Cybercrime

R
Ratnesh SharmaSoftware Developer à vll
Presentation on Cyber Crime 
By: Ratnesh Sharma {MCA 5th Semester}
• INTRODUCTION. 
• HISTORY OF CYBER CRIME. 
• CATEGORIES OF CYBER CRIME. 
• WORLDS TOP 10 CYBER CRIMES. 
• TYEPS OF CYBER CRIME. 
• CYBER SECURITY. 
• SAFETY TIPS TO CYBER CRIME. 
• CONCLUSION.
• Cyber crime is an activity done using 
computers and internet. We can say that it is an 
unlawful acts wherein the computer either a 
tool or target or both. 
• It Harms the reputation of the victim or cause 
physical or mental harm to the victim directly or 
indirectly , 
• Its don using modern telecommunication 
networks such as Internet (Chat rooms, 
emails, notice boards and groups) and 
mobile phones (SMS/MMS)
• The first recorded cyber crime took place in 1820. 
• The first spam email took place in 1976 when it was 
sent out over the ARPANT(Advanced Research 
Projects Agency Network ). 
• The first virus was installed on an Apple computer in 
1982 when a high school student, Rich skrenta, 
developed the EIK Cloner.
• We can categorize cyber crime in two ways. 
• The computer as a target :- 
using a computer to attacks other computer, e.g. 
Hacking, virus/worms attacks, Dos attack etc. 
• The computer as a weapon :- 
using a computer to commit real world crime e.g. 
cyber terrorism, credit card fraud and pornography etc.
World top 10 cyber crimes……….
TYPES OF CYBER CRIME
HACKING :- Hacking in simple terms means an illegal access of 
information from a computer system or network . 
• It is also known as CRACKING. 
• Government websites are the hot target of the hackers due to 
the press coverage, it receives. Hackers enjoy the media 
coverage. 
Motive behind the crime called HACKERS 
Motive behind the crime called hacking greed power, publicity, 
revenge etc.
Theft : 
This crime occurs when a person violates copyrights and 
downloads music, movies, games and software. 
Identity Theft: 
In this cyber crime, a criminal accesses data about a person’s 
bank account, credit cards, Social Security, debit card .etc
VIRUS attack : 
• Malicious software that attaches itself to other software. 
• VIRUS , 
• WORMS, 
• TROJAN HORSE , 
• WEB JACKING, 
• E-MAIL BOMBING etc. 
Computer Vandalism: 
• Damaging or destroying data rather than stealing or misusing 
them is called cyber vandalism. 
• These are program that attach themselves to a file and then 
circulate.
Cyber terrorism: 
• Terrorist attacks on the Internet is by distributed denial of service 
attacks, hate websites and hate E-mails , attacks on service 
network etc. 
• Software piracy: 
• Stilling of software through the illegal copying of genuine 
programs. 
• For exp: patch programs ,crack keys. Etc.
Cybercrime
Cyber Security : 
Cyber Security involves protection of sensitive personal 
and business information through prevention, detection and 
response to different online attacks. 
Privacy Policy : 
Before submitting your name , e-mail , address, on a website 
look for the sites privacy policy. 
Keep Software Up to Date: 
. Use good password which will be difficult for thieves to 
guess. Do not choose option that allows your computer to 
remember your passwords.
• Use antivirus Software 
• Insert Firewalls 
• Uninstall unnecessary software 
• Maintain backup 
• Check security settings
• As we see that cyber crimes grows at high rate in the world so we 
have to strictly control the ability of unauthorized access of information 
on the wed . 
• In fact , it is highly likely that cyber crime and its hackers will continue 
developing and upgrading to stay ahead of the law. 
• So, to make us a safer we must need cyber security.
Cybercrime
1 sur 16

Recommandé

cyber crime and security par
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
2.3K vues21 diapositives
Cyber crime and secuity par
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuityAlisha Korpal
3.5K vues23 diapositives
Cyber Crime & Security par
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & SecurityAnchit Rajawat
1.6K vues16 diapositives
Cyber crime & security par
Cyber crime & securityCyber crime & security
Cyber crime & securityAvani Patel
5.8K vues86 diapositives
Cyber crime and Security par
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
819 vues14 diapositives
Cyber Crime par
Cyber CrimeCyber Crime
Cyber CrimeAfnanHusain
296 vues10 diapositives

