SlideShare une entreprise Scribd logo
1  sur  20
CYBER CRIMES
• Prepared By : P.RISHITH
13BCE0297
M.Sai Siddharth
13BCE0681
Introduction
• The usage of internet is growing rapidly.
• It has given new oppurtunities in every field we can think
of- be it entertainment,business,sports or education.
• Internet has its own advantages and disadvantages
• One of the major disadvantage is Cyber Crime
What is Cyber Crime?
• Use of Computer/Internet to something that
would be a crime in any case.
• It is an unlawful act where the computer is either a tool or a
target or both
• Acts that are punishable by Information Technology Act.
History
• In the early decades of modern information technology (IT), computer
crimes were largely committed by individual disgruntled and dishonest
employees.
• Physical damage to computer systems was a prominent threat until the
1980s.
• Programmers in the 1980s began writing malicious software, including self-
replicating programs, to interfere with personal computers.
• As the Internet increased access to increasing numbers of systems
worldwide, criminals used unauthorized access to poorly protected systems
for vandalism, political action and financial gain.
Categories of Cyber crime:
• Three categories-
• 1.Cyber crime against persons
• 2.Cyber crime against property
• 3.Cyber crime against government
First categorie:
• Includes various harassements such as
Sexual
Racial
Religious
Nationality etc
Any content that may be found derogatory or offensive is considered
harassment.
Second category
• These crimes include :
-Computer vandalism(destruction of others property)
-Transmission of harmful programs
-Unauthorised trespassing
-Unauthorised possession of computer information
Third Category
• Cyber terrorism is one distinct kind of crime in this
category.
• Cyber space is being used by individuals and groups to
threaten the organizations and international governments.
-Also to terrorize the citizens of a country.
Various Cyber Crimes :
• Unauthorised access to computer system or networks
• Theft of information contained in electronic form
• Data didling(manipulation of data)
• Hacking through various programmes
• Virus/worm attacks
• Trojan attacks
• Key loggers
• Malware(malicious code)
• Internet time thefts(gaining access to other internet
without his knowledge.
• Web jacking(forcefully taking control of the website)
• Theft of computer system
• Physically damaging a computer system
Hacking
• It has been noted that hackers have hacked millions of computers across the
globe and the number is increasing with every passing day.
• Some hackings are done just for fun others are done for stealing
information yet others are done for personal reasons such as taking revenge
from someone and so on.
• Stealing someone's personal data for own use, breaking through into a
company's account and making changes in their database
Cyber Criminals
• Australian nationwide survey conducted in 2006 found that two
in three convicted cyber-criminals were between the ages of 15
and 26
• Organised hackers
• Professional Hackers
• Discontended Employees
Questionnaire
• 1. Have you ever been the recipient of an e-mail you recognized as a scam?
• Yes: 81%
• No: 19%
• 2. Have you ever received a threatening or harassing e-mail? If yes, what did you do about it?
• Yes: 10%
• No: 90%
• 3. Have you ever been asked to meet in person with someone you only knew over the
Internet?
• Yes: 31%
• No: 69%
• 4. Have you ever been the victim of identity theft?
• Yes: 6%
• No: 94%
• 5. Do you know anyone who has been the victim of identity theft?
• Yes: 32%
• No: 68%
• 6. Have you ever had a computer virus that caused significant damage to
your computer or significant personal inconvenience?
• Yes: 78%
• No: 22%
• 7. Have you ever had personal information such as your social insurance number or
bank account numbers stolen through:
• Yes: 4%
• No: 96%
• 8. Have you ever received an e-mail soliciting child pornography?
• Yes: 7%
• No: 93%
• 9. Do you feel you know enough about how cybercrime is committed to do a
reasonable job protecting yourself?
• Yes: 45%
• No: 55%
Prevention
• Set a good firewall
• Disable and log off a specific user account to prevent access
• Disable specific applications for example , an e-mail system subjected
to a Spam attack
• Install intrusion prevention system
• Using various Anti virus , internet security , anti malware software’s
Thank you
Source:
• Britannica.com
• technocache.wordpress.com
• cybercrimeindia.org
• wikipedia

