Cyber Crime

shubham ghimire
shubham ghimireVolunteer à FOSS Nepal
SHUBHAM GHIMIRE
B.SC. CSIT-6TH SEM
MBM COLLEGE
Introduction
•The Internet is growing rapidly. It has given rise to new opportunities in every field we can think
of like entertainment, business & education.
•There’re two sides to a coin. Internet also has it’s own disadvantage, i.e. Cyber crime.
Objectives
• To provide a general awareness of Cyber crime.
• To Recognize Cyber-crime methods.
• To know the importance of Cyber-laws(LOVE
BUG Suspects+ loss 10$ billion) .
• To learn how to keep away from being a victim .
Cyber Crime ??
• Crime committed using a computer and the internet to steal a
person’s identity or illegal imports or malicious programs.
• Cybercrime is nothing but where the computer used as an object or
subject of crime.
Why Should we know about CyberCrime?
• In this Tech-savvy world of 21st Century every one is engaged with internet,
through whatsapp, twitter, facebook, net banking & lots of other platforms are
there.
• And some criminal minded persons commit crimes here, which is included
under cybercrime.
• So we should be aware about crimes happening around in the cyber-space.
Cyber Criminals
•Person or Group who commits Cyber Crime using computers
•Hackers, criminals groups, hacktivists, virus writers, terrorists
History
• The first recorded cyber crime took place in the year1820.
• The first spam email took place in 1978 when it was sent over the Arpanet.
• The first VIRUS was installed on an Apple computer in 1982 .
Cyber Threat Evolution
Cyber Attack by percentage
Cyber Criminals used
The Computer as a Target : using a
computer to attack other computers. E.g
Hacking, virus/worm attacks, Dos attacks
etc.
The computer as a weapon : using a
computer to commit real world crimes.
E.g Cyber terrorism, credit card frauds,
Child pornography etc
Categories
• Against Person
• Against Property
• Against Government
Against person:
• Harassment via emails, cyber stalking, email spoofing, carding, assault by threat.
• The potential harm of such a crime to humanity can hardly be overstated.
Against Property:
• Cybercrimes against all forms of property.
• Unauthorized computer trespassing through cyberspace, computer vandalism, transmission of
harmful programs, and unauthorized possession of computerized information.
Against Government:
• Cyber Terrorism, Damaging critical information infrastructures.
• The growth of Internet has shown that the medium of Cyberspace is being used by individuals
and groups to the international governments as also to threaten the citizens of a country.
• This crime manifests itself into terrorism when an individual "cracks“ into a government or
military maintained website.
Types of Cyber Crime
Hacking
Hacking in simple terms means an illegal intrusion or unauthorized access to or
control over a computer system and/or network.
Denial of Service(DOS)
• Act by the criminal, who floods the bandwidth of the victims network or
Internet server is flooded with continuous requests so as to crash the server
• Its an attempt to make a machine or network resource unavailable to its
intended users
Virus Dissemination
Malicious software that attaches itself to other software. (virus, worms, Trojan
Horse, web jacking, e-mail bombing etc.)
Computer Vandalism
• Damaging or destroying data rather than stealing.
• Transmitting virus to destroy system files.
Software Piracy
• Theft of software through the illegal copying of genuine programs.
• The counterfeiting and distribution of products intended to pass for the original
Credit Card Fraud
Personal information stolen from a card, or the theft of a card itself, can be used
to commit fraud.
Fraudsters might use the information to purchase goods in your name or obtain
unauthorized funds from an account.
Net Extortion
Copying of someone’s confidential data in order to extort for huge amount.
Ransomware
Ransomware is a type of malware that prevents or limits users from accessing
their system, either by locking the system's screen or by locking the users' files
unless a ransom is paid.
Phishing
To request confidential information over the internet or by telephone under false pretenses in
order to fraudulently obtain credit card numbers, passwords, or other personal data.
Child Pornography
The Internet is being highly used by its abusers to reach and abuse children
sexually, worldwide.
Cyber Terrorism
• Use of Internet based attacks in terrorist activities. Terrorist attacks on the
Internet is by distributed denial of service attacks, hate websites and hate
emails, attacks on sensitive computer networks, etc.
• Technology savvy terrorists are using 512-bit encryption, which is impossible to
decrypt.
Cyber Crimes in Nepal
•Social Media Related Cyber Crime
•Piracy Related crime
•Fake Profile Marketing
•Threatening Using Email
•Website Hacking
•Unauthorized Access
•Online Business of Restricted Materials
Social Media Related Cyber Crime
Social Media related cyber crime in Nepal includes using Porn Content in social Media or
creating fake profiles to intentionally harm someone with the use of Facebook, Twitter,
Instagram or any social Media Platform
Fake Profile Marketing
Creating or using a fake profile, fake website or email to create a bad image or inappropriate
marketing is also considered as cybercrime.
Website Hacking
•Website Hacking means taking control from the website owner to a person who hacks the
website.
•Nowadays most of the government websites are attacked by hackers. Many governmental
websites including the president’s website were hacked.
•Anonymous #opnp
How to tackle these activities?
•Awareness is the first step in protecting yourself, your family and your business.
•Invest in Anti-virus, Firewall, and SPAM blocking software for your PC.
•Detect secure websites when conducting transactions online.
•Do NOT respond or act on emails sent from unknown sources.
Safety Tips to Cyber Crime
•Use antivirus software & insert firewalls
•Read Privacy policy carefully when you submit the data
through internet.
•Uninstall unnecessary software
•Maintain backup
•Check security settings
•Disable Remote Connectivity
•Use hard-to-guess passwords. Don’t use words found in
a dictionary. Remember that password cracking tools
exist.
•Never give your full name or address to strangers
•Learn more about Internet privacy
Cyber Security
•Internet security is a branch of computer security specifically related to the Internet.
•It's objective is to establish rules and measure to use against attacks over the Internet.
Cyber Security Advantages:
•The cyber security will defend us from critical attacks, hacks
and virus.
•It helps us to browse the safe website.
•Internet security process all the incoming and outgoing data
on our computer.
•The application of cyber security used in our PC needs update
every week.
•The security developers will update their database every week
once. Hence the new virus also deleted
Cyber Law
•There is absolutely no comprehensive law on Cybercrime any where in the world. This is reason
that the investigating agencies like FBI are finding the Cyberspace to be an extremely difficult
terrain.
•Cybercrimes fall into that grey area of Internet law which is neither fully nor partially covered by
the existing laws.
•However, countries are taking crucial measures to establish stringent laws on cybercrime.
•In Nepal,
 Electronic Transaction act 2061 BS (2005 AD)
 Information Technology Policy - 2000
Conclusion
•The key to protecting yourself is being aware.
• Cybercrime is about much more than hackers & not all cybercriminals are “hackers.”
•There is a whole other world that exists in cyberspace… make sure that your information travels
safely.
•Technology is destructive only in the hands of people who do not realize that they are one and
the same process as the universe.
•Cybercrime is a major problem – and growing .
•Stay Secure, Stay safe
Cyber Crime
Cyber Crime
1 sur 38

