SlideShare a Scribd company logo
1 of 30
Welcome To MyWelcome To My
ProjectProject
Cyber CrimeCyber Crime
PresentedPresented
ByBy
Name : Zainab
Travadi
Why we learn about CYBER CRIME ??Why we learn about CYBER CRIME ??
Because  –  – Because  –  –  – – – –
Everybody is using COMPUTERS.Everybody is using COMPUTERS.
From white collar criminals to terroristFrom white collar criminals to terrorist
organizations And from Teenagers toorganizations And from Teenagers to
Adults . Adults . 
Conventional crimes like Forgery,Conventional crimes like Forgery,
extortion, kidnapping etc. are beingextortion, kidnapping etc. are being
committed with the help of computers etc.committed with the help of computers etc.
New generation is growingNew generation is growing up withup with
computers .computers .
MOST IMPORTANT-Monetary transactions areMOST IMPORTANT-Monetary transactions are
moving on to the INTERNET.moving on to the INTERNET.
• WHAT IS COMPUTER CRIME?WHAT IS COMPUTER CRIME?
•   All crimes performed or resorted to byAll crimes performed or resorted to by
abuse of electronic media or otherwise,abuse of electronic media or otherwise,
with the purposewith the purpose
of influencing the functioning of of influencing the functioning of 
computer or computer system.computer or computer system.
IN SHORTIN SHORT
• Computer is a target.Computer is a target.
• Computer is a tool of crime.Computer is a tool of crime.
Profile of Cyber CriminalProfile of Cyber Criminal
• Disgruntled employees.Disgruntled employees.
• TeenagersTeenagers
• Political HacktivistPolitical Hacktivist
• Professional HackersProfessional Hackers
• Business RivalBusiness Rival
  VICTIMSVICTIMS
• GullibleGullible
• Desperados and greedyDesperados and greedy
peoplepeople
• Unskilled & InexperiencedUnskilled & Inexperienced
• Unlucky peopleUnlucky people
Computer Crimes areComputer Crimes are
VulnerableVulnerable
• Because of : Anonymity,Because of : Anonymity,
• Storage capacity,Storage capacity,
• Weakness in OperatingWeakness in Operating
System,System,
• Lack of Awareness of user .Lack of Awareness of user .
• Types of Cyber CrimeTypes of Cyber Crime
• HACKINGHACKING
• DENIAL OF SERVICEATTACKDENIAL OF SERVICEATTACK
• VIRUS DISSEMINATIONVIRUS DISSEMINATION
• SOFTWARE PIRACYSOFTWARE PIRACY
• IRC CrimeIRC Crime
• CREDIT CARD FRAUDCREDIT CARD FRAUD
• NETEXTORTIONNETEXTORTION
• PHISHINGPHISHING
• SPOOFINGSPOOFING
• CYBER STALKINGCYBER STALKING
• CYBERDEFAMATIONCYBERDEFAMATION
• THREATENINGTHREATENING
• SALAMI ATTACKSALAMI ATTACK
1) HACKING 1) HACKING 
Hacking in simple terms means Hacking in simple terms means 
 illegal intrusion into a computer illegal intrusion into a computer
system without the permission ofsystem without the permission of
the computer owner/user.the computer owner/user.
2) DENIAL OF SERVICE ATTACK2) DENIAL OF SERVICE ATTACK
This is an act by the criminal, whoThis is an act by the criminal, who
floods the bandwidth of the victim’sfloods the bandwidth of the victim’s
network or fills his e-mail box withnetwork or fills his e-mail box with
spam mail depriving himspam mail depriving him
services he is entitled to access orservices he is entitled to access or
provideprovide ..
3)VIRUS DISSEMINATION 3)VIRUS DISSEMINATION 
• Malicious software thatMalicious software that
attaches itself to other softwareattaches itself to other software
..
(virus, worms, Trojan Horse,(virus, worms, Trojan Horse,
Time bomb Bomb, Rabbit andTime bomb Bomb, Rabbit and
Bacterium are the maliciousBacterium are the malicious
softwares )softwares )
4) SOFTWARE PIRACY4) SOFTWARE PIRACY
• Theft of software through the illegal copyingTheft of software through the illegal copying
of Theft of software and genuine programs orof Theft of software and genuine programs or
the counterfeiting and distribution ofthe counterfeiting and distribution of
products intended to pass for the original .products intended to pass for the original .
• Retail revenue losses worldwide are everRetail revenue losses worldwide are ever
increasing due to this crime increasing dueincreasing due to this crime increasing due
to this crime Can be done in various waysto this crime Can be done in various ways
• End user copying, Hard disk loading,End user copying, Hard disk loading,
Counterfeiting, etc. Illegal downloads fromCounterfeiting, etc. Illegal downloads from
the internet etcthe internet etc
7) CREDIT CARD FRAUD7) CREDIT CARD FRAUD
You simply have types of creditYou simply have types of credit
card number into www page ofcard number into www page of
the vendor for onlinethe vendor for online