Contenu connexe

Tendances

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
madhu190
 

Tendances (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
cyber security
cyber securitycyber security
cyber security
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similaire à Cyber crime

cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 

Similaire à Cyber crime (20)

Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 

Dernier

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 

Dernier (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

Cyber crime

  • 1. CYBER CRIMES • Prepared By : P.RISHITH 13BCE0297 M.Sai Siddharth 13BCE0681
  • 2. Introduction • The usage of internet is growing rapidly. • It has given new oppurtunities in every field we can think of- be it entertainment,business,sports or education. • Internet has its own advantages and disadvantages • One of the major disadvantage is Cyber Crime
  • 3. What is Cyber Crime? • Use of Computer/Internet to something that would be a crime in any case.
  • 4. • It is an unlawful act where the computer is either a tool or a target or both • Acts that are punishable by Information Technology Act.
  • 5. History • In the early decades of modern information technology (IT), computer crimes were largely committed by individual disgruntled and dishonest employees. • Physical damage to computer systems was a prominent threat until the 1980s. • Programmers in the 1980s began writing malicious software, including self- replicating programs, to interfere with personal computers. • As the Internet increased access to increasing numbers of systems worldwide, criminals used unauthorized access to poorly protected systems for vandalism, political action and financial gain.
  • 6. Categories of Cyber crime: • Three categories- • 1.Cyber crime against persons • 2.Cyber crime against property • 3.Cyber crime against government
  • 7. First categorie: • Includes various harassements such as Sexual Racial Religious Nationality etc Any content that may be found derogatory or offensive is considered harassment.
  • 8. Second category • These crimes include : -Computer vandalism(destruction of others property) -Transmission of harmful programs -Unauthorised trespassing -Unauthorised possession of computer information
  • 9. Third Category • Cyber terrorism is one distinct kind of crime in this category. • Cyber space is being used by individuals and groups to threaten the organizations and international governments. -Also to terrorize the citizens of a country.
  • 10. Various Cyber Crimes : • Unauthorised access to computer system or networks • Theft of information contained in electronic form • Data didling(manipulation of data) • Hacking through various programmes • Virus/worm attacks • Trojan attacks • Key loggers
  • 11. • Malware(malicious code) • Internet time thefts(gaining access to other internet without his knowledge. • Web jacking(forcefully taking control of the website) • Theft of computer system • Physically damaging a computer system
  • 12. Hacking • It has been noted that hackers have hacked millions of computers across the globe and the number is increasing with every passing day. • Some hackings are done just for fun others are done for stealing information yet others are done for personal reasons such as taking revenge from someone and so on. • Stealing someone's personal data for own use, breaking through into a company's account and making changes in their database
  • 13.
  • 14.
  • 15. Cyber Criminals • Australian nationwide survey conducted in 2006 found that two in three convicted cyber-criminals were between the ages of 15 and 26 • Organised hackers • Professional Hackers • Discontended Employees
  • 16. Questionnaire • 1. Have you ever been the recipient of an e-mail you recognized as a scam? • Yes: 81% • No: 19% • 2. Have you ever received a threatening or harassing e-mail? If yes, what did you do about it? • Yes: 10% • No: 90% • 3. Have you ever been asked to meet in person with someone you only knew over the Internet? • Yes: 31% • No: 69%
  • 17. • 4. Have you ever been the victim of identity theft? • Yes: 6% • No: 94% • 5. Do you know anyone who has been the victim of identity theft? • Yes: 32% • No: 68% • 6. Have you ever had a computer virus that caused significant damage to your computer or significant personal inconvenience? • Yes: 78% • No: 22%
  • 18. • 7. Have you ever had personal information such as your social insurance number or bank account numbers stolen through: • Yes: 4% • No: 96% • 8. Have you ever received an e-mail soliciting child pornography? • Yes: 7% • No: 93% • 9. Do you feel you know enough about how cybercrime is committed to do a reasonable job protecting yourself? • Yes: 45% • No: 55%
  • 19. Prevention • Set a good firewall • Disable and log off a specific user account to prevent access • Disable specific applications for example , an e-mail system subjected to a Spam attack • Install intrusion prevention system • Using various Anti virus , internet security , anti malware software’s
  • 20. Thank you Source: • Britannica.com • technocache.wordpress.com • cybercrimeindia.org • wikipedia