SlideShare une entreprise Scribd logo
1  sur  31
Group Members: Danushka Nirmal De Silva(4240138)
Ahmad Akmal Afiq(4237323)
Yadiy Zakwan(4240960)
INTRODUCTION


SUMMARY
 DEFINITIONS
 HISTORY
 TYPES OF CYBERCRIME
 STATISTICS
 CASE STUDY (1 & 2)
 PREVENTION
 CONCLUSION
SUMMARY
The internet is growing rapidly.
 Rise in new opportunities in the modern
world.
 Internet also has its own disadvantages
which is :

WHAT IS CYBERCRIME ?


Crime committed using a computer and the
internet to steal a person’s identity or illegal
imports or malicious programs



the computer used as an object or subject of
crime
HISTORY


Abacus is the earliest and simplest form of computer
which dates back about 3500 B.C and was used in
some parts of the world such as China



First recorded cyber crime dates back to 1820



Joseph-Marie Jacquard had a textile manufacture
introduced the loom



The loom threatened the employees in the firm who
then decided to sabotage it in order to discourage
Jacquard from further use of the loom
Cont’d
First spam email took place in 1978 when it
was sent over the Arpanet
 The first virus was installed on an Apple
computer in 1982

TYPES OF CYBERCRIMES
Hacking
 Child Pornography
 Denial of Service(DoS)
 Virus Dissemination
 Computer Vandalism
 Cyber Terrorism
 Software Piracy

HACKING
Illegal intrusion into a computer system
and/or network
 Hackers writes or use ready-made computer
programs to attack the target computer
 Includes breaking into a computer with
intention to steal, damage, modify or monitor
data or settings within a system

CHILD PORNOGRAPHY
The internet is being highly used by its
abusers to reach and abuse children
sexually, worldwide
 Nowadays, more homes have internet
access, more children would be using the
internet and high chances of falling victim to
paedophiles

Denial of Service


The criminal floods the bandwidth of victims
network or fills his e-mail box with spam mail
depriving him of the services he is entitled to
access or provide
VIRUS DISSEMINITION
Malicious software that attaches itself to
other software
 Circulate themselves to other files and to
other computers on a network
 Affect the data on a computer, either by
altering or deleting it

COMPUTER VANDALISM


An act of damaging or destroying data rather
than stealing or misusing them
CYBER TERRORISM
It is the actual use of computers and internet
technology to cause intimidation and
destruction
 Uses the internet or network to destroy or
damage computers for political reasons
 Cyber terrorists could hack into a
pharmaceutical company’s
computers, changing the formula of some
essential medication and causing thousands
to die

SOFTWARE PIRACY
Theft of software through an illegal act of
copying a genuine programs or the
counterfeiting and distribution of products
intended to pass for the original
 Copying and using computer programs in
violation of copyrights and trade secret laws
 Retail revenue losses worldwide are ever
increasing due to software piracy

STATISTICS
STATISTICS(cont..)
CASE STUDY 1
CYBER CRIMINALS TARGET
SKYPE, FACEBOOK &
WINDOWS USER
CASE STUDY 1
Cyber criminals target social network &
Windows users with Blackhole malware.
 Disuised as Windows
licences, Facebook account
verification, Skype voicemail
notifications & spam messages.
 Biggest dangers Internet users face.

Users who click the malicious Blackhole
links & downloaded the files were
infected with a Trojan virus.
 Spam email campaign targeted
Facebook users with a message
claiming that their account was locked
and needed to be re-verified.
 The links led to Blackhole exploits and a
Zeus Trojan disguised as an Adobe
Flash Player download.

Users should verify the source and
destination of any link before clicking
 they should never run executable files
unless they are positive that the source
is legitimate

CASE STUDY 2
HACKING OF US DRONE
TECHNOLOGY
CASE STUDY 2
Chinese hackers increasingly attracted to
US drone technology
 Hacker group “Comment Crew” hacked US
military network stealing classified
information of US military drones.
 They targeted both large
companies, including US military contractors
& military firms focused on drone technology.

Chinese drone identical to US Predator
drone.
 US drone market could be the first victim of
Chinese espionage.