transaction .transaction .
If electronic transaction are notIf electronic transaction are not
in the credit card numbers canin the credit card numbers can
be stolen the hackers whobe stolen the hackers who
can misuse this cardcan misuse this card
6)IRC CRIME6)IRC CRIME
• Internet Relay Chat (IRC) servers have chatInternet Relay Chat (IRC) servers have chat
rooms in which people from anywhere the worldrooms in which people from anywhere the world
can come together and chat with each other .can come together and chat with each other .
• Criminals use it for meeting co use it for meetingCriminals use it for meeting co use it for meeting
co-conspirators .co-conspirators .
• Hackers use it for discussing theirHackers use it for discussing their
exploits / sharing the techniques .exploits / sharing the techniques .
• Paedophiles use chat rooms to allure smallPaedophiles use chat rooms to allure small
children .children .
• Cyber Stalking -In order to harass a womanCyber Stalking -In order to harass a woman
her telephone numberher telephone number
 telephone number is given to others as if she telephone number is given to others as if she
wants to befriend males .wants to befriend males .
Credit card skimmerCredit card skimmer
SkimmerSkimmer
How the credit card skimmer is usedHow the credit card skimmer is used
• 8) NET EXTORATION8) NET EXTORATION
• Copying the company’s confidential dataCopying the company’s confidential data
in order to extort said company for hugein order to extort said company for huge
amount .amount .
• 9) PHISHING9) PHISHING
• It is technique of pulling outIt is technique of pulling out
confidential information from theconfidential information from the
bank/financial institutional accountbank/financial institutional account
holders by deceptive accountholders by deceptive account
holders means .holders means .
10)Spoofing10)Spoofing
• Getting one computer on a networkGetting one computer on a network
to to pretend to have the identity ofto to pretend to have the identity of
another computer, usually one with,another computer, usually one with,
usually one with special accessusually one with special access
privileges , so as to obtain accessprivileges , so as to obtain access
to the other computers on theto the other computers on the
network.network.
11) CYBER STALKING11) CYBER STALKING
• The Criminal follows the victim byThe Criminal follows the victim by
sending emails, entering the chatsending emails, entering the chat
rooms sending frequently.rooms sending frequently.
12) CYBER DEFAMATION12) CYBER DEFAMATION
• The Criminal sends emailsThe Criminal sends emails
containing defamatory matters to allcontaining defamatory matters to all
concerned of  the victim or post theconcerned of  the victim or post the
defamatory matters son a websitedefamatory matters son a website
on disgruntled employee may doon disgruntled employee may do
this against  boss, ex boss, againstthis against  boss, ex boss, against
girl, divorced husband against wifegirl, divorced husband against wife
etc  etc  
13)THREATENING13)THREATENING
• The Criminal sends threateningThe Criminal sends threatening
email or comes in contact in chatemail or comes in contact in chat
rooms with victim.rooms with victim.
• (Any one disgruntled may do this(Any one disgruntled may do this
against boss, friend or official)against boss, friend or official)
14)SALAMI ATTACK 14)SALAMI ATTACK 
• In such crime criminal makesIn such crime criminal makes
insignificant changes in such a mannerinsignificant changes in such a manner
that such changes would go unnoticed.that such changes would go unnoticed.
Criminal makes such program thatCriminal makes such program that
deducts small amount like Rs. 2.50 perdeducts small amount like Rs. 2.50 per
month from the account of all themonth from the account of all the
customer of the Bank and deposit thecustomer of the Bank and deposit the
same in his account. In this case nosame in his account. In this case no
account holder will approach the bank foraccount holder will approach the bank for
such small amount but criminal gainssuch small amount but criminal gains
huge amount.huge amount.
15) SALE OF NARCOTICS15) SALE OF NARCOTICS
• Sale & Purchase through net.Sale & Purchase through net.
• There are web site which offer sale andThere are web site which offer sale and
shipment of contrabands drugs.shipment of contrabands drugs.
•   They may use the techniquesThey may use the techniques
of stegnography for hidingof stegnography for hiding
the messages.the messages.
Cyber Crime
Cyber Crime
Cyber Crime

