SlideShare a Scribd company logo
1 of 12
 What is Cyber Crime ?
 History of Cyber Crime
 Types of Cyber Crime
 Causes of Cyber Crime
 How to tackle Cyber Crime?
 Crime committed over internet
 Involves internet
 Computers used to commit crimes
 Computers used as the target of the
crime
“Offenses that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental harm , or
loss to the victim directly or indirectly using modern
telecommunications such as internet and mobile phones.”
(Dr. Debarati Halder)
Later on , when computers and networks came into being in the 1990s, hacking
was done basically to get more information about the systems. Hackers even
competed against one another to win the tag of the best hacker. As a result, many
networks were affected, hacking started making networks and systems slow. As
hackers became more skilful, they started using their knowledge and expertise to
gain benefit by exploiting and victimizing others.
 Cyber Hacking
 Cyber Terrorism
 Cyber Theft
 Cyber Stalking
This is a type of crime where in a person’s
computer is broken into so that his personal or
sensitive information can be accessed. In some
cases person may not be aware that his computer is
being accessed from a remote location.
In hacking, the criminal uses a variety of
internet-based software or programs
• to enter a person’s computer ,
• to disrupt a network ,
• to gain access to a system ,
• to steal sensitive information or data,
• causing damage to software present in the
system.
Cyber terrorism is a phrase used to
describe the use of internet based
attacks in terrorist activities, including
acts of deliberate, large-scale
disruption of computer networks,
especially of personal computers
attached to the internet, by the means
of tools such as computer viruses.
It varies from ..
• Stealing data and hacking
• Planning terrorist attacks
• Causing violence
• Attacking information systems
In this cyber crime, a criminal accesses
data about a person’s bank account,
credit cards, Social Security, debit card
and other sensitive information to
siphon money or to buy things online in
the victim’s name. It can result in major
financial losses for the victim and even
spoil the victim’s credit history.
The personal information stolen can include the
person's name, social security number, birth date or
credit card numbers. This stolen information is then
used to obtain new credit cards, access bank
accounts or obtain other benefits, such as a driver's
license.
Cyber stalking is the use of the Internet or electronics to
stalk or harass an individual, an organization or a specific
group. Cyber stalking can include harassment of the
victim, the obtaining of financial information of the victim
or threatening the victim in order to frighten them. A cyber
stalker relies upon the anonymity afforded by the Internet
to allow them to stalk their victim without being detected.
Possible reasons:
 Passion of youngsters
 For the sake of recognition
 Desire of making quick money
 Misconception of fighting a just cause
 Dissatisfied/disappointed employees
 Drawbacks in judiciary systems
 Lack of evidence
 Inaccessibility to criminals
 Loopholes in system
 Negligence of security of data
 Confidential information is online
One of the best ways to avoid being a victim of cyber crimes and
protecting your sensitive information is by making use of impenetrable
security that uses a unified system of software and hardware to
authenticate any information that is sent or accessed over the Internet.
This helps to keep the network and the systems using the network safe.
The best way to go about is using the solutions provided by Cross-
Domain Solutions. Cross Domain Solution offers a way to keep all
information confidential by using safe and secure domains that cannot
be tracked or accessed.
cyber crime
cyber crime

More Related Content

What's hot

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 

Viewers also liked

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
Harsha Matta
 

Viewers also liked (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime : Incident Highlights of 2011-2012
Cyber Crime : Incident Highlights of 2011-2012Cyber Crime : Incident Highlights of 2011-2012
Cyber Crime : Incident Highlights of 2011-2012
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
inflation rate
inflation rate inflation rate
inflation rate
 
Inflation presented by Tooba
Inflation presented by Tooba Inflation presented by Tooba
Inflation presented by Tooba
 
66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI
 
66a it act APOORVA BILLORE ITMI
66a it act APOORVA BILLORE ITMI66a it act APOORVA BILLORE ITMI
66a it act APOORVA BILLORE ITMI
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to cyber crime

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 

Similar to cyber crime (20)

Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 

Recently uploaded

+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
Health
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
eliklein8
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
ZurliaSoop
 
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
eliklein8
 
Panjim Goa Escort Girls ✿✸ 9971646499 ₢♚ Call Girls Panjim Goa Direct Cash O...
Panjim Goa Escort Girls ✿✸ 9971646499  ₢♚ Call Girls Panjim Goa Direct Cash O...Panjim Goa Escort Girls ✿✸ 9971646499  ₢♚ Call Girls Panjim Goa Direct Cash O...
Panjim Goa Escort Girls ✿✸ 9971646499 ₢♚ Call Girls Panjim Goa Direct Cash O...
ritikaroy0888
 

