SlideShare a Scribd company logo
1 of 22
CYBER CRIME
Presentation Topic:
Nazish Jamali
OBJECTIVES
After this presentation students will be able to
know:
1. What is cyber crime?
2. How it is occur ?, (define thorough types)
3. How to avoid from it ?
Cyber Crime
Use of computer /internet to
do something that would be a
crime in any case..
• Cyber crimes
• When any crime is committed over
the Internet it is referred to as a
cyber crime.
• When you purchase a home it
comes with a door and lock .you
always ensure that your lock and
doors are working properly . you
may even purchase a security
system.
• Likewise , your system is your home and
security tools are door / locks and security
tools.
• So if someone breaches into your
home’s(system), access all you personal
account and tempers your data , is the
criminal who is committing the crime.
• And committed crime is known as cyber
crime.
• That means we can say that cyber crime is an
illegal activity commotted on the internet.
• Hacking: This is a type of crime wherein a person’s computer
is broken into so that his personal or sensitive information can
be accessed. In hacking, the criminal uses a variety of
software to enter a person’s computer and the person may
not be aware that his computer is being accessed from a
remote location.
• Cyber Stalking: This is a kind of online harassment wherein the
victim is subjected to a barrage of online messages and emails. Typically,
these stalkers know their victims and instead of resorting to offline
stalking, they use the Internet to stalk. However, if they notice that cyber
stalking is not having the desired effect, they begin offline stalking along
with cyber stalking to make the victims’ lives more miserable.
Email spam and phishing
• Spam is electronic junk mail,
• unwanted messages sent by email, text
message or instant message without the
recipient’s permission
• Spam messages often contain offers of free
goods or prizes, cheap products. You might
be asked to buy something to win a prize or
to call or text a telephone number
Email spam and phishing
• Phishing is a way that criminals trick people into giving
out their personal or financial details.
• Phishing messages often imagine to come from legal
businesses, such as banks or telecommunications
providers.
• Phishing is the practice of attracting users to visit fake
Web sites in order to steal passwords, pin numbers and
other sensitive information.
• Do not respond to phishing messages. If you receive a
phishing message the best thing to do is delete it.
Email spam and phishing
Case study
• Mark is 42 years old and lives in Adelaide. He
receives an email from his bank which says his
internet banking password needs to be
changed. He clicks the link in the email and
resets his password. The next day, he realises
that the email was not actually from his bank.
He checks his account and finds $1000 is
missing.
Identity theft
• When a criminal gains access to your personal
information (such as your name, address, date of birth
or bank account details) to steal money or gain other
benefits.
• They can also use your personal information to create
fake identity in your name
• How does identity theft occur?
• Criminals may attempt to gain your personal
information using a number of different techniques
• Phishing: you may provide personal information over
the phone or internet
Online scam or fraud
• These are false schemes that seek to
take advantage of innocent people to
gain a benefit (such as money, or
access to personal details).
• These are often contained
in spam and phishing messages.
Online scam or fraud
Common types of online scams include:
1. Unexpected prize scams: They inform you that you have won a
prize (e/g. money, shopping vouchers, etc) and to claim it you
are asked to send money or provide personal information.
2. Dating or romance scams
3. Jobs and investment scams: Job scams target people who are
looking for a new job or who want to work from home.
4. Identity theft
• Do not respond to online scams or fraud. If you receive an email
or SMS which looks like a scam, the best thing to do is delete it.
Attacks on computer systems
• unauthorised access or hacking : use your
computer or devices without permission
• malware : malicious software (such as viruses,
trojans and spyware) Criminals may use malicious
software (or malware) to monitor your online
activity and cause damage to the computer.
• Malware is often downloaded when people open
an infected email attachment or click a
mistrustful link in an email.
• Malware can also be used to steal your
usernames, passwords or other information
Tips to avoid cybercrime
• Be social media savvy:
Make sure your social networking profiles (e.g.
Facebook, Twitter, YouTube, MSN, etc.) are set
to private. Check your security settings. Be
careful what information you post online.
Once it is on the Internet, it is extremely
difficult to remove.
Tips to avoid cybercrime
1. Ignore the unwanted messages or e-mails
2. Protect your e-identity (electronic identity)
3. Never store your own details on any mobile device (Secure
mobile devices)
4. If in doubt, block
5. Ignore pop-ups
6. Only shop online on secure sites
7. Different site, different passwords (don’t use same key for
all locks)
8. Lock down your FB account
9. Always make sure that login pages use SSL and that the
login pages starts with https://
CONCLUSION
Technology is negative only in the hands of
people who do not realize that they are one and
the same process as the universe.
Cyber crime ppt

More Related Content

What's hot

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentationRoel Palmaers
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeAdeel Rasheed
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureThe Pathway Group
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and Procedure
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to Cyber crime ppt

wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxssuserb73103
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHINGsanthuana sg
 
Data theft
Data theftData theft
Data theftLaura
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Cyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessCyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessShwetaSingh713663
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)Dhrumit Patel
 