Recommandé

Cyber CrimeCyber Crime
Cyber CrimeRamesh Upadhaya
2.2K vues19 diapositives
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
344K vues30 diapositives
Cyber securityCyber security
Cyber securityRishav Sadhu
5.7K vues16 diapositives
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
8.7K vues25 diapositives
Cyber crimeCyber crime
Cyber crimePaul Senthil
5.6K vues25 diapositives
Cyber CrimeCyber Crime
Cyber CrimeAvinash Rajput
6.4K vues49 diapositives

Contenu connexe

Tendances

Cyber crimeCyber crime
Cyber crimeGrant Thornton Bangladesh
1.9K vues14 diapositives
Cyber crimeCyber crime
Cyber crimedixitas
2.2K vues35 diapositives
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
727.6K vues20 diapositives
Cyber Crime Cyber Crime
Cyber Crime bhavya mohindru
2.5K vues14 diapositives
Cyber crime pptCyber crime ppt
Cyber crime pptRitesh Thakur
1.3K vues18 diapositives
cyber crimecyber crime
cyber crimeMosuud jilani lipon
13K vues25 diapositives

Tendances(20)

Cyber crimeCyber crime
Cyber crime
Grant Thornton Bangladesh1.9K vues
Cyber crimeCyber crime
Cyber crime
dixitas2.2K vues
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan727.6K vues
Cyber Crime Cyber Crime
Cyber Crime
bhavya mohindru2.5K vues
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur1.3K vues
cyber crimecyber crime
cyber crime
Mosuud jilani lipon13K vues
Cyber securityCyber security
Cyber security
Harsh verma13.6K vues
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera602.4K vues
Cyber CrimeCyber Crime
Cyber Crime
Mazhar Nazik69.4K vues
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus7.2K vues
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed39.8K vues
Cyber  CrimeCyber  Crime
Cyber Crime
mukeshkaran10.2K vues
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni2.4K vues
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi216.8K vues
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha4K vues
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui16.8K vues
Cyber crimeCyber crime
Cyber crime
yazad dumasia1.7K vues
cyber crimecyber crime
cyber crime
Saba MuShtaq2.3K vues
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
Shubh Thakkar1.2K vues
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj2.5K vues

