhere the world can come together
and chat with each other .Criminals use it for meeting
coconspirators. Hackers use it for discussing their exploits
/ sharing the techniques
Pedophiles use chat rooms to allure small children.
CREDIT CARD FRAUD:
           You simply have to type
           credit card number into
           www page off the vendor
           for online transaction If
           electronic transactions
           are not secured the credit
           card numbers can be
           stolen by the hackers who
           can misuse this card by
           impersonating the credit
           card owner.
PHISHING:
Phishing    is the act of attempting to acquire information
such as usernames, passwords, and credit card details
(and sometimes, indirectly, money) by masquerading as a
trustworthy entity in an electronic communication.
Communications purporting to be from popular social web
sites, auction sites, online payment processors or IT
administrators are commonly used to lure the
unsuspecting public. Phishing emails may contain links to
websites that are infected with malware. Phishing is
typically carried out by e-mail spoofing or instant
messaging, and it often directs users to enter details at a
fake website whose look and feel are almost identical to
the legitimate one.
SOFTWARE PIRACY:
           Theft of software through the
           illegal copying of genuine
           programs or the counterfeiting
           and distribution of products
           intended to pass for the
           original. Retail revenue losses
           world wide are ever
           increasing due to this crime
           Can be done in various ways
           such as end user copying, hard
           disk
           loading, Counterfeiting, Illega
           l downloads from the internet
           etc
PORNOGRAPHY:
          Pornography is the first
          consistently successful ecommerce
          product. It was a
          deceptive marketing tactics and
          mouse trapping technologies.
          Pornography encourage
          customers to access their
          websites. Anybody including
          children can log on to the
          internet and access website with
          pornography contents with a
          click of a mouse.
VIRUS:
In computers, a virus is a program or programming code that
replicates by being copied or initiating its copying to another
program, computer boot sector or document. Viruses can be
transmitted as attachments to an e-mail note or in a downloaded
file, or be present on a diskette or CD. The immediate source of the
e-mail note, downloaded file, or diskette you've received is usually
unaware that it contains a virus. Some viruses wreak their effect
as soon as their code is executed; other viruses lie dormant until
circumstances cause their code to be executed by the computer.
(virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit
and Bacterium are the malicious softwares)
THEREFORE THERE ARE
MANY CRIMES WHICH ARE
DONE THROUGH INTERNET.
PRECAUTION TO STOP
 CYBER CRIMES:
Update   your virus
protection software often
at least once a week.
Change your password
frequently and never
give them out to
anyone! Use password
that are at least 6
characters and do not
contain words in the
Back Up your files very
regularly.
Don’t open suspicious
attachments. Always look at
the three letter file extension.
Don’t leave your
computer unattended
after logging in (And
always log out when
you are finished).
Devashri Balinge.
Priyanka Deshpande.

                      Presented
                      By:
THANK YOU!
QUESTIONS:

More Related Content

What's hot

What's hot (19)

Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Facebook
FacebookFacebook
Facebook
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer crimes(1)
Computer crimes(1)Computer crimes(1)
Computer crimes(1)
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
 
Internet security
Internet securityInternet security
Internet security
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 

Similar to My presentation

Similar to My presentation (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime
Cybercrime Cybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

My presentation

  • 1. The most critical and increasing problem.
  • 2. What is Cyber Crime? Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where the computer used as an object or subject of crime .
  • 3. HISTORY: The first recorded cyber crime took place in the year 1820 That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C.
  • 4.
  • 5. TYPES OF CYBER CRIME: Hacking. Denial of service Attacks. IRC Crime Credit Card Fraud Phishing Spoofing Salami Attacks Pornography Net Extortion Software Piracy
  • 6.
  • 7. HACKING: Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage..
  • 8. DENIAL OF SERVICE ATTACKS: This is an act by the criminal, who floods the band width of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.
  • 9.
  • 10. IRC (INTERNET RELAY CHAT): Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other .Criminals use it for meeting coconspirators. Hackers use it for discussing their exploits / sharing the techniques Pedophiles use chat rooms to allure small children.
  • 11. CREDIT CARD FRAUD: You simply have to type credit card number into www page off the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
  • 12.
  • 13. PHISHING: Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
  • 14. SOFTWARE PIRACY: Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Retail revenue losses world wide are ever increasing due to this crime Can be done in various ways such as end user copying, hard disk loading, Counterfeiting, Illega l downloads from the internet etc
  • 15. PORNOGRAPHY: Pornography is the first consistently successful ecommerce product. It was a deceptive marketing tactics and mouse trapping technologies. Pornography encourage customers to access their websites. Anybody including children can log on to the internet and access website with pornography contents with a click of a mouse.
  • 16. VIRUS: In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD. The immediate source of the e-mail note, downloaded file, or diskette you've received is usually unaware that it contains a virus. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious softwares)
  • 17.
  • 18. THEREFORE THERE ARE MANY CRIMES WHICH ARE DONE THROUGH INTERNET.
  • 19. PRECAUTION TO STOP CYBER CRIMES: Update your virus protection software often at least once a week. Change your password frequently and never give them out to anyone! Use password that are at least 6 characters and do not contain words in the
  • 20. Back Up your files very regularly. Don’t open suspicious attachments. Always look at the three letter file extension. Don’t leave your computer unattended after logging in (And always log out when you are finished).