SlideShare une entreprise Scribd logo
1  sur  17
Submitted By:
Bhoopesh Chaudhary
Vipin Rawat
Prateek Kumar
Mukul Saini
Ishaan Asthana
Presentation on Cyber
Crime
Content
 Introduction
 What is Cyber Crime
 Evolution of Cyber Attacks
 History of cyber crime
 Types of cyber crime
 Categories of cyber crime
 Top 5 Cyber Crimes
 Prevention
 Conclusion
Introduction
 The internet in India is growing rapidly. It has given rise
to new opportunities in every field we can think of be it
entertainment, business, sports or education.
 There are two sides to a coin. Internet also has its own
disadvantages. One of the major disadvantages is Cyber
crime i.e illegal activity committed on the internet.
 Cyber crime is not an old sort of crime to the world. It is
defined as any criminal activity which takes place on or
over the medium of computers or internet or other
technology recognized by the Information Technology
Act.
What is Cybercrime
 Cybercrime is any illegal act committed using a
computer network (especially the Internet).
 Cybercrime is a subset of computer crime.
 Cyber crime is the most prevalent crime playing a
devastating role in Modern India. Not only the criminals
are causing enormous losses to the society and the
government but are also able to conceal their identity to
a great extent.
Evolution of Cyber Attacks
 In the last quarter-century alone, cyber-attacks have evolved from
tiny hacks developed by high school students to state-sponsored
attacks that compromised the presidential election.
 With the advent of the 2000s and the mass adoption of applications
by the digital world, we have entered a new era of cyber threats that
focus on exploiting vulnerabilities in these applications.
 Beginning in 2010 large organizations began hiring more
cybersecurity experts to counter the risk of cyber threats, as the
sense of supposed digital security evaporated.
 2016 has seen an increase in multi-vector attacks, which are largely
state-sponsored and therefore have the potential to attract a lot of
attention. These kinds of attacks happen to be the most destructive,
as hackers develop tools to attack anything and everything digital.
History
 The first recorded cyber crime took place in the year
1820.
 In 1820, Joseph-Marie Jacquard, a textile manufacturer
in France, produced the loom. This device allowed the
repetition of a series of steps in the weaving of special
fabrics.
 This resulted in a fear amongst Jacquard‘s employees
that their traditional employment and livelihood were
being threatened.
 They committed acts of sabotage to discourage Jacquard
from further use of the new technology. This is the first
recorded cyber crime.
Types of Cyber Crime
 Hacking
 Denial OF Service Attack
 Virus Dissemination
 Computer Forgery
 Credit Card Fraud
 Phishing
 Spoofing
 Cyber Stalking
 Threatening
 Salami attack
Modification of a conventional
crime by using computers
 Financial crimes
 Sale of illegal articles
 Online gambling
 Intellectual Property crime
 Email spoofing
 Forgery
 Cyber Defamation
 Cyber stalking
Cyber crime Categories
 Cybercrime is a broad term that is used to define
criminal activity where a computer or computer
network is a tool, target, or location of criminal
activity, including computers themselves. The term
is a generic term that includes crimes such as the
abduction of children by chatroom scams
 Cyber crime major categories are as follows:
1) Cyber crime against persons.
2) Cyber crime against property.
3) Cyber crime against government.
First Category
 Cyber harassment is a distinct Cybercrime. Various kinds of
harassment can and do occur in cyberspace, or through the use of
cyberspace. Harassment can be sexual, racial, religious, or other.
 Particular attention has been paid to the use of cybercrime as a tool
for organized crime groups such as drug traffics and money
laundering. This type of crime includes the use of virtual currencies
such as Bitcoin, Litecoin, Bitcoin Cash, Monero, and Ethereum.
 The spread of the Internet in daily life has made online harassment a
major threat to the safety and well-being of many people. Online
harassment can include threatening e-mails, threats of physical
violence, or posting information on the Internet. Cyberbullying,
online predatory, cyberstalking, Internet trolling, propagation of
illegal obscene, or offensive content, including harassment and
threats are considered as online harassment.
Second Category
 These crimes include computer vandalism(destruction of others'
property), transmission of harmful programs, unauthorized
trespassing through cyber space, unauthorized possession of
computer information.
 Cybercrime is a criminal activity that involves computers,
networked devices, and networks. This is done by infecting
computers with computer viruses that spread to other computers in a
network, such as networks, servers, and other computer systems. A
computer as a target means an illegal act in which the main target is
a computer or network. DDoS attacks and malware are considered
as computers as targets.
 Computer as a tool crime is categorized when the individuals are the
primary targets. For such cyber crimes, relatively less technical
expertise is needed. Some computers as a tool for cyber attacks are
identity theft, phishing scams, and spam.
Third Category
 Cyber terrorism is one distinct kind of crime in
this category.
 Crimes against the government (accessing
confidential information, cyber warfare, pirated
software).
 The growth of internet has shown that the
medium of Cyberspace is being used by
individuals and groups to threaten the
international governments as also to terrorize the
citizens of a country.
Top 5 Cyber Crimes
 Phishing Scams.
 Website Spoofing.
 Ransomware.
 Malware.
 IOT Hacking
PREVENTION OF CYBER CRIME
 Avoid disclosing your identity to any strangers.
 Always use latest antivirus software to guard
against virus attacks.
 Never send your credit card number to any site
which is not secured.
 Use of firewall
 Change passwords frequently
 Uninstall unnecessary software
Conclusion
 Within the law enforcement agencies, a set of
rules must be developed to address the various
categories of computer crime.
 As such, investigators will know what and
which materials to search and seize, the
electronic evidence to recover, and the chain of
custody to maintain .
Reference
 www.google.com
 www.wikipedia.com
 www.studymafia.org
Thanks