More Related Content

What's hot

Dc214 sn orgcrime (1)
Dc214 sn orgcrime (1)Dc214 sn orgcrime (1)
Dc214 sn orgcrime (1)Khushi Angle
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber CrimeNikhil Chaudhary
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
Internet As An Illegal Market Place
Internet As An Illegal Market PlaceInternet As An Illegal Market Place
Internet As An Illegal Market PlaceWojciech Filipkowski
 
Evil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the worldEvil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the worldHillary L
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyPELUMI APANTAKU
 

What's hot (20)

Dc214 sn orgcrime (1)
Dc214 sn orgcrime (1)Dc214 sn orgcrime (1)
Dc214 sn orgcrime (1)
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
 
Internet As An Illegal Market Place
Internet As An Illegal Market PlaceInternet As An Illegal Market Place
Internet As An Illegal Market Place
 
Evil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the worldEvil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the world
 
Wiretaps
WiretapsWiretaps
Wiretaps
 
Facebook
FacebookFacebook
Facebook
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
Dc214 sn orgcrime
Dc214 sn orgcrimeDc214 sn orgcrime
Dc214 sn orgcrime
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Shilpa
ShilpaShilpa
Shilpa
 

Viewers also liked

Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Projecttsdikshit
 
Breaking Down the Walls: Strategies for Defiance at Huron ISD
Breaking Down the Walls: Strategies for Defiance at Huron ISDBreaking Down the Walls: Strategies for Defiance at Huron ISD
Breaking Down the Walls: Strategies for Defiance at Huron ISDSteve Vitto
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSMAU
 
11.6 Project CARE Teens with Epilepsy
11.6 Project CARE Teens with Epilepsy11.6 Project CARE Teens with Epilepsy
11.6 Project CARE Teens with EpilepsyCleveland Clinic
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 

Viewers also liked (7)

Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Project
 
Breaking Down the Walls: Strategies for Defiance at Huron ISD
Breaking Down the Walls: Strategies for Defiance at Huron ISDBreaking Down the Walls: Strategies for Defiance at Huron ISD
Breaking Down the Walls: Strategies for Defiance at Huron ISD
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano Zanero
 
11.6 Project CARE Teens with Epilepsy
11.6 Project CARE Teens with Epilepsy11.6 Project CARE Teens with Epilepsy
11.6 Project CARE Teens with Epilepsy
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 

Similar to Cyber Crime

Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Jay Visavadiya
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGJyotisheklingji
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimeDevanshi Solanki
 
Cyber crime in WORLD
Cyber crime in WORLDCyber crime in WORLD
Cyber crime in WORLDAvasyu Gupta
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
workers participation in management
workers participation in managementworkers participation in management
workers participation in managementlily004
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick SurveyArindam Sarkar
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimesSrishti Jain
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crimevishalgohel12195
 

Similar to Cyber Crime (20)

Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime in WORLD
Cyber crime in WORLDCyber crime in WORLD
Cyber crime in WORLD
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
workers participation in management
workers participation in managementworkers participation in management
workers participation in management
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 

Recently uploaded

Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 

Recently uploaded (20)

Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 

Cyber Crime

  • 1. Welcome To MyWelcome To My ProjectProject Cyber CrimeCyber Crime
  • 3.
  • 4. Why we learn about CYBER CRIME ??Why we learn about CYBER CRIME ?? Because  –  – Because  –  –  – – – – Everybody is using COMPUTERS.Everybody is using COMPUTERS. From white collar criminals to terroristFrom white collar criminals to terrorist organizations And from Teenagers toorganizations And from Teenagers to Adults . Adults .  Conventional crimes like Forgery,Conventional crimes like Forgery, extortion, kidnapping etc. are beingextortion, kidnapping etc. are being committed with the help of computers etc.committed with the help of computers etc. New generation is growingNew generation is growing up withup with computers .computers . MOST IMPORTANT-Monetary transactions areMOST IMPORTANT-Monetary transactions are moving on to the INTERNET.moving on to the INTERNET.
  • 5. • WHAT IS COMPUTER CRIME?WHAT IS COMPUTER CRIME? •   All crimes performed or resorted to byAll crimes performed or resorted to by abuse of electronic media or otherwise,abuse of electronic media or otherwise, with the purposewith the purpose of influencing the functioning of of influencing the functioning of  computer or computer system.computer or computer system. IN SHORTIN SHORT • Computer is a target.Computer is a target. • Computer is a tool of crime.Computer is a tool of crime.
  • 6. Profile of Cyber CriminalProfile of Cyber Criminal • Disgruntled employees.Disgruntled employees. • TeenagersTeenagers • Political HacktivistPolitical Hacktivist • Professional HackersProfessional Hackers • Business RivalBusiness Rival
  • 7.   VICTIMSVICTIMS • GullibleGullible • Desperados and greedyDesperados and greedy peoplepeople • Unskilled & InexperiencedUnskilled & Inexperienced • Unlucky peopleUnlucky people
  • 8. Computer Crimes areComputer Crimes are VulnerableVulnerable • Because of : Anonymity,Because of : Anonymity, • Storage capacity,Storage capacity, • Weakness in OperatingWeakness in Operating System,System, • Lack of Awareness of user .Lack of Awareness of user .
  • 9. • Types of Cyber CrimeTypes of Cyber Crime
  • 10. • HACKINGHACKING • DENIAL OF SERVICEATTACKDENIAL OF SERVICEATTACK • VIRUS DISSEMINATIONVIRUS DISSEMINATION • SOFTWARE PIRACYSOFTWARE PIRACY • IRC CrimeIRC Crime • CREDIT CARD FRAUDCREDIT CARD FRAUD • NETEXTORTIONNETEXTORTION • PHISHINGPHISHING • SPOOFINGSPOOFING • CYBER STALKINGCYBER STALKING • CYBERDEFAMATIONCYBERDEFAMATION • THREATENINGTHREATENING • SALAMI ATTACKSALAMI ATTACK
  • 11. 1) HACKING 1) HACKING  Hacking in simple terms means Hacking in simple terms means   illegal intrusion into a computer illegal intrusion into a computer system without the permission ofsystem without the permission of the computer owner/user.the computer owner/user.
  • 12. 2) DENIAL OF SERVICE ATTACK2) DENIAL OF SERVICE ATTACK This is an act by the criminal, whoThis is an act by the criminal, who floods the bandwidth of the victim’sfloods the bandwidth of the victim’s network or fills his e-mail box withnetwork or fills his e-mail box with spam mail depriving himspam mail depriving him services he is entitled to access orservices he is entitled to access or provideprovide ..
  • 13. 3)VIRUS DISSEMINATION 3)VIRUS DISSEMINATION  • Malicious software thatMalicious software that attaches itself to other softwareattaches itself to other software .. (virus, worms, Trojan Horse,(virus, worms, Trojan Horse, Time bomb Bomb, Rabbit andTime bomb Bomb, Rabbit and Bacterium are the maliciousBacterium are the malicious softwares )softwares )
  • 14. 4) SOFTWARE PIRACY4) SOFTWARE PIRACY • Theft of software through the illegal copyingTheft of software through the illegal copying of Theft of software and genuine programs orof Theft of software and genuine programs or the counterfeiting and distribution ofthe counterfeiting and distribution of products intended to pass for the original .products intended to pass for the original . • Retail revenue losses worldwide are everRetail revenue losses worldwide are ever increasing due to this crime increasing dueincreasing due to this crime increasing due to this crime Can be done in various waysto this crime Can be done in various ways • End user copying, Hard disk loading,End user copying, Hard disk loading, Counterfeiting, etc. Illegal downloads fromCounterfeiting, etc. Illegal downloads from the internet etcthe internet etc