PREVENTION
Antivirus & Anti Spyware software
 Firewalls
 Cryptography
 Cyber Law & Ethics

Antivirus & Anti Spyware
software



to identify and eliminate computer
viruses and other malicious software.
to restrict backdoor program, trojans
and other spywares to be installed on
the computer.
Firewalls
protects a computer network from
unauthorized access.
 guards an internal computer network
against malicious access from outside
the network.

Cryptography
science of encrypting and decrypting
information.
 Encryption is like sending a postal mail
to another party with a lock code on the
envelope which is known only to the
sender & the recipient.
 A number of cryptographic methods
have been developed and some of them
are still not cracked.

Cyber Laws & Ethics
Responsibility of every individual to
follow cyber ethics and cyber laws.
 ISP should provide high level security at
their severs
 Security software as a protection
 Essential features in the cyber world
today.

CONCLUSION
Cybercrimes increase with the rapidly
growing internet technology.
 It is not possible to eliminate
cybercrimes.
 It is quite possible to
check them.
 Awareness is always the
first step to protect yourself.

Cybercrime(this)

Contenu connexe

Tendances (19)

Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Email crime ppt
Email crime pptEmail crime ppt
Email crime ppt
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Information-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxInformation-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptx
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
 
1358619756 cyber terrorism
1358619756 cyber terrorism1358619756 cyber terrorism
1358619756 cyber terrorism
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
introduction of Cyber securit
introduction of Cyber securitintroduction of Cyber securit
introduction of Cyber securit
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 

En vedette

Cyber-bullying Orit Zeichner, Hila Agassi, Avishai Kleinman
Cyber-bullying  Orit Zeichner, Hila Agassi, Avishai KleinmanCyber-bullying  Orit Zeichner, Hila Agassi, Avishai Kleinman
Cyber-bullying Orit Zeichner, Hila Agassi, Avishai Kleinmanoritzeichner
 
Cyber bullying אלימות ברשת - ענב גנד גלילי
Cyber bullying אלימות ברשת - ענב גנד גלילי Cyber bullying אלימות ברשת - ענב גנד גלילי
Cyber bullying אלימות ברשת - ענב גנד גלילי greatest123
 
Legal contexts of digital media & internet governance
Legal contexts of digital media & internet governanceLegal contexts of digital media & internet governance
Legal contexts of digital media & internet governanceCheldy S, Elumba-Pableo
 
Republic Act No. 10175
Republic Act No. 10175Republic Act No. 10175
Republic Act No. 10175Abe Olandres
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Michael Roa
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 

En vedette (7)

Cyber-bullying Orit Zeichner, Hila Agassi, Avishai Kleinman
Cyber-bullying  Orit Zeichner, Hila Agassi, Avishai KleinmanCyber-bullying  Orit Zeichner, Hila Agassi, Avishai Kleinman
Cyber-bullying Orit Zeichner, Hila Agassi, Avishai Kleinman
 
Cyber bullying אלימות ברשת - ענב גנד גלילי
Cyber bullying אלימות ברשת - ענב גנד גלילי Cyber bullying אלימות ברשת - ענב גנד גלילי
Cyber bullying אלימות ברשת - ענב גנד גלילי
 
Legal contexts of digital media & internet governance
Legal contexts of digital media & internet governanceLegal contexts of digital media & internet governance
Legal contexts of digital media & internet governance
 
Republic Act No. 10175
Republic Act No. 10175Republic Act No. 10175
Republic Act No. 10175
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 

Similaire à Cybercrime(this)

Similaire à Cybercrime(this) (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
cyber crime
cyber crime cyber crime
cyber crime
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Malware
MalwareMalware
Malware
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Dernier

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 

Dernier (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

Cybercrime(this)

