SlideShare une entreprise Scribd logo
1  sur  14
A.SIMON PRATHAP SINGH
M.Ed (Pursuing)
Department of Education
M.S University., Tirunelveli
CYBER CRIMES
• Cyber Crime as those computer mediated
activities which are either illegal or considered
illicit by certain parties and which can be
conducted through global electronic
networks.
- Thomas and Loader (2000)
Meaning
• The oxford reference online defines ‘Cyber
Crime’ as a crime committed over the
internet.
• The Britannica defines ‘Cyber Crime’ as any
crime that is committed by means of special
knowledge or expert use of computer
technology.
Common Cyber Crime
• Cracking: A person can delete files or put a
virus up or sell information or steal some
source codes and could use it for his own
benefit.
• Email Spoofing: A spoofed e-mail is one that
appears to originate from one source but
actually has been sent from another source . It
can also cause monetary damages.
TO KNOW…….
Why should we know about Cyber-Crime?
1. In this Tech-savvy world in 21st century
everyone is engaged with internet, through
whatsapp, twitter, facebook, net-banking and
lots of other platforms are there.
2. And some criminal minded persons commit
crimes here, which is included under
cybercrime.
3. So we should be aware about crimes
happening around in the cyber space.
Cyber Crimes
• Crimes are not to be measured by the issue of
events but by the bad intensions of men.
• The greatest crimes do not arise from a want
of feeling for others but from an over
sensibility for ourselves and an over
indulgence in our own.
Impacts of Cyber Crime
• Computer Crime can affect the personal records
of the individual. It can impact the financial
resources of a bank, causing confusing and
potentially affecting customer accounts.
• New technologies create new criminal
opportunities as well as new types of crime with
the modernization and availability of technology
for developmental as well as destructive purpose.
CYBER SYSTEMS
• Cyber Crime highlights the centrality of
networked computers in our lives, as well as
the fragility of such seemingly solid facts as
individual identity.
TYPES OF CYBER CRIME
i. Invision of privacy
ii. Voyeurism. It is an act done by a sexual
prevent who derives gratification from
surreptiously watching sexual acts or objects.
iii. Theft of identity.
iv. Cyber stalking: To stride with difficulty or
haughtily.
Cyber laws
• There is absolutely no comprehensive law on
cyber crime anywhere in the world. This is
reason that the investigating agencies like FBI
are finding the cyberspace to be an extremely
difficult terrain.
Examples
• Hacking
• Virus
• Spyware
• Spam
• Root kits
• Trojans
• Phishing
• Malware
THANK YOU

Contenu connexe

Tendances

Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
Ahmed Sleem
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
PELUMI APANTAKU
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
june21harsh
 

Tendances (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescents
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 

Similaire à Cyber crime simon

cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
sainnrg
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
sainnrg
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 

Similaire à Cyber crime simon (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Unit II.pptx
Unit II.pptxUnit II.pptx
Unit II.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
 

Dernier

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Dernier (20)

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 

Cyber crime simon

  • 1. A.SIMON PRATHAP SINGH M.Ed (Pursuing) Department of Education M.S University., Tirunelveli
  • 3. • Cyber Crime as those computer mediated activities which are either illegal or considered illicit by certain parties and which can be conducted through global electronic networks. - Thomas and Loader (2000)
  • 4. Meaning • The oxford reference online defines ‘Cyber Crime’ as a crime committed over the internet. • The Britannica defines ‘Cyber Crime’ as any crime that is committed by means of special knowledge or expert use of computer technology.
  • 5. Common Cyber Crime • Cracking: A person can delete files or put a virus up or sell information or steal some source codes and could use it for his own benefit. • Email Spoofing: A spoofed e-mail is one that appears to originate from one source but actually has been sent from another source . It can also cause monetary damages.
  • 6. TO KNOW……. Why should we know about Cyber-Crime? 1. In this Tech-savvy world in 21st century everyone is engaged with internet, through whatsapp, twitter, facebook, net-banking and lots of other platforms are there. 2. And some criminal minded persons commit crimes here, which is included under cybercrime.
  • 7. 3. So we should be aware about crimes happening around in the cyber space.
  • 8. Cyber Crimes • Crimes are not to be measured by the issue of events but by the bad intensions of men. • The greatest crimes do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence in our own.
  • 9. Impacts of Cyber Crime • Computer Crime can affect the personal records of the individual. It can impact the financial resources of a bank, causing confusing and potentially affecting customer accounts. • New technologies create new criminal opportunities as well as new types of crime with the modernization and availability of technology for developmental as well as destructive purpose.
  • 10. CYBER SYSTEMS • Cyber Crime highlights the centrality of networked computers in our lives, as well as the fragility of such seemingly solid facts as individual identity.
  • 11. TYPES OF CYBER CRIME i. Invision of privacy ii. Voyeurism. It is an act done by a sexual prevent who derives gratification from surreptiously watching sexual acts or objects. iii. Theft of identity. iv. Cyber stalking: To stride with difficulty or haughtily.
  • 12. Cyber laws • There is absolutely no comprehensive law on cyber crime anywhere in the world. This is reason that the investigating agencies like FBI are finding the cyberspace to be an extremely difficult terrain.
  • 13. Examples • Hacking • Virus • Spyware • Spam • Root kits • Trojans • Phishing • Malware