  • 15. 7) CREDIT CARD FRAUD7) CREDIT CARD FRAUD You simply have types of creditYou simply have types of credit card number into www page ofcard number into www page of the vendor for onlinethe vendor for online transaction .transaction . If electronic transaction are notIf electronic transaction are not in the credit card numbers canin the credit card numbers can be stolen the hackers whobe stolen the hackers who can misuse this cardcan misuse this card
  • 16. 6)IRC CRIME6)IRC CRIME • Internet Relay Chat (IRC) servers have chatInternet Relay Chat (IRC) servers have chat rooms in which people from anywhere the worldrooms in which people from anywhere the world can come together and chat with each other .can come together and chat with each other . • Criminals use it for meeting co use it for meetingCriminals use it for meeting co use it for meeting co-conspirators .co-conspirators . • Hackers use it for discussing theirHackers use it for discussing their exploits / sharing the techniques .exploits / sharing the techniques . • Paedophiles use chat rooms to allure smallPaedophiles use chat rooms to allure small children .children . • Cyber Stalking -In order to harass a womanCyber Stalking -In order to harass a woman her telephone numberher telephone number  telephone number is given to others as if she telephone number is given to others as if she wants to befriend males .wants to befriend males .
  • 19. How the credit card skimmer is usedHow the credit card skimmer is used
  • 20. • 8) NET EXTORATION8) NET EXTORATION • Copying the company’s confidential dataCopying the company’s confidential data in order to extort said company for hugein order to extort said company for huge amount .amount .
  • 21. • 9) PHISHING9) PHISHING • It is technique of pulling outIt is technique of pulling out confidential information from theconfidential information from the bank/financial institutional accountbank/financial institutional account holders by deceptive accountholders by deceptive account holders means .holders means .
  • 22. 10)Spoofing10)Spoofing • Getting one computer on a networkGetting one computer on a network to to pretend to have the identity ofto to pretend to have the identity of another computer, usually one with,another computer, usually one with, usually one with special accessusually one with special access privileges , so as to obtain accessprivileges , so as to obtain access to the other computers on theto the other computers on the network.network.
  • 23. 11) CYBER STALKING11) CYBER STALKING • The Criminal follows the victim byThe Criminal follows the victim by sending emails, entering the chatsending emails, entering the chat rooms sending frequently.rooms sending frequently.
  • 24. 12) CYBER DEFAMATION12) CYBER DEFAMATION • The Criminal sends emailsThe Criminal sends emails containing defamatory matters to allcontaining defamatory matters to all concerned of  the victim or post theconcerned of  the victim or post the defamatory matters son a websitedefamatory matters son a website on disgruntled employee may doon disgruntled employee may do this against  boss, ex boss, againstthis against  boss, ex boss, against girl, divorced husband against wifegirl, divorced husband against wife etc  etc  
  • 25. 13)THREATENING13)THREATENING • The Criminal sends threateningThe Criminal sends threatening email or comes in contact in chatemail or comes in contact in chat rooms with victim.rooms with victim. • (Any one disgruntled may do this(Any one disgruntled may do this against boss, friend or official)against boss, friend or official)
  • 26. 14)SALAMI ATTACK 14)SALAMI ATTACK  • In such crime criminal makesIn such crime criminal makes insignificant changes in such a mannerinsignificant changes in such a manner that such changes would go unnoticed.that such changes would go unnoticed. Criminal makes such program thatCriminal makes such program that deducts small amount like Rs. 2.50 perdeducts small amount like Rs. 2.50 per month from the account of all themonth from the account of all the customer of the Bank and deposit thecustomer of the Bank and deposit the same in his account. In this case nosame in his account. In this case no account holder will approach the bank foraccount holder will approach the bank for such small amount but criminal gainssuch small amount but criminal gains huge amount.huge amount.
  • 27. 15) SALE OF NARCOTICS15) SALE OF NARCOTICS • Sale & Purchase through net.Sale & Purchase through net. • There are web site which offer sale andThere are web site which offer sale and shipment of contrabands drugs.shipment of contrabands drugs. •   They may use the techniquesThey may use the techniques of stegnography for hidingof stegnography for hiding the messages.the messages.