SlideShare une entreprise Scribd logo
1  sur  9
WHAT IS COMPUTER CRIMES? 
Computer crime is an unauthorized use of a computer for personal 
gain, as in illegal transfer of funds or to alter the data or property 
of others.
THE TOP FIVE 
COMPUTER CRIMES 
 Malware 
 Identity theft 
 Cyber stalking 
 Child pornography 
 Spam
MALWARE 
Malware refers to viruses, 
trojans,worms and other 
software that gets onto 
your computer without you 
being aware it is there 
without you even knowing.
IDENTIFTY THEFT 
Someone gains access to your 
personal information and uses for 
there own benefit 
Identity theft ranges from black-hat- 
hacker, stealing your online 
banking account log in and 
password to getting access to your 
social security number and using it 
to pretend to be you
CYBER STALKING 
 Cyber stalking is using the internet to 
repeatedly harass another person 
 The harassment could be sexual in nature 
or it could have other motivations 
including anger or out right hostility
CHILD PORNOGRAPHY 
 Child pornography is when a child is 
being exploited in a sexual way 
 Child pornography is an illegal money 
making industry
SPAM 
 Spam is known as junk email 
or unsolicited bulk email 
 If a user open spam email, 
they are in jeopardy on linking 
onto sites that hos malware 
(virus)
STATISTICS ON COMPUTER CRIMES 
YEARLY CYBER CRIME VICTIM COUNT 
ESTIMATE: 
VICTIMS PER YEAR 556 MILLION 
Victims per day Over 1.5 Million 
Victims per second 18 
Identities exposed More than 232.4 Million 
COMMON TYPES OF CYBER 
ATTACKS: 
ATTACKS % 
Viruses, malware, worms 50% 
Criminal insider 33% 
Theft of data-bearing deices 28% 
Phishing 22%

Contenu connexe

Tendances

What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attackAariyaRathi
 
Surf smart
Surf smartSurf smart
Surf smart-
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackersRoman Antonov
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrimeravikanthh
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavierMo Han
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Preventionsonalikharade3
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]justin johnson
 

Tendances (19)

Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Surf smart
Surf smartSurf smart
Surf smart
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Phishing
PhishingPhishing
Phishing
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Computersecurity
ComputersecurityComputersecurity
Computersecurity
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Information security
Information securityInformation security
Information security
 
Unit 1
Unit 1Unit 1
Unit 1
 
Phishing
PhishingPhishing
Phishing
 

En vedette

High tech (cyber) crimes
High tech (cyber) crimesHigh tech (cyber) crimes
High tech (cyber) crimesElizabeth Hall
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiShreedeep Rayamajhi
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementRicardo Reis
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power pointjessicafay2010
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Project synopsis
Project synopsisProject synopsis
Project synopsisgirija12345
 

En vedette (20)

High tech (cyber) crimes
High tech (cyber) crimesHigh tech (cyber) crimes
High tech (cyber) crimes
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency Management
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Project synopsis
Project synopsisProject synopsis
Project synopsis
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
SYNOPSIS WRITING
SYNOPSIS WRITINGSYNOPSIS WRITING
SYNOPSIS WRITING
 

Similaire à Computer crimes(1)

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptxKoukiGaz
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdfgaherwarsaloni1234
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxMelanie Nava
 

Similaire à Computer crimes(1) (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptx
 

Dernier

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 

Dernier (20)

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Computer crimes(1)

  • 1.
  • 2. WHAT IS COMPUTER CRIMES? Computer crime is an unauthorized use of a computer for personal gain, as in illegal transfer of funds or to alter the data or property of others.
  • 3. THE TOP FIVE COMPUTER CRIMES  Malware  Identity theft  Cyber stalking  Child pornography  Spam
  • 4. MALWARE Malware refers to viruses, trojans,worms and other software that gets onto your computer without you being aware it is there without you even knowing.
  • 5. IDENTIFTY THEFT Someone gains access to your personal information and uses for there own benefit Identity theft ranges from black-hat- hacker, stealing your online banking account log in and password to getting access to your social security number and using it to pretend to be you
  • 6. CYBER STALKING  Cyber stalking is using the internet to repeatedly harass another person  The harassment could be sexual in nature or it could have other motivations including anger or out right hostility
  • 7. CHILD PORNOGRAPHY  Child pornography is when a child is being exploited in a sexual way  Child pornography is an illegal money making industry
  • 8. SPAM  Spam is known as junk email or unsolicited bulk email  If a user open spam email, they are in jeopardy on linking onto sites that hos malware (virus)
  • 9. STATISTICS ON COMPUTER CRIMES YEARLY CYBER CRIME VICTIM COUNT ESTIMATE: VICTIMS PER YEAR 556 MILLION Victims per day Over 1.5 Million Victims per second 18 Identities exposed More than 232.4 Million COMMON TYPES OF CYBER ATTACKS: ATTACKS % Viruses, malware, worms 50% Criminal insider 33% Theft of data-bearing deices 28% Phishing 22%