En vedette

Cognitive Science Unit 4Cognitive Science Unit 4
Cognitive Science Unit 4CSITSansar
1.7K vues27 diapositives
Cognitive science Unit 1Cognitive science Unit 1
Cognitive science Unit 1CSITSansar
1.8K vues12 diapositives
Cognitive Science Unit 2Cognitive Science Unit 2
Cognitive Science Unit 2CSITSansar
1.2K vues66 diapositives
IPSec | Computer NetworkIPSec | Computer Network
IPSec | Computer Networkshubham ghimire
1.6K vues8 diapositives

En vedette(10)

Virtual Functions | Polymorphism | OOPVirtual Functions | Polymorphism | OOP
Virtual Functions | Polymorphism | OOP
shubham ghimire1.7K vues
Cognitive Science Unit 4Cognitive Science Unit 4
Cognitive Science Unit 4
CSITSansar1.7K vues
Cognitive science Unit 1Cognitive science Unit 1
Cognitive science Unit 1
CSITSansar1.8K vues
Cognitive Science Unit 2Cognitive Science Unit 2
Cognitive Science Unit 2
CSITSansar1.2K vues
IPSec | Computer NetworkIPSec | Computer Network
IPSec | Computer Network
shubham ghimire1.6K vues
Case Study | Introduction to Management Case Study | Introduction to Management
Case Study | Introduction to Management
shubham ghimire5.4K vues
Writing In Exam | technical WritingWriting In Exam | technical Writing
Writing In Exam | technical Writing
shubham ghimire768 vues
NGOs In Nepal | NGOs DirectoryNGOs In Nepal | NGOs Directory
NGOs In Nepal | NGOs Directory
shubham ghimire410 vues

Similaire à Cyber Crime

CybercrimesCybercrimes
CybercrimesShareb Ismaeel
168 vues20 diapositives
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
660 vues33 diapositives
CybercrimeCybercrime
CybercrimeVansh Verma
153 vues30 diapositives

Similaire à Cyber Crime(20)

Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi3.6K vues
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj846 vues
CybercrimesCybercrimes
Cybercrimes
Shareb Ismaeel168 vues
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir660 vues
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
bcanawakadalcollege20 vues
CybercrimeCybercrime
Cybercrime
Vansh Verma153 vues
CybercrimeCybercrime
Cybercrime
Ratnesh Sharma764 vues
Cyber CrimeCyber Crime
Cyber Crime
AfnanHusain292 vues
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
Devanshi Solanki401 vues
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace11.1K vues
CybercrimesCybercrimes
Cybercrimes
Fit Tri461 vues
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
KoukiGaz6 vues
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh34.2K vues
CybercrimeCybercrime
Cybercrime
SERCOD2.1K vues
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
Dr. Amitabha Yadav1.7K vues
Cyber crimesCyber crimes
Cyber crimes
ACCA Global1K vues
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
Jyotisheklingji935 vues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana16.5K vues
Presentation.pptxPresentation.pptx
Presentation.pptx
Clichesin3 vues