Contenu connexe

Tendances

Cyber crime ppt par
Cyber crime pptCyber crime ppt
Cyber crime pptNazish Jamali
7.8K vues22 diapositives
Cyber Criminal and Cyber Security par
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Deepam Aggarwal
61 vues8 diapositives
Cyber Crime & Security par
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & SecurityUday Bhaskarwar
513 vues32 diapositives
Cyber Crime and Prevention Tips par
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention TipsTayyab Farooq
3.2K vues29 diapositives
Cyber crime and its safety par
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safetyAashiGupta46
340 vues18 diapositives
Cyber Crime And Cyber Security par
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber SecurityPrashant Sharma
1.1K vues19 diapositives

Tendances(20)

Cyber Crime and Prevention Tips par Tayyab Farooq
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
Tayyab Farooq3.2K vues
Cyber crime and its safety par AashiGupta46
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
AashiGupta46340 vues
Cyber Crime And Security par ritik shukla
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla4.9K vues
Cyber crime among students par june21harsh
Cyber crime among studentsCyber crime among students
Cyber crime among students
june21harsh34.2K vues
Cyber Security Awareness at Dadar April 25, 2010 par Vicky Shah
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
Vicky Shah2.4K vues

En vedette

Crime show par
Crime showCrime show
Crime showA K Deep
115 vues15 diapositives
Crime Shows Genre par
Crime Shows GenreCrime Shows Genre
Crime Shows Genreguestc48c498
523 vues9 diapositives
Criminal justice major par
Criminal justice major Criminal justice major
Criminal justice major Madhan Raj
442 vues24 diapositives
Class cybercrime par
Class cybercrimeClass cybercrime
Class cybercrimeAryan Ajmer
1.3K vues23 diapositives
The wonders of studying Italian. par
The wonders of studying Italian.The wonders of studying Italian.
The wonders of studying Italian.ThirdYearAbroad.com
2.2K vues28 diapositives
Ppt Italian par
Ppt ItalianPpt Italian
Ppt Italianfranciscormm
1.2K vues37 diapositives

En vedette(20)

Crime show par A K Deep
Crime showCrime show
Crime show
A K Deep115 vues
Criminal justice major par Madhan Raj
Criminal justice major Criminal justice major
Criminal justice major
Madhan Raj442 vues
Some characteristics of educational system in municipality grude par Livia Dobrescu
Some characteristics of educational system in municipality grude Some characteristics of educational system in municipality grude
Some characteristics of educational system in municipality grude
Livia Dobrescu801 vues
Sat act powerpoint par lcg22
Sat act powerpointSat act powerpoint
Sat act powerpoint
lcg226.8K vues
Exams, are they really necessary, final exam, assessments par giselle_watts
Exams, are they really necessary, final exam, assessmentsExams, are they really necessary, final exam, assessments
Exams, are they really necessary, final exam, assessments
giselle_watts7.7K vues
Erwc period 2 bullying powerpoint melissa and ashly new conclusion par kcurranlitlover
Erwc period 2 bullying powerpoint melissa and ashly new conclusionErwc period 2 bullying powerpoint melissa and ashly new conclusion
Erwc period 2 bullying powerpoint melissa and ashly new conclusion
kcurranlitlover1.9K vues
The role of homework in education par Jiayi_Liu
The role of homework in educationThe role of homework in education
The role of homework in education
Jiayi_Liu3.3K vues
Benefit of Homework par Meiya Ma
Benefit of HomeworkBenefit of Homework
Benefit of Homework
Meiya Ma4.4K vues
Bullying powerpoint par gmtango
Bullying powerpointBullying powerpoint
Bullying powerpoint
gmtango20.8K vues
School Organisation par Sapphirexox
School OrganisationSchool Organisation
School Organisation
Sapphirexox8.5K vues
The Importance Of Getting A Good Night's Sleep par Nathan Young
The Importance Of Getting A Good Night's SleepThe Importance Of Getting A Good Night's Sleep
The Importance Of Getting A Good Night's Sleep
Nathan Young9.1K vues
Everything You Need to Know About the NEW SAT par LA Tutors 123
Everything You Need to Know About the NEW SATEverything You Need to Know About the NEW SAT
Everything You Need to Know About the NEW SAT
LA Tutors 1231.7K vues

Similaire à Cybercrime

Cyber Crime par
Cyber CrimeCyber Crime
Cyber Crimeshubham ghimire
22.9K vues38 diapositives
CYBER CRIME AND SECURITY par
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
664 vues33 diapositives
Cyber crime par
Cyber crimeCyber crime
Cyber crimeMuhammad Zeeshan Muzaffar
1.7K vues14 diapositives
Cyber crime par
Cyber crimeCyber crime
Cyber crimeMuhammad Osama Khalid
2K vues21 diapositives
Cyber crimes and its security par
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
6.8K vues47 diapositives
Cyber crimes and its security par
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
314 vues47 diapositives