Similar to Cyber crime ppt (20)

wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
Data theft
Data theftData theft
Data theft
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessCyber Crime &Cyber Awareness
Cyber Crime &Cyber Awareness
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 

More from Nazish Jamali

my Assignment, on browsers | computer
my Assignment, on browsers | computermy Assignment, on browsers | computer
my Assignment, on browsers | computerNazish Jamali
 
Effects of individual difference
Effects of individual differenceEffects of individual difference
Effects of individual differenceNazish Jamali
 
Critical thinking | interogatting the text
Critical thinking | interogatting the textCritical thinking | interogatting the text
Critical thinking | interogatting the textNazish Jamali
 
Foundation of education education role in pakistan
Foundation of education education role in pakistanFoundation of education education role in pakistan
Foundation of education education role in pakistanNazish Jamali
 
Development of eduation first four plans of pakistan
Development of eduation first four plans of pakistanDevelopment of eduation first four plans of pakistan
Development of eduation first four plans of pakistanNazish Jamali
 
Point out nouns from given paragraph | my assignment
Point out nouns from given paragraph | my assignmentPoint out nouns from given paragraph | my assignment
Point out nouns from given paragraph | my assignmentNazish Jamali
 
State of being englis 1 my assignment
State of being englis 1 my assignmentState of being englis 1 my assignment
State of being englis 1 my assignmentNazish Jamali
 
Basic operations of computer my assignment
Basic operations of computer my assignmentBasic operations of computer my assignment
Basic operations of computer my assignmentNazish Jamali
 
Word formation process english content my assignment
Word formation process english content my assignmentWord formation process english content my assignment
Word formation process english content my assignmentNazish Jamali
 
Some topics of Computer
Some topics of ComputerSome topics of Computer
Some topics of ComputerNazish Jamali
 
Effects of school, community and teacher B.Ed (Hons)
Effects of school, community and teacher B.Ed (Hons)Effects of school, community and teacher B.Ed (Hons)
Effects of school, community and teacher B.Ed (Hons)Nazish Jamali
 
Square root in mathematics
Square root in mathematicsSquare root in mathematics
Square root in mathematicsNazish Jamali
 
State of Being, English
State of Being, EnglishState of Being, English
State of Being, EnglishNazish Jamali
 
Proportion and its types, mathematics 8
Proportion and its types, mathematics 8Proportion and its types, mathematics 8
Proportion and its types, mathematics 8Nazish Jamali
 
Exponent, mathematics 7
Exponent, mathematics 7Exponent, mathematics 7
Exponent, mathematics 7Nazish Jamali
 
Interrogating the text , Critical thinking
Interrogating the  text , Critical thinkingInterrogating the  text , Critical thinking
Interrogating the text , Critical thinkingNazish Jamali
 
Individual difference and its effects on learning
Individual difference and its effects on learningIndividual difference and its effects on learning
Individual difference and its effects on learningNazish Jamali
 
General methods, strategy and techniques of teaching
General methods, strategy and techniques of teachingGeneral methods, strategy and techniques of teaching
General methods, strategy and techniques of teachingNazish Jamali
 
decade of development
 decade of development decade of development
decade of developmentNazish Jamali
 

More from Nazish Jamali (20)

my Assignment, on browsers | computer
my Assignment, on browsers | computermy Assignment, on browsers | computer
my Assignment, on browsers | computer
 
Effects of individual difference
Effects of individual differenceEffects of individual difference
Effects of individual difference
 
Critical thinking | interogatting the text
Critical thinking | interogatting the textCritical thinking | interogatting the text
Critical thinking | interogatting the text
 
Foundation of education education role in pakistan
Foundation of education education role in pakistanFoundation of education education role in pakistan
Foundation of education education role in pakistan
 
Development of eduation first four plans of pakistan
Development of eduation first four plans of pakistanDevelopment of eduation first four plans of pakistan
Development of eduation first four plans of pakistan
 
Point out nouns from given paragraph | my assignment
Point out nouns from given paragraph | my assignmentPoint out nouns from given paragraph | my assignment
Point out nouns from given paragraph | my assignment
 
State of being englis 1 my assignment
State of being englis 1 my assignmentState of being englis 1 my assignment
State of being englis 1 my assignment
 
Basic operations of computer my assignment
Basic operations of computer my assignmentBasic operations of computer my assignment
Basic operations of computer my assignment
 
Word formation process english content my assignment
Word formation process english content my assignmentWord formation process english content my assignment
Word formation process english content my assignment
 
Some topics of Computer
Some topics of ComputerSome topics of Computer
Some topics of Computer
 
Effects of school, community and teacher B.Ed (Hons)
Effects of school, community and teacher B.Ed (Hons)Effects of school, community and teacher B.Ed (Hons)
Effects of school, community and teacher B.Ed (Hons)
 
Assessment
AssessmentAssessment
Assessment
 
Square root in mathematics
Square root in mathematicsSquare root in mathematics
Square root in mathematics
 
