SlideShare une entreprise Scribd logo
1  sur  16
CYBER CRIMES…
WHAT ARE CYBER CRIMES….??

 Cyber crime is
 crime committed
 on the Internet,
 using the Internet
 and by means of
 the Internet.
WHICH TYPES OF CRIMES REFERS CYBER
CRIMES…??

 Computer crime is a general
 term that embraces such crimes
 as phishing, credit card frauds,
 bank robbery, illegal
 downloading, industrial
 espionage, child pornography,
 kidnapping children via chat
 rooms, scams, cyber terrorism,
 creation and/or distribution of
 viruses, Spam and so on. All
 such crimes are computer
 related and facilitated crimes.
TYPES OF
CYBER CRIME...
oHACKING
oDENIAL OF SERVICE ATTACK
oVIRUS DISSEMINATION
oSOFTWARE PIRACY
oPORNOGRAPHY
oIRC CRIME
oCREDIT CARD FRAUD
oPHISHING
oSPOOFING
oCYBER STALKING
oCYBER DEFAMATION
oTHREATENING
oSALAMI ATTACK
oNET EXTORTION
HACKING…
   The act of gaining unauthorized
   access to a computer system or
   network and in some cases
   making unauthorized use of this
   access. Hacking is also the act by
   which other forms of cyber-crime
   (e.g., fraud, terrorism, etc.) are
   committed. Hacking in simple
   terms means illegal intrusion into
   a computer system without the
   permission of the computer
   owner/user.
DENIAL OF SERVICE ATTACK..

This is an act by the
criminal, who floods
the band width of the
victim’s network or
fills his e-mail box
with spam mail
depriving him of the
services he is entitled
to access or provide.
VIRUS DISSEMINATION…
   Malicious software that attaches itself to
   other software.
   (virus, worms, Trojan Horse, Time bomb,
   Logic Bomb, Rabbit and Bacterium are
   the malicious soft wares)
SOFTWARE PIRACY…
Theft of software through the
illegal copying of genuine
programs or the counterfeiting
and distribution of products
intended to pass for the original.
Retail revenue losses world wide
are ever increasing due to this
crime Can be done in various
ways such as end user
copying, hard disk
loading, Counterfeiting, Illegal
downloads from the internet etc.
PRONOGRAPHY…
     Pornography is the first consistently
     successful ecommerce product. It was a
     deceptive marketing tactics and mouse
     trapping technologies. Pornography
     encourage customers to access their
     websites. Anybody including children
     can log on to the internet and access
     website with pornography contents
     with a click of a mouse.
IRC CRIME…
Internet Relay Chat (IRC) servers
have chat rooms in which people
from anywhere the world can
come together and chat with each
other Criminals use it for meeting
coconspirators. Hackers use it for
discussing their exploits / sharing
the techniques
Pedophiles use chat rooms to
allure small children.
CREDIT CARD FRAUD…
            You simply have to type
            credit card number into
            www page off the vendor
            for online transaction If
            electronic transactions are
            not secured the credit card
            numbers can be stolen by
            the hackers who can
            misuse this card by
            impersonating the credit
            card owner.
NET EXTORTION…
Copying the company’s confidential data
in order to extort said company for huge
amount.
Therefore there are
many crimes which
are done through
internet…
PRECAUTIONS TO STOP CYBER CRIME…

    oEDUCATION
    oUSE AS FIREWALL
    oCLICK WITH CAUTION
    oPRACTICE SAFE SURFING
    oPRACTICE SAFE SHOPPING
    oSECURE YOUR WIRELESS
    NETWORK
    oUSE STRONG PASSWORDS
    oUSE COMMON SENSE
    oBE SUSPICIOUS
THANK YOU...

  Efforts by-
Srishti jain
   VIII-A

Contenu connexe

Tendances

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
june21harsh
 

Tendances (20)

CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 

En vedette (6)

Cybersec
CybersecCybersec
Cybersec
 
Rendere sicure le esperienze dell'individuo nel mondo digitale allargato - Pi...
Rendere sicure le esperienze dell'individuo nel mondo digitale allargato - Pi...Rendere sicure le esperienze dell'individuo nel mondo digitale allargato - Pi...
Rendere sicure le esperienze dell'individuo nel mondo digitale allargato - Pi...
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similaire à Cyber crimes

What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 

Similaire à Cyber crimes (20)

My presentation
My presentationMy presentation
My presentation
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Presentation(Cyber crime & security)
Presentation(Cyber crime & security)Presentation(Cyber crime & security)
Presentation(Cyber crime & security)
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Cyber crimes

  • 2. WHAT ARE CYBER CRIMES….?? Cyber crime is crime committed on the Internet, using the Internet and by means of the Internet.
  • 3. WHICH TYPES OF CRIMES REFERS CYBER CRIMES…?? Computer crime is a general term that embraces such crimes as phishing, credit card frauds, bank robbery, illegal downloading, industrial espionage, child pornography, kidnapping children via chat rooms, scams, cyber terrorism, creation and/or distribution of viruses, Spam and so on. All such crimes are computer related and facilitated crimes.
  • 5. oHACKING oDENIAL OF SERVICE ATTACK oVIRUS DISSEMINATION oSOFTWARE PIRACY oPORNOGRAPHY oIRC CRIME oCREDIT CARD FRAUD oPHISHING oSPOOFING oCYBER STALKING oCYBER DEFAMATION oTHREATENING oSALAMI ATTACK oNET EXTORTION
  • 6. HACKING… The act of gaining unauthorized access to a computer system or network and in some cases making unauthorized use of this access. Hacking is also the act by which other forms of cyber-crime (e.g., fraud, terrorism, etc.) are committed. Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
  • 7. DENIAL OF SERVICE ATTACK.. This is an act by the criminal, who floods the band width of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.
  • 8. VIRUS DISSEMINATION… Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious soft wares)
  • 9. SOFTWARE PIRACY… Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Retail revenue losses world wide are ever increasing due to this crime Can be done in various ways such as end user copying, hard disk loading, Counterfeiting, Illegal downloads from the internet etc.
  • 10. PRONOGRAPHY… Pornography is the first consistently successful ecommerce product. It was a deceptive marketing tactics and mouse trapping technologies. Pornography encourage customers to access their websites. Anybody including children can log on to the internet and access website with pornography contents with a click of a mouse.
  • 11. IRC CRIME… Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other Criminals use it for meeting coconspirators. Hackers use it for discussing their exploits / sharing the techniques Pedophiles use chat rooms to allure small children.
  • 12. CREDIT CARD FRAUD… You simply have to type credit card number into www page off the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
  • 13. NET EXTORTION… Copying the company’s confidential data in order to extort said company for huge amount.
  • 14. Therefore there are many crimes which are done through internet…
  • 15. PRECAUTIONS TO STOP CYBER CRIME… oEDUCATION oUSE AS FIREWALL oCLICK WITH CAUTION oPRACTICE SAFE SURFING oPRACTICE SAFE SHOPPING oSECURE YOUR WIRELESS NETWORK oUSE STRONG PASSWORDS oUSE COMMON SENSE oBE SUSPICIOUS
  • 16. THANK YOU... Efforts by- Srishti jain VIII-A