Crimes in digital marketing..pptx

R
RajviNikeetaRathoreLaw Student, Researcher
By Rajvi Nikeeta Rathore
 The invention of computer and Information technology related software and equipment has
revolutionized the way we do things in many fields.Especially in the science, education,
business and commerce it has made far reaching changes.Without using a single sheet of
paper, a lot of communications and transactions are done.Automation of businesses, financial
institutions and the government records have become widespread.
 Many transactions such as sale of goods, transfer of information, transfer of funds and even
buying air tickets could be done through the use of computers. The existing laws that governs
transactions and information did not address such issues as they were made before the IT era.
 Any illegal behavior directed by means of electronic operations. that targets the security of
computer systems and the data. processed by them is termed cyber crime.
 1. Phishing Scams
 2. Website Spoofing
 3. Ransomware
 4. Malware
 5. IOT Hacking
 (1)PHISHING SCAMS
 The majority of successful cyber attacks - 91% according to a study by PhishMe - begin when
curiosity, fear, or a sense of urgency entices someone to enter personal data or click on a
link.Phishing emails mimic messages from someone you know or a business that you trust.
They are designed to trick people into giving up personal information or clicking on a malicious
link that downloads malware. Thousands of phishing attacks are launched every day.
 (2)WEBSITE SPOOFING
 The word spoof means to hoax, trick, or deceive. Website spoofing is when a website is designed to look like a
real one and deceive you into believing it is a legitimate site. This is done to gain your confidence, get access to
your systems, steal data, steal money, or spread malware.
 Website spoofing works by replicating a legitimate website with a big company’s style, branding, user interface,
and even domain name in an attempt to trick users into entering their usernames and passwords. This is how the
bad guys capture your data or drop malware onto your computer.Spoofed websites are generally used in
conjunction with an email that links to the illegitimate website. As of last August, spoofing and phishing may have
cost businesses as much as $354 million.

(3)RANSOMWARE
 Ransomware is a modern day, technical twist on a crime that has been around for ages - extortion. At its core,
ransomware works when criminals steal something of great value and demand payment in exchange for its return.
For most businesses, this involves the encryption of company data. When ransomware hits, businesses come to a
standstill, and employees cannot do their jobs.Without restorable backup data, the company is generally at the
mercy of the attacker who will hold your data hostage in exchange for a decryption key you can buy with Bitcoin.
 Ransomware has matured into its own category of malware and should be a primary concern for all organizations.
According to new research, ransomware breaches have increased by 13% – more than the last five years
combined.
 (4)MALWARE
 Norton defines malware as “malicious software” specifically designed to gain access to or damage a computer. In the case of ransomware, it's designed to
hold your data hostage, but that isn’t the only kind. There can be multiple objectives for malware - power, influence, money, information - but the result is
always the same - a time consuming, often expensive recovery effort.

Common types of malware include:
 ●Viruses that spread, damage functionality, and corrupt files.
 ●Trojans disguised as legitimate software that quietly create backdoors to let other malware into your network.
 ●Worms that can infect all of the devices connected to a network.
 ●Ransomware that holds your data hostage
 Botnets - a network of infected devices that work together under the control of an attacker.

(5)IOT HACKING
 The Internet of Things is a brave new world that has opened insights into our daily routines and our business processes to the web. Whether we like it or not,
all of these internet-connected objects are collecting and exchanging data. As you know, data is valuable and for that reason, hackers will look to exploit any
devices that aggregate it.

The more “things” we connect - the juicier the reward becomes for hackers. That’s why it’s important to remember that personal passwords and business
passwords all belong to humans… with memories that we know are going to let us down from time to time.
 1.Stay Up to Date
 It goes without saying but having the most up-to-date security software provides better
protection against hackers, malware, viruses, and more. This is only one piece of the actions
you can take, but an important one.

2.Be Smart with Devices
 That computer, smart phone, tablet, and social media site you can’t get enough of are also
avenues for bad actors to steal data. It’s not a complete doomsday scenario. Each device or
site normally has security settings in the form of pins, passwords, and control over who sees
your content. Brush up on security features and use them to your advantage. And, finally, be
smart. Don’t share passwords, codes or pins with anyone.
 3.Don’t Go Public If You Can
 That free WIFI stores, restaurants, and other public places offer may be free, but it can come
with collateral fallout. In other words, free may come with a cost if you’re not careful.
 Keep this in mind: if it’s free to you, it’s also free to threat actors. Be careful entering any
personal information, using apps with passwords or entering login information, because hackers
can see what you’re doing. The best advice is to steer clear of public WIFI, or simply don’t enter
any data that can be compromised.

