SlideShare une entreprise Scribd logo
1  sur  15
CYBER CRIME
DEFINE
 According to Wikipedia.com cyber crime also known as
computer crime that refers to any crime that involves
a computer and a network.
 Cyber crime is defined as crimes committed on the internet
using the computer as either a tool or a targeted victim.
CATEGORIES OF CYBER CRIME
COMPUTER
AS
A
TARGET
COMPUTER
AS
A
WEAPON
TYPES OF CYBER CRIME
CYBER TERRORISM
PHISHING
Phishing is just one of the
many frauds on the Internet,
trying to fool people into parting
with their money.
EMAIL-SPOOFING
 Email spoofing is the
creation of email messages
with a forged sender
address
 Spoofing is when a
spammer sends out emails
using your email address in
the From: field.
COMPUTER VANDALISM
Damaging or destroying data rather than stealing or misusing them is called
cyber vandalism.
SOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs.
India stands 11th in the ranking for Cyber Crime in the
World, constituting 3% of the Global Cyber Crime.
WhY IndIA?
 A rapidly growing online user base
 121 Million Internet Users
 65 Million Active Internet Users, up by 28% from 51 million in 2010
 50 Million users shop online on Ecommerce and Online Shopping Sites
 46+ Million Social Network Users
 346 million mobile users had subscribed to Data Packages.
 Source: IAMAI; Juxt; wearesocial 2011
 Cyber Security involves protection of sensitive personal and business
information through prevention, detection and response to different online
attacks.
The Information
Technology Act, 2000
(1) Cyber crime can involve criminal
activities that are traditional in nature,
such as theft, fraud, deformation and
mischief, all of which are subjected to
the India Penal code
Cyber Laws in india
• Continued Website Hacks and Defacements
• Data and Information theft
• Increasing phishing attacks on Ecommerce
and Financial Websites
• Cybercriminals targeting Social and
Professional Networks
• Threats directed at the Mobile Platform:
Smartphones and Tablets
The FuTure oF Cyber-Crimes in
india
saFeTy TiPs For Cyber Crime
• USE ANTIVIRUS SOFTWARE
• INSERT FIREWALLS
• UNINSTALL UNNCESSARY SOFTWARES
• MAINTAIN BACKUP
• CHECK SECURITY SETTING

Contenu connexe

Tendances

Tendances (20)

Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Ppt
PptPpt
Ppt
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 

En vedette

הצעת החוק ריבית עונשית
הצעת החוק ריבית עונשיתהצעת החוק ריבית עונשית
הצעת החוק ריבית עונשיתפוליסה
 
هل تفكر في إنشاء تطبيقاً للجوال والربح منه
هل تفكر في إنشاء تطبيقاً للجوال والربح منههل تفكر في إنشاء تطبيقاً للجوال والربح منه
هل تفكر في إنشاء تطبيقاً للجوال والربح منهHassan Mohammed
 
Projects in wikipedia for nomade fr
Projects in wikipedia for nomade frProjects in wikipedia for nomade fr
Projects in wikipedia for nomade frBACHOUNDA Mohammed
 
تعليم اللغة الإنجليزية، 7 عبارات إنجليزية تتردد كثيراً في الأفلام الأمريكية و...
تعليم اللغة الإنجليزية، 7 عبارات إنجليزية تتردد كثيراً في الأفلام الأمريكية و...تعليم اللغة الإنجليزية، 7 عبارات إنجليزية تتردد كثيراً في الأفلام الأمريكية و...
تعليم اللغة الإنجليزية، 7 عبارات إنجليزية تتردد كثيراً في الأفلام الأمريكية و...Hassan Mohammed
 
مشاريع ويكيميديا
مشاريع ويكيميديا مشاريع ويكيميديا
مشاريع ويكيميديا BACHOUNDA Mohammed
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

En vedette (10)

הצעת החוק ריבית עונשית
הצעת החוק ריבית עונשיתהצעת החוק ריבית עונשית
הצעת החוק ריבית עונשית
 
List grp arl
List grp arlList grp arl
List grp arl
 
هل تفكر في إنشاء تطبيقاً للجوال والربح منه
هل تفكر في إنشاء تطبيقاً للجوال والربح منههل تفكر في إنشاء تطبيقاً للجوال والربح منه
هل تفكر في إنشاء تطبيقاً للجوال والربح منه
 
Projects in wikipedia for nomade fr
Projects in wikipedia for nomade frProjects in wikipedia for nomade fr
Projects in wikipedia for nomade fr
 