Recently uploaded (20)

+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
 
The Butterfly Effect
The Butterfly EffectThe Butterfly Effect
The Butterfly Effect
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for site
 
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 OnlyVIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Marketing Plan - Social Media. The Sparks Foundation
Marketing Plan -  Social Media. The Sparks FoundationMarketing Plan -  Social Media. The Sparks Foundation
Marketing Plan - Social Media. The Sparks Foundation
 
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
 
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpoint
 
Enhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content MarketingEnhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content Marketing
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
 
"Mastering the Digital Landscape: Navigating the World of Digital Marketing"
"Mastering the Digital Landscape: Navigating the World of Digital Marketing""Mastering the Digital Landscape: Navigating the World of Digital Marketing"
"Mastering the Digital Landscape: Navigating the World of Digital Marketing"
 
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot Model
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot ModelInternational Airport Call Girls 🥰 8617370543 Service Offer VIP Hot Model
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Panjim Goa Escort Girls ✿✸ 9971646499 ₢♚ Call Girls Panjim Goa Direct Cash O...
Panjim Goa Escort Girls ✿✸ 9971646499  ₢♚ Call Girls Panjim Goa Direct Cash O...Panjim Goa Escort Girls ✿✸ 9971646499  ₢♚ Call Girls Panjim Goa Direct Cash O...
Panjim Goa Escort Girls ✿✸ 9971646499 ₢♚ Call Girls Panjim Goa Direct Cash O...
 
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
 

cyber crime

  • 1.  What is Cyber Crime ?  History of Cyber Crime  Types of Cyber Crime  Causes of Cyber Crime  How to tackle Cyber Crime?
  • 2.  Crime committed over internet  Involves internet  Computers used to commit crimes  Computers used as the target of the crime “Offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm , or loss to the victim directly or indirectly using modern telecommunications such as internet and mobile phones.” (Dr. Debarati Halder)
  • 3. Later on , when computers and networks came into being in the 1990s, hacking was done basically to get more information about the systems. Hackers even competed against one another to win the tag of the best hacker. As a result, many networks were affected, hacking started making networks and systems slow. As hackers became more skilful, they started using their knowledge and expertise to gain benefit by exploiting and victimizing others.
  • 4.  Cyber Hacking  Cyber Terrorism  Cyber Theft  Cyber Stalking
  • 5. This is a type of crime where in a person’s computer is broken into so that his personal or sensitive information can be accessed. In some cases person may not be aware that his computer is being accessed from a remote location. In hacking, the criminal uses a variety of internet-based software or programs • to enter a person’s computer , • to disrupt a network , • to gain access to a system , • to steal sensitive information or data, • causing damage to software present in the system.
  • 6. Cyber terrorism is a phrase used to describe the use of internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the internet, by the means of tools such as computer viruses. It varies from .. • Stealing data and hacking • Planning terrorist attacks • Causing violence • Attacking information systems
  • 7. In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history. The personal information stolen can include the person's name, social security number, birth date or credit card numbers. This stolen information is then used to obtain new credit cards, access bank accounts or obtain other benefits, such as a driver's license.
  • 8. Cyber stalking is the use of the Internet or electronics to stalk or harass an individual, an organization or a specific group. Cyber stalking can include harassment of the victim, the obtaining of financial information of the victim or threatening the victim in order to frighten them. A cyber stalker relies upon the anonymity afforded by the Internet to allow them to stalk their victim without being detected.
  • 9. Possible reasons:  Passion of youngsters  For the sake of recognition  Desire of making quick money  Misconception of fighting a just cause  Dissatisfied/disappointed employees  Drawbacks in judiciary systems  Lack of evidence  Inaccessibility to criminals  Loopholes in system  Negligence of security of data  Confidential information is online
  • 10. One of the best ways to avoid being a victim of cyber crimes and protecting your sensitive information is by making use of impenetrable security that uses a unified system of software and hardware to authenticate any information that is sent or accessed over the Internet. This helps to keep the network and the systems using the network safe. The best way to go about is using the solutions provided by Cross- Domain Solutions. Cross Domain Solution offers a way to keep all information confidential by using safe and secure domains that cannot be tracked or accessed.