Similaire à Cybercrime(20)

CYBER CRIME AND SECURITY par Chaya Sorir
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir664 vues
Cyber Security and Cyber Awareness par Arjith K Raj
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj846 vues
Ppt on cyber security par Avani Patel
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel42.2K vues
Cyber crime and cyber security par Keshab Nath
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath5.2K vues
Cyber crime and security 1 par indhuchezhian
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian10.4K vues
Cyber Security in Society par Rubal Sagwal
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal5.8K vues

Dernier

Audience profile.pptx par
Audience profile.pptxAudience profile.pptx
Audience profile.pptxMollyBrown86
12 vues2 diapositives
information par
informationinformation
informationkhelgishekhar
8 vues4 diapositives
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf par
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdfOpportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdfRIPE NCC
9 vues12 diapositives
childcare.pdf par
childcare.pdfchildcare.pdf
childcare.pdffatma alnaqbi
14 vues4 diapositives
IETF 118: Starlink Protocol Performance par
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol PerformanceAPNIC
186 vues22 diapositives
informing ideas.docx par
informing ideas.docxinforming ideas.docx
informing ideas.docxMollyBrown86
12 vues10 diapositives

Dernier(20)

Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf par RIPE NCC
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdfOpportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
RIPE NCC9 vues
IETF 118: Starlink Protocol Performance par APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC186 vues
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲 par Infosec train
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
Infosec train9 vues
We see everywhere that many people are talking about technology.docx par ssuserc5935b
We see everywhere that many people are talking about technology.docxWe see everywhere that many people are talking about technology.docx
We see everywhere that many people are talking about technology.docx
ssuserc5935b6 vues
Building trust in our information ecosystem: who do we trust in an emergency par Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat92 vues
UiPath Document Understanding_Day 3.pptx par UiPathCommunity
UiPath Document Understanding_Day 3.pptxUiPath Document Understanding_Day 3.pptx
UiPath Document Understanding_Day 3.pptx
UiPathCommunity101 vues
Existing documentaries (1).docx par MollyBrown86
Existing documentaries (1).docxExisting documentaries (1).docx
Existing documentaries (1).docx
MollyBrown8613 vues
google forms survey (1).pptx par MollyBrown86
google forms survey (1).pptxgoogle forms survey (1).pptx
google forms survey (1).pptx
MollyBrown8614 vues

Cybercrime

  • 1. Presentation on Cyber Crime By: Ratnesh Sharma {MCA 5th Semester}
  • 2. • INTRODUCTION. • HISTORY OF CYBER CRIME. • CATEGORIES OF CYBER CRIME. • WORLDS TOP 10 CYBER CRIMES. • TYEPS OF CYBER CRIME. • CYBER SECURITY. • SAFETY TIPS TO CYBER CRIME. • CONCLUSION.
  • 3. • Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both. • It Harms the reputation of the victim or cause physical or mental harm to the victim directly or indirectly , • Its don using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)
  • 4. • The first recorded cyber crime took place in 1820. • The first spam email took place in 1976 when it was sent out over the ARPANT(Advanced Research Projects Agency Network ). • The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 5. • We can categorize cyber crime in two ways. • The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. • The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
  • 6. World top 10 cyber crimes……….
  • 8. HACKING :- Hacking in simple terms means an illegal access of information from a computer system or network . • It is also known as CRACKING. • Government websites are the hot target of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motive behind the crime called HACKERS Motive behind the crime called hacking greed power, publicity, revenge etc.
  • 9. Theft : This crime occurs when a person violates copyrights and downloads music, movies, games and software. Identity Theft: In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card .etc
  • 10. VIRUS attack : • Malicious software that attaches itself to other software. • VIRUS , • WORMS, • TROJAN HORSE , • WEB JACKING, • E-MAIL BOMBING etc. Computer Vandalism: • Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. • These are program that attach themselves to a file and then circulate.
  • 11. Cyber terrorism: • Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails , attacks on service network etc. • Software piracy: • Stilling of software through the illegal copying of genuine programs. • For exp: patch programs ,crack keys. Etc.
  • 13. Cyber Security : Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks. Privacy Policy : Before submitting your name , e-mail , address, on a website look for the sites privacy policy. Keep Software Up to Date: . Use good password which will be difficult for thieves to guess. Do not choose option that allows your computer to remember your passwords.
  • 14. • Use antivirus Software • Insert Firewalls • Uninstall unnecessary software • Maintain backup • Check security settings
  • 15. • As we see that cyber crimes grows at high rate in the world so we have to strictly control the ability of unauthorized access of information on the wed . • In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. • So, to make us a safer we must need cyber security.