Contenu connexe

Similaire à CLE-Cyber crimes.pptx

Internet
InternetInternet
Internet
Jodip
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
sainnrg
 

Similaire à CLE-Cyber crimes.pptx (18)

111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Internet
InternetInternet
Internet
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Dernier

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Dernier (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 

CLE-Cyber crimes.pptx

  • 1. Submitted By: Bhoopesh Chaudhary Vipin Rawat Prateek Kumar Mukul Saini Ishaan Asthana Presentation on Cyber Crime
  • 2. Content  Introduction  What is Cyber Crime  Evolution of Cyber Attacks  History of cyber crime  Types of cyber crime  Categories of cyber crime  Top 5 Cyber Crimes  Prevention  Conclusion
  • 3. Introduction  The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.  There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime i.e illegal activity committed on the internet.  Cyber crime is not an old sort of crime to the world. It is defined as any criminal activity which takes place on or over the medium of computers or internet or other technology recognized by the Information Technology Act.
  • 4. What is Cybercrime  Cybercrime is any illegal act committed using a computer network (especially the Internet).  Cybercrime is a subset of computer crime.  Cyber crime is the most prevalent crime playing a devastating role in Modern India. Not only the criminals are causing enormous losses to the society and the government but are also able to conceal their identity to a great extent.
  • 5. Evolution of Cyber Attacks  In the last quarter-century alone, cyber-attacks have evolved from tiny hacks developed by high school students to state-sponsored attacks that compromised the presidential election.  With the advent of the 2000s and the mass adoption of applications by the digital world, we have entered a new era of cyber threats that focus on exploiting vulnerabilities in these applications.  Beginning in 2010 large organizations began hiring more cybersecurity experts to counter the risk of cyber threats, as the sense of supposed digital security evaporated.  2016 has seen an increase in multi-vector attacks, which are largely state-sponsored and therefore have the potential to attract a lot of attention. These kinds of attacks happen to be the most destructive, as hackers develop tools to attack anything and everything digital.
  • 6. History  The first recorded cyber crime took place in the year 1820.  In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics.  This resulted in a fear amongst Jacquard‘s employees that their traditional employment and livelihood were being threatened.  They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime.
  • 7. Types of Cyber Crime  Hacking  Denial OF Service Attack  Virus Dissemination  Computer Forgery  Credit Card Fraud  Phishing  Spoofing  Cyber Stalking  Threatening  Salami attack
  • 8. Modification of a conventional crime by using computers  Financial crimes  Sale of illegal articles  Online gambling  Intellectual Property crime  Email spoofing  Forgery  Cyber Defamation  Cyber stalking
  • 9. Cyber crime Categories  Cybercrime is a broad term that is used to define criminal activity where a computer or computer network is a tool, target, or location of criminal activity, including computers themselves. The term is a generic term that includes crimes such as the abduction of children by chatroom scams  Cyber crime major categories are as follows: 1) Cyber crime against persons. 2) Cyber crime against property. 3) Cyber crime against government.
  • 10. First Category  Cyber harassment is a distinct Cybercrime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other.  Particular attention has been paid to the use of cybercrime as a tool for organized crime groups such as drug traffics and money laundering. This type of crime includes the use of virtual currencies such as Bitcoin, Litecoin, Bitcoin Cash, Monero, and Ethereum.  The spread of the Internet in daily life has made online harassment a major threat to the safety and well-being of many people. Online harassment can include threatening e-mails, threats of physical violence, or posting information on the Internet. Cyberbullying, online predatory, cyberstalking, Internet trolling, propagation of illegal obscene, or offensive content, including harassment and threats are considered as online harassment.
  • 11. Second Category  These crimes include computer vandalism(destruction of others' property), transmission of harmful programs, unauthorized trespassing through cyber space, unauthorized possession of computer information.  Cybercrime is a criminal activity that involves computers, networked devices, and networks. This is done by infecting computers with computer viruses that spread to other computers in a network, such as networks, servers, and other computer systems. A computer as a target means an illegal act in which the main target is a computer or network. DDoS attacks and malware are considered as computers as targets.  Computer as a tool crime is categorized when the individuals are the primary targets. For such cyber crimes, relatively less technical expertise is needed. Some computers as a tool for cyber attacks are identity theft, phishing scams, and spam.
  • 12. Third Category  Cyber terrorism is one distinct kind of crime in this category.  Crimes against the government (accessing confidential information, cyber warfare, pirated software).  The growth of internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.
  • 13. Top 5 Cyber Crimes  Phishing Scams.  Website Spoofing.  Ransomware.  Malware.  IOT Hacking
  • 14. PREVENTION OF CYBER CRIME  Avoid disclosing your identity to any strangers.  Always use latest antivirus software to guard against virus attacks.  Never send your credit card number to any site which is not secured.  Use of firewall  Change passwords frequently  Uninstall unnecessary software
  • 15. Conclusion  Within the law enforcement agencies, a set of rules must be developed to address the various categories of computer crime.  As such, investigators will know what and which materials to search and seize, the electronic evidence to recover, and the chain of custody to maintain .