4.Simple and Easy
 When not using a computer, smart phone, tablet or any other device that has connectivity,
simply lock or log off when you’re not using them. Visions of bad actors conjure up faceless
hackers who live in the ether but be aware that they also exist in the flesh. Leave that laptop
unlocked, step away for even a few minutes, and anyone can walk up and gain instant access.
 5.Don’t Phish
 Follow an adage as old as the hills: if it’s too good to be true, then it probably is. The same
applies when you come across a link, text, email, online advertising or website that looks
inviting, yet suspicious. Be vigilant about any types of these — including credit card company
phone calls — requesting personal information. If they immediately request personal data, or
information, be weary.

6.Minimize Info
 Sure, businesses are trying to capture personal information for marketing and third-party
services, but it’s best to steer away from entering data like birthdates, social security numbers,
and any other information tied to your identity. It leaves a digital footprint that hackers love.
 Data plays an integral role in the commission of many cybercrimes and vulnerabilities to
cybercrime. Even though data provides users of it (individuals, private companies,
organizations, and governments) with innumerable opportunities, these benefits can be (and
have been) exploited by some for criminal purposes. Specifically, data collection, storage,
analysis, and sharing both enables many cybercrimes and the vast collection, storage, use, and
distribution of data without users' informed consent and choice and necessary legal and
security protections. What is more, data aggregation, analysis, and transfer occur at scales that
governments and organizations are unprepared for, creating a slew of cybersecurity risks.
Privacy, data protection, and security of systems, networks, and data are interdependent. In
view of that, to protect against cybercrime, security measures are needed that are designed to
protect data and user's privacy.
Crimes in digital marketing..pptx
1 sur 11

Recommandé

Online Scams and Frauds par
Online Scams and FraudsOnline Scams and Frauds
Online Scams and FraudsQuick Heal Technologies Ltd.
12.8K vues35 diapositives
Cyber bullying par
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
13.5K vues18 diapositives
Internet Fraud par
Internet FraudInternet Fraud
Internet FraudVasundhara Singh Gautam
4.8K vues13 diapositives
Cyber crime par
Cyber crimeCyber crime
Cyber crimeyazad dumasia
1.7K vues25 diapositives
Phishing ppt par
Phishing pptPhishing ppt
Phishing pptSanjay Kumar
58.3K vues16 diapositives
Identity theft par
Identity theftIdentity theft
Identity theftEqhball Ghazizadeh
3.3K vues35 diapositives

Contenu connexe

Tendances

Cyber-crime PPT par
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPTAnshuman Tripathi
216.8K vues19 diapositives
Cybercrime Awareness par
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
13.3K vues13 diapositives
Phishing par
PhishingPhishing
PhishingAlka Falwaria
13.6K vues28 diapositives
Cybercrime presentation par
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
146.3K vues42 diapositives
Cyber crime par
Cyber crimeCyber crime
Cyber crimeGrant Thornton Bangladesh
1.9K vues14 diapositives
What is Cyberbullying? par
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?Karissa Joy Daculap
1.7K vues16 diapositives

Tendances(20)

Cybercrime Awareness par Sibesh Singh
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Sibesh Singh13.3K vues
Cybercrime presentation par Rajat Jain
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain146.3K vues
Phishing Scams: 8 Helpful Tips to Keep You Safe par CheapSSLsecurity
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
CheapSSLsecurity765 vues
Cybercrime.ppt par Aeman Khan
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan727.9K vues
Cyber crime in India PPT .pptx par Tushar Bisen
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
Tushar Bisen3K vues
Cyber security awareness for students par Kandarp Shah
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah46.5K vues
Cyber crime ppt par MOE515253
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253344K vues
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf par Soo Chin Hock
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Soo Chin Hock76 vues
Cyberbullying powerpoint par josiebrookeday
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
josiebrookeday110.1K vues
Phishing Attack : A big Threat par sourav newatia
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
sourav newatia1.3K vues
Cybersecurity Awareness Training Presentation v1.0 par DallasHaselhorst
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
DallasHaselhorst18.8K vues

Similaire à Crimes in digital marketing..pptx

A Guide to Internet Security For Businesses- Business.com par
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
483 vues21 diapositives
Target Data Breach Case Study 10242014 par
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
2.4K vues20 diapositives
The Major Types of Cybercrime par
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
250 vues23 diapositives
Edu 03 assingment par
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
102 vues10 diapositives
Internet fraud and Common modes of security threats .pptx par
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxMoizAhmed398372
16 vues14 diapositives
Top Positive and Negative Impacts of AI & ML on Cybersecurity par
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityPixel Crayons
51 vues12 diapositives