تعليم اللغة الإنجليزية، 7 عبارات إنجليزية تتردد كثيراً في الأفلام الأمريكية و...
تعليم اللغة الإنجليزية، 7 عبارات إنجليزية تتردد كثيراً في الأفلام الأمريكية و...تعليم اللغة الإنجليزية، 7 عبارات إنجليزية تتردد كثيراً في الأفلام الأمريكية و...
تعليم اللغة الإنجليزية، 7 عبارات إنجليزية تتردد كثيراً في الأفلام الأمريكية و...
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
مشاريع ويكيميديا
مشاريع ويكيميديا مشاريع ويكيميديا
مشاريع ويكيميديا
 
Www.kutub.info 16076
Www.kutub.info 16076Www.kutub.info 16076
Www.kutub.info 16076
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similaire à CYBER CRIME

Similaire à CYBER CRIME (20)

Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Internet
InternetInternet
Internet
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 

Plus de Kunal Sinha

Spermaceti organ :In Sperm whale
Spermaceti organ :In Sperm whaleSpermaceti organ :In Sperm whale
Spermaceti organ :In Sperm whaleKunal Sinha
 
Why tidal energy !
Why tidal energy !Why tidal energy !
Why tidal energy !Kunal Sinha
 
Estuaries-Where River meets the sea.
Estuaries-Where River meets the sea.Estuaries-Where River meets the sea.
Estuaries-Where River meets the sea.Kunal Sinha
 
Different Expeditions and their contribution in ocean science
Different Expeditions and their contribution in ocean scienceDifferent Expeditions and their contribution in ocean science
Different Expeditions and their contribution in ocean scienceKunal Sinha
 
Conjugation and transduction
Conjugation and transduction Conjugation and transduction
Conjugation and transduction Kunal Sinha
 
Classification of seaweed
Classification of seaweedClassification of seaweed
Classification of seaweedKunal Sinha
 
Thyroid gland ( glandula thyreoidea)
Thyroid gland ( glandula thyreoidea)Thyroid gland ( glandula thyreoidea)
Thyroid gland ( glandula thyreoidea)Kunal Sinha
 

Plus de Kunal Sinha (8)

Spermaceti organ :In Sperm whale
Spermaceti organ :In Sperm whaleSpermaceti organ :In Sperm whale
Spermaceti organ :In Sperm whale
 
Why tidal energy !
Why tidal energy !Why tidal energy !
Why tidal energy !
 
Estuaries-Where River meets the sea.
Estuaries-Where River meets the sea.Estuaries-Where River meets the sea.
Estuaries-Where River meets the sea.
 
Different Expeditions and their contribution in ocean science
Different Expeditions and their contribution in ocean scienceDifferent Expeditions and their contribution in ocean science
Different Expeditions and their contribution in ocean science
 
Conjugation and transduction
Conjugation and transduction Conjugation and transduction
Conjugation and transduction
 
Classification of seaweed
Classification of seaweedClassification of seaweed
Classification of seaweed
 
Pearl Formation
Pearl FormationPearl Formation
Pearl Formation
 
Thyroid gland ( glandula thyreoidea)
Thyroid gland ( glandula thyreoidea)Thyroid gland ( glandula thyreoidea)
Thyroid gland ( glandula thyreoidea)
 

Dernier

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Dernier (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

CYBER CRIME

  • 2. DEFINE  According to Wikipedia.com cyber crime also known as computer crime that refers to any crime that involves a computer and a network.  Cyber crime is defined as crimes committed on the internet using the computer as either a tool or a targeted victim.
  • 3. CATEGORIES OF CYBER CRIME COMPUTER AS A TARGET COMPUTER AS A WEAPON
  • 6. PHISHING Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money.
  • 7. EMAIL-SPOOFING  Email spoofing is the creation of email messages with a forged sender address  Spoofing is when a spammer sends out emails using your email address in the From: field.
  • 8. COMPUTER VANDALISM Damaging or destroying data rather than stealing or misusing them is called cyber vandalism.
  • 9. SOFTWARE PIRACY Theft of software through the illegal copying of genuine programs.
  • 10. India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the Global Cyber Crime.
  • 11. WhY IndIA?  A rapidly growing online user base  121 Million Internet Users  65 Million Active Internet Users, up by 28% from 51 million in 2010  50 Million users shop online on Ecommerce and Online Shopping Sites  46+ Million Social Network Users  346 million mobile users had subscribed to Data Packages.  Source: IAMAI; Juxt; wearesocial 2011
  • 12.  Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks.
  • 13. The Information Technology Act, 2000 (1) Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code Cyber Laws in india
  • 14. • Continued Website Hacks and Defacements • Data and Information theft • Increasing phishing attacks on Ecommerce and Financial Websites • Cybercriminals targeting Social and Professional Networks • Threats directed at the Mobile Platform: Smartphones and Tablets The FuTure oF Cyber-Crimes in india
  • 15. saFeTy TiPs For Cyber Crime • USE ANTIVIRUS SOFTWARE • INSERT FIREWALLS • UNINSTALL UNNCESSARY SOFTWARES • MAINTAIN BACKUP • CHECK SECURITY SETTING