Cyber Crime

  • 2. Introduction •The Internet is growing rapidly. It has given rise to new opportunities in every field we can think of like entertainment, business & education. •There’re two sides to a coin. Internet also has it’s own disadvantage, i.e. Cyber crime.
  • 3. Objectives • To provide a general awareness of Cyber crime. • To Recognize Cyber-crime methods. • To know the importance of Cyber-laws(LOVE BUG Suspects+ loss 10$ billion) . • To learn how to keep away from being a victim .
  • 4. Cyber Crime ?? • Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs. • Cybercrime is nothing but where the computer used as an object or subject of crime.
  • 5. Why Should we know about CyberCrime? • In this Tech-savvy world of 21st Century every one is engaged with internet, through whatsapp, twitter, facebook, net banking & lots of other platforms are there. • And some criminal minded persons commit crimes here, which is included under cybercrime. • So we should be aware about crimes happening around in the cyber-space.
  • 6. Cyber Criminals •Person or Group who commits Cyber Crime using computers •Hackers, criminals groups, hacktivists, virus writers, terrorists
  • 7. History • The first recorded cyber crime took place in the year1820. • The first spam email took place in 1978 when it was sent over the Arpanet. • The first VIRUS was installed on an Apple computer in 1982 .
  • 9. Cyber Attack by percentage
  • 10. Cyber Criminals used The Computer as a Target : using a computer to attack other computers. E.g Hacking, virus/worm attacks, Dos attacks etc. The computer as a weapon : using a computer to commit real world crimes. E.g Cyber terrorism, credit card frauds, Child pornography etc
  • 11. Categories • Against Person • Against Property • Against Government
  • 12. Against person: • Harassment via emails, cyber stalking, email spoofing, carding, assault by threat. • The potential harm of such a crime to humanity can hardly be overstated.
  • 13. Against Property: • Cybercrimes against all forms of property. • Unauthorized computer trespassing through cyberspace, computer vandalism, transmission of harmful programs, and unauthorized possession of computerized information.
  • 14. Against Government: • Cyber Terrorism, Damaging critical information infrastructures. • The growth of Internet has shown that the medium of Cyberspace is being used by individuals and groups to the international governments as also to threaten the citizens of a country. • This crime manifests itself into terrorism when an individual "cracks“ into a government or military maintained website.
  • 15. Types of Cyber Crime
  • 16. Hacking Hacking in simple terms means an illegal intrusion or unauthorized access to or control over a computer system and/or network.
  • 17. Denial of Service(DOS) • Act by the criminal, who floods the bandwidth of the victims network or Internet server is flooded with continuous requests so as to crash the server • Its an attempt to make a machine or network resource unavailable to its intended users
  • 18. Virus Dissemination Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)
  • 19. Computer Vandalism • Damaging or destroying data rather than stealing. • Transmitting virus to destroy system files.
  • 20. Software Piracy • Theft of software through the illegal copying of genuine programs. • The counterfeiting and distribution of products intended to pass for the original
  • 21. Credit Card Fraud Personal information stolen from a card, or the theft of a card itself, can be used to commit fraud. Fraudsters might use the information to purchase goods in your name or obtain unauthorized funds from an account.
  • 22. Net Extortion Copying of someone’s confidential data in order to extort for huge amount.
  • 23. Ransomware Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
  • 24. Phishing To request confidential information over the internet or by telephone under false pretenses in order to fraudulently obtain credit card numbers, passwords, or other personal data.
  • 25. Child Pornography The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide.
  • 26. Cyber Terrorism • Use of Internet based attacks in terrorist activities. Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. • Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 27. Cyber Crimes in Nepal •Social Media Related Cyber Crime •Piracy Related crime •Fake Profile Marketing •Threatening Using Email •Website Hacking •Unauthorized Access •Online Business of Restricted Materials
  • 28. Social Media Related Cyber Crime Social Media related cyber crime in Nepal includes using Porn Content in social Media or creating fake profiles to intentionally harm someone with the use of Facebook, Twitter, Instagram or any social Media Platform
  • 29. Fake Profile Marketing Creating or using a fake profile, fake website or email to create a bad image or inappropriate marketing is also considered as cybercrime.
  • 30. Website Hacking •Website Hacking means taking control from the website owner to a person who hacks the website. •Nowadays most of the government websites are attacked by hackers. Many governmental websites including the president’s website were hacked. •Anonymous #opnp
  • 31. How to tackle these activities? •Awareness is the first step in protecting yourself, your family and your business. •Invest in Anti-virus, Firewall, and SPAM blocking software for your PC. •Detect secure websites when conducting transactions online. •Do NOT respond or act on emails sent from unknown sources.
  • 32. Safety Tips to Cyber Crime •Use antivirus software & insert firewalls •Read Privacy policy carefully when you submit the data through internet. •Uninstall unnecessary software •Maintain backup •Check security settings •Disable Remote Connectivity •Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist. •Never give your full name or address to strangers •Learn more about Internet privacy
  • 33. Cyber Security •Internet security is a branch of computer security specifically related to the Internet. •It's objective is to establish rules and measure to use against attacks over the Internet.
  • 34. Cyber Security Advantages: •The cyber security will defend us from critical attacks, hacks and virus. •It helps us to browse the safe website. •Internet security process all the incoming and outgoing data on our computer. •The application of cyber security used in our PC needs update every week. •The security developers will update their database every week once. Hence the new virus also deleted
  • 35. Cyber Law •There is absolutely no comprehensive law on Cybercrime any where in the world. This is reason that the investigating agencies like FBI are finding the Cyberspace to be an extremely difficult terrain. •Cybercrimes fall into that grey area of Internet law which is neither fully nor partially covered by the existing laws. •However, countries are taking crucial measures to establish stringent laws on cybercrime. •In Nepal,  Electronic Transaction act 2061 BS (2005 AD)  Information Technology Policy - 2000
  • 36. Conclusion •The key to protecting yourself is being aware. • Cybercrime is about much more than hackers & not all cybercriminals are “hackers.” •There is a whole other world that exists in cyberspace… make sure that your information travels safely. •Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe. •Cybercrime is a major problem – and growing . •Stay Secure, Stay safe