Similaire à Crimes in digital marketing..pptx(20)

A Guide to Internet Security For Businesses- Business.com par Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
Business.com483 vues
The Major Types of Cybercrime par Rubi Orbeta
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta250 vues
Edu 03 assingment par Aswani34
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
Aswani34102 vues
Internet fraud and Common modes of security threats .pptx par MoizAhmed398372
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
MoizAhmed39837216 vues
Top Positive and Negative Impacts of AI & ML on Cybersecurity par Pixel Crayons
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Pixel Crayons51 vues
Cyber crime ppt par Bushra22
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra226.5K vues
Digital Defense for Activists (and the rest of us) par Michele Chubirka
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
Michele Chubirka3.8K vues

Dernier

ICS3211_lecture 08_2023.pdf par
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdfVanessa Camilleri
103 vues30 diapositives
11.28.23 Social Capital and Social Exclusion.pptx par
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptxmary850239
281 vues25 diapositives
Psychology KS4 par
Psychology KS4Psychology KS4
Psychology KS4WestHatch
68 vues4 diapositives
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1} par
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}DR .PALLAVI PATHANIA
240 vues195 diapositives
Ch. 7 Political Participation and Elections.pptx par
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptxRommel Regala
72 vues11 diapositives
231112 (WR) v1 ChatGPT OEB 2023.pdf par
231112 (WR) v1  ChatGPT OEB 2023.pdf231112 (WR) v1  ChatGPT OEB 2023.pdf
231112 (WR) v1 ChatGPT OEB 2023.pdfWilfredRubens.com
144 vues21 diapositives

Dernier(20)

11.28.23 Social Capital and Social Exclusion.pptx par mary850239
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptx
mary850239281 vues
Ch. 7 Political Participation and Elections.pptx par Rommel Regala
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptx
Rommel Regala72 vues
Structure and Functions of Cell.pdf par Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan368 vues
Class 10 English lesson plans par TARIQ KHAN
Class 10 English  lesson plansClass 10 English  lesson plans
Class 10 English lesson plans
TARIQ KHAN257 vues
JiscOAWeek_LAIR_slides_October2023.pptx par Jisc
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
Jisc79 vues
Solar System and Galaxies.pptx par DrHafizKosar
Solar System and Galaxies.pptxSolar System and Galaxies.pptx
Solar System and Galaxies.pptx
DrHafizKosar85 vues
The Open Access Community Framework (OACF) 2023 (1).pptx par Jisc
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
Jisc85 vues
American Psychological Association 7th Edition.pptx par SamiullahAfridi4
American Psychological Association  7th Edition.pptxAmerican Psychological Association  7th Edition.pptx
American Psychological Association 7th Edition.pptx