State of Being, English
State of Being, EnglishState of Being, English
State of Being, English
 
Proportion and its types, mathematics 8
Proportion and its types, mathematics 8Proportion and its types, mathematics 8
Proportion and its types, mathematics 8
 
Exponent, mathematics 7
Exponent, mathematics 7Exponent, mathematics 7
Exponent, mathematics 7
 
Interrogating the text , Critical thinking
Interrogating the  text , Critical thinkingInterrogating the  text , Critical thinking
Interrogating the text , Critical thinking
 
Individual difference and its effects on learning
Individual difference and its effects on learningIndividual difference and its effects on learning
Individual difference and its effects on learning
 
General methods, strategy and techniques of teaching
General methods, strategy and techniques of teachingGeneral methods, strategy and techniques of teaching
General methods, strategy and techniques of teaching
 
decade of development
 decade of development decade of development
decade of development
 

Recently uploaded

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 

Recently uploaded (20)

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 

Cyber crime ppt

  • 3. OBJECTIVES After this presentation students will be able to know: 1. What is cyber crime? 2. How it is occur ?, (define thorough types) 3. How to avoid from it ?
  • 4.
  • 5.
  • 6. Cyber Crime Use of computer /internet to do something that would be a crime in any case..
  • 7. • Cyber crimes • When any crime is committed over the Internet it is referred to as a cyber crime. • When you purchase a home it comes with a door and lock .you always ensure that your lock and doors are working properly . you may even purchase a security system.
  • 8. • Likewise , your system is your home and security tools are door / locks and security tools. • So if someone breaches into your home’s(system), access all you personal account and tempers your data , is the criminal who is committing the crime. • And committed crime is known as cyber crime. • That means we can say that cyber crime is an illegal activity commotted on the internet.
  • 9. • Hacking: This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed. In hacking, the criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location.
  • 10. • Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims’ lives more miserable.
  • 11.
  • 12. Email spam and phishing • Spam is electronic junk mail, • unwanted messages sent by email, text message or instant message without the recipient’s permission • Spam messages often contain offers of free goods or prizes, cheap products. You might be asked to buy something to win a prize or to call or text a telephone number
  • 13. Email spam and phishing • Phishing is a way that criminals trick people into giving out their personal or financial details. • Phishing messages often imagine to come from legal businesses, such as banks or telecommunications providers. • Phishing is the practice of attracting users to visit fake Web sites in order to steal passwords, pin numbers and other sensitive information. • Do not respond to phishing messages. If you receive a phishing message the best thing to do is delete it.
  • 14. Email spam and phishing Case study • Mark is 42 years old and lives in Adelaide. He receives an email from his bank which says his internet banking password needs to be changed. He clicks the link in the email and resets his password. The next day, he realises that the email was not actually from his bank. He checks his account and finds $1000 is missing.
  • 15. Identity theft • When a criminal gains access to your personal information (such as your name, address, date of birth or bank account details) to steal money or gain other benefits. • They can also use your personal information to create fake identity in your name • How does identity theft occur? • Criminals may attempt to gain your personal information using a number of different techniques • Phishing: you may provide personal information over the phone or internet
  • 16. Online scam or fraud • These are false schemes that seek to take advantage of innocent people to gain a benefit (such as money, or access to personal details). • These are often contained in spam and phishing messages.
  • 17. Online scam or fraud Common types of online scams include: 1. Unexpected prize scams: They inform you that you have won a prize (e/g. money, shopping vouchers, etc) and to claim it you are asked to send money or provide personal information. 2. Dating or romance scams 3. Jobs and investment scams: Job scams target people who are looking for a new job or who want to work from home. 4. Identity theft • Do not respond to online scams or fraud. If you receive an email or SMS which looks like a scam, the best thing to do is delete it.
  • 18. Attacks on computer systems • unauthorised access or hacking : use your computer or devices without permission • malware : malicious software (such as viruses, trojans and spyware) Criminals may use malicious software (or malware) to monitor your online activity and cause damage to the computer. • Malware is often downloaded when people open an infected email attachment or click a mistrustful link in an email. • Malware can also be used to steal your usernames, passwords or other information
  • 19. Tips to avoid cybercrime • Be social media savvy: Make sure your social networking profiles (e.g. Facebook, Twitter, YouTube, MSN, etc.) are set to private. Check your security settings. Be careful what information you post online. Once it is on the Internet, it is extremely difficult to remove.
  • 20. Tips to avoid cybercrime 1. Ignore the unwanted messages or e-mails 2. Protect your e-identity (electronic identity) 3. Never store your own details on any mobile device (Secure mobile devices) 4. If in doubt, block 5. Ignore pop-ups 6. Only shop online on secure sites 7. Different site, different passwords (don’t use same key for all locks) 8. Lock down your FB account 9. Always make sure that login pages use SSL and that the login pages starts with https://
  • 21. CONCLUSION Technology is negative only in the hands of people who do not realize that they are one and the same process as the universe.