  • 1. Group Members: Danushka Nirmal De Silva(4240138) Ahmad Akmal Afiq(4237323) Yadiy Zakwan(4240960)
  • 2. INTRODUCTION  SUMMARY  DEFINITIONS  HISTORY  TYPES OF CYBERCRIME  STATISTICS  CASE STUDY (1 & 2)  PREVENTION  CONCLUSION
  • 3. SUMMARY The internet is growing rapidly.  Rise in new opportunities in the modern world.  Internet also has its own disadvantages which is : 
  • 4. WHAT IS CYBERCRIME ?  Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs  the computer used as an object or subject of crime
  • 5. HISTORY  Abacus is the earliest and simplest form of computer which dates back about 3500 B.C and was used in some parts of the world such as China  First recorded cyber crime dates back to 1820  Joseph-Marie Jacquard had a textile manufacture introduced the loom  The loom threatened the employees in the firm who then decided to sabotage it in order to discourage Jacquard from further use of the loom
  • 6. Cont’d First spam email took place in 1978 when it was sent over the Arpanet  The first virus was installed on an Apple computer in 1982 
  • 7. TYPES OF CYBERCRIMES Hacking  Child Pornography  Denial of Service(DoS)  Virus Dissemination  Computer Vandalism  Cyber Terrorism  Software Piracy 
  • 8. HACKING Illegal intrusion into a computer system and/or network  Hackers writes or use ready-made computer programs to attack the target computer  Includes breaking into a computer with intention to steal, damage, modify or monitor data or settings within a system 
  • 9. CHILD PORNOGRAPHY The internet is being highly used by its abusers to reach and abuse children sexually, worldwide  Nowadays, more homes have internet access, more children would be using the internet and high chances of falling victim to paedophiles 
  • 10. Denial of Service  The criminal floods the bandwidth of victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide
  • 11. VIRUS DISSEMINITION Malicious software that attaches itself to other software  Circulate themselves to other files and to other computers on a network  Affect the data on a computer, either by altering or deleting it 
  • 12.
  • 13. COMPUTER VANDALISM  An act of damaging or destroying data rather than stealing or misusing them
  • 14. CYBER TERRORISM It is the actual use of computers and internet technology to cause intimidation and destruction  Uses the internet or network to destroy or damage computers for political reasons  Cyber terrorists could hack into a pharmaceutical company’s computers, changing the formula of some essential medication and causing thousands to die 
  • 15. SOFTWARE PIRACY Theft of software through an illegal act of copying a genuine programs or the counterfeiting and distribution of products intended to pass for the original  Copying and using computer programs in violation of copyrights and trade secret laws  Retail revenue losses worldwide are ever increasing due to software piracy 
  • 18. CASE STUDY 1 CYBER CRIMINALS TARGET SKYPE, FACEBOOK & WINDOWS USER
  • 19. CASE STUDY 1 Cyber criminals target social network & Windows users with Blackhole malware.  Disuised as Windows licences, Facebook account verification, Skype voicemail notifications & spam messages.  Biggest dangers Internet users face. 
  • 20. Users who click the malicious Blackhole links & downloaded the files were infected with a Trojan virus.  Spam email campaign targeted Facebook users with a message claiming that their account was locked and needed to be re-verified.  The links led to Blackhole exploits and a Zeus Trojan disguised as an Adobe Flash Player download. 
  • 21. Users should verify the source and destination of any link before clicking  they should never run executable files unless they are positive that the source is legitimate 
  • 22. CASE STUDY 2 HACKING OF US DRONE TECHNOLOGY
  • 23. CASE STUDY 2 Chinese hackers increasingly attracted to US drone technology  Hacker group “Comment Crew” hacked US military network stealing classified information of US military drones.  They targeted both large companies, including US military contractors & military firms focused on drone technology. 
  • 24. Chinese drone identical to US Predator drone.  US drone market could be the first victim of Chinese espionage. 
  • 25. PREVENTION Antivirus & Anti Spyware software  Firewalls  Cryptography  Cyber Law & Ethics 
  • 26. Antivirus & Anti Spyware software   to identify and eliminate computer viruses and other malicious software. to restrict backdoor program, trojans and other spywares to be installed on the computer.
  • 27. Firewalls protects a computer network from unauthorized access.  guards an internal computer network against malicious access from outside the network. 
  • 28. Cryptography science of encrypting and decrypting information.  Encryption is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender & the recipient.  A number of cryptographic methods have been developed and some of them are still not cracked. 
  • 29. Cyber Laws & Ethics Responsibility of every individual to follow cyber ethics and cyber laws.  ISP should provide high level security at their severs  Security software as a protection  Essential features in the cyber world today. 
  • 30. CONCLUSION Cybercrimes increase with the rapidly growing internet technology.  It is not possible to eliminate cybercrimes.  It is quite possible to check them.  Awareness is always the first step to protect yourself. 