Crimes in digital marketing..pptx

  • 2.  The invention of computer and Information technology related software and equipment has revolutionized the way we do things in many fields.Especially in the science, education, business and commerce it has made far reaching changes.Without using a single sheet of paper, a lot of communications and transactions are done.Automation of businesses, financial institutions and the government records have become widespread.  Many transactions such as sale of goods, transfer of information, transfer of funds and even buying air tickets could be done through the use of computers. The existing laws that governs transactions and information did not address such issues as they were made before the IT era.
  • 3.  Any illegal behavior directed by means of electronic operations. that targets the security of computer systems and the data. processed by them is termed cyber crime.
  • 4.  1. Phishing Scams  2. Website Spoofing  3. Ransomware  4. Malware  5. IOT Hacking  (1)PHISHING SCAMS  The majority of successful cyber attacks - 91% according to a study by PhishMe - begin when curiosity, fear, or a sense of urgency entices someone to enter personal data or click on a link.Phishing emails mimic messages from someone you know or a business that you trust. They are designed to trick people into giving up personal information or clicking on a malicious link that downloads malware. Thousands of phishing attacks are launched every day.
  • 5.  (2)WEBSITE SPOOFING  The word spoof means to hoax, trick, or deceive. Website spoofing is when a website is designed to look like a real one and deceive you into believing it is a legitimate site. This is done to gain your confidence, get access to your systems, steal data, steal money, or spread malware.  Website spoofing works by replicating a legitimate website with a big company’s style, branding, user interface, and even domain name in an attempt to trick users into entering their usernames and passwords. This is how the bad guys capture your data or drop malware onto your computer.Spoofed websites are generally used in conjunction with an email that links to the illegitimate website. As of last August, spoofing and phishing may have cost businesses as much as $354 million.  (3)RANSOMWARE  Ransomware is a modern day, technical twist on a crime that has been around for ages - extortion. At its core, ransomware works when criminals steal something of great value and demand payment in exchange for its return. For most businesses, this involves the encryption of company data. When ransomware hits, businesses come to a standstill, and employees cannot do their jobs.Without restorable backup data, the company is generally at the mercy of the attacker who will hold your data hostage in exchange for a decryption key you can buy with Bitcoin.  Ransomware has matured into its own category of malware and should be a primary concern for all organizations. According to new research, ransomware breaches have increased by 13% – more than the last five years combined.
  • 6.  (4)MALWARE  Norton defines malware as “malicious software” specifically designed to gain access to or damage a computer. In the case of ransomware, it's designed to hold your data hostage, but that isn’t the only kind. There can be multiple objectives for malware - power, influence, money, information - but the result is always the same - a time consuming, often expensive recovery effort.  Common types of malware include:  ●Viruses that spread, damage functionality, and corrupt files.  ●Trojans disguised as legitimate software that quietly create backdoors to let other malware into your network.  ●Worms that can infect all of the devices connected to a network.  ●Ransomware that holds your data hostage  Botnets - a network of infected devices that work together under the control of an attacker.  (5)IOT HACKING  The Internet of Things is a brave new world that has opened insights into our daily routines and our business processes to the web. Whether we like it or not, all of these internet-connected objects are collecting and exchanging data. As you know, data is valuable and for that reason, hackers will look to exploit any devices that aggregate it.  The more “things” we connect - the juicier the reward becomes for hackers. That’s why it’s important to remember that personal passwords and business passwords all belong to humans… with memories that we know are going to let us down from time to time.
  • 7.  1.Stay Up to Date  It goes without saying but having the most up-to-date security software provides better protection against hackers, malware, viruses, and more. This is only one piece of the actions you can take, but an important one.  2.Be Smart with Devices  That computer, smart phone, tablet, and social media site you can’t get enough of are also avenues for bad actors to steal data. It’s not a complete doomsday scenario. Each device or site normally has security settings in the form of pins, passwords, and control over who sees your content. Brush up on security features and use them to your advantage. And, finally, be smart. Don’t share passwords, codes or pins with anyone.
  • 8.  3.Don’t Go Public If You Can  That free WIFI stores, restaurants, and other public places offer may be free, but it can come with collateral fallout. In other words, free may come with a cost if you’re not careful.  Keep this in mind: if it’s free to you, it’s also free to threat actors. Be careful entering any personal information, using apps with passwords or entering login information, because hackers can see what you’re doing. The best advice is to steer clear of public WIFI, or simply don’t enter any data that can be compromised.  4.Simple and Easy  When not using a computer, smart phone, tablet or any other device that has connectivity, simply lock or log off when you’re not using them. Visions of bad actors conjure up faceless hackers who live in the ether but be aware that they also exist in the flesh. Leave that laptop unlocked, step away for even a few minutes, and anyone can walk up and gain instant access.
  • 9.  5.Don’t Phish  Follow an adage as old as the hills: if it’s too good to be true, then it probably is. The same applies when you come across a link, text, email, online advertising or website that looks inviting, yet suspicious. Be vigilant about any types of these — including credit card company phone calls — requesting personal information. If they immediately request personal data, or information, be weary.  6.Minimize Info  Sure, businesses are trying to capture personal information for marketing and third-party services, but it’s best to steer away from entering data like birthdates, social security numbers, and any other information tied to your identity. It leaves a digital footprint that hackers love.
  • 10.  Data plays an integral role in the commission of many cybercrimes and vulnerabilities to cybercrime. Even though data provides users of it (individuals, private companies, organizations, and governments) with innumerable opportunities, these benefits can be (and have been) exploited by some for criminal purposes. Specifically, data collection, storage, analysis, and sharing both enables many cybercrimes and the vast collection, storage, use, and distribution of data without users' informed consent and choice and necessary legal and security protections. What is more, data aggregation, analysis, and transfer occur at scales that governments and organizations are unprepared for, creating a slew of cybersecurity risks. Privacy, data protection, and security of systems, networks, and data are interdependent. In view of that, to protect against cybercrime, security measures are needed that are designed to protect data and user's privacy.