SlideShare a Scribd company logo
1 of 13
• A generalized definition of cyber crime
may be “ unlawful acts wherein the
computer is either a tool or target or
both” .
• “Any criminal activity that uses a
computer either as an instrumentality,
target or a means for perpetuating
further crimes comes within the ambit
of cyber crime”
• Cyber crime is known by lots of
different names, including computer
crime, e-crime, or electronic crime.
Introduction
Hacking - Hacking in simple terms
means an illegal intrusion into a
computer system without permission
of computer owner/user. Hackers
write or use ready-made computer
programs to attack the target
computer.
Types of Cyber Crime
Virus Dissemination - Malicious software
that attaches itself to other software. (virus,
worms, Trojan Horse, Time bomb, Logic Bomb,
Rabbit and Bacterium are the malicious.
Cyber Pornography - This would include
pornographic websites; pornographic magazines
produced using computers. The Internet is being
highly used by its abusers to reach and abuse
children sexually, worldwide.
Intellectual Property Crimes - Intellectual
property (IP) crime is a generic term used to
describe a wide range of counterfeiting and
piracy offences. These include software piracy,
copyright infringement, trademarks violations,
theft of computer source code etc.
Software Piracy - Theft of software through
the illegal copying of genuine programs or
the counterfeiting and distribution of
products intended to pass for the original.
The unauthorized copying of software.
Email spoofing - A spoofed email is one that
appears to originate from one source but
actually has been sent from another source.
Cyber Stalking - The Oxford dictionary
defines stalking as "pursuing stealthily".
Cyber Stalking can be defined as the repeated
acts harassment or threatening behavior of
the cyber criminal towards the victim by using
internet services.
Cyber Defamation - This occurs when
defamation takes place with the help of
computers and / or the Internet. Cyber
Defamation is a crime conducted in
cyberspace, usually through the Internet,
with the intention of defaming others.
Phishing - The e-mail directs the user to visit a
Web site where they are asked to update
personal information, such as passwords and
credit card, social security, and bank account
numbers, that the legitimate organization
already has .
 Unauthorized access to computer
systems or networks
 Theft of information contained in
electronic form
 Email bombing
 Data diddling
 Logic Bomb
 Denial of Service attack
 Virus / worm attacks
 Trojan attacks
FREQUENTLY USED
CYBER CRIMES
REASONS FOR CYBER
CRIMES
 Capacity to store data in comparatively
small space
 Easy to access
 Complex
 Negligence
CYBER CRIMINALS
 Children and adolescents between the
age group of 6 – 18 years
 Organised hackers
 Professional hackers / crackers
 Discontented employees
PREVENTION OF CYBER
CRIME
 Anti-virus software
 Frequent password changing.
 Firewalls
 Safe surfing.
 Frequent virus checks.
 Email filters.
 Always keep a watch on the sites that your children are
accessing to prevent any kind of harassment or
depravation in children
CONCLUSION
Cyber crime is a multi-billion dollar
problem. It is criminals
activity committed on internet. This is a
broad term that
describes everything from electronic
cracking to denial of
service attacks that cause electronic
commerce sites to loss
money.
Thank You

More Related Content

What's hot (20)

Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 

Viewers also liked

Viewers also liked (6)

Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 

Similar to Cyber crime presentation

Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 

Similar to Cyber crime presentation (20)

Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 

Cyber crime presentation

  • 1.
  • 2. • A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both” . • “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime” • Cyber crime is known by lots of different names, including computer crime, e-crime, or electronic crime. Introduction
  • 3. Hacking - Hacking in simple terms means an illegal intrusion into a computer system without permission of computer owner/user. Hackers write or use ready-made computer programs to attack the target computer. Types of Cyber Crime
  • 4. Virus Dissemination - Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious. Cyber Pornography - This would include pornographic websites; pornographic magazines produced using computers. The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. Intellectual Property Crimes - Intellectual property (IP) crime is a generic term used to describe a wide range of counterfeiting and piracy offences. These include software piracy, copyright infringement, trademarks violations, theft of computer source code etc.
  • 5. Software Piracy - Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. The unauthorized copying of software.
  • 6. Email spoofing - A spoofed email is one that appears to originate from one source but actually has been sent from another source. Cyber Stalking - The Oxford dictionary defines stalking as "pursuing stealthily". Cyber Stalking can be defined as the repeated acts harassment or threatening behavior of the cyber criminal towards the victim by using internet services.
  • 7. Cyber Defamation - This occurs when defamation takes place with the help of computers and / or the Internet. Cyber Defamation is a crime conducted in cyberspace, usually through the Internet, with the intention of defaming others. Phishing - The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has .
  • 8.  Unauthorized access to computer systems or networks  Theft of information contained in electronic form  Email bombing  Data diddling  Logic Bomb  Denial of Service attack  Virus / worm attacks  Trojan attacks FREQUENTLY USED CYBER CRIMES
  • 9. REASONS FOR CYBER CRIMES  Capacity to store data in comparatively small space  Easy to access  Complex  Negligence
  • 10. CYBER CRIMINALS  Children and adolescents between the age group of 6 – 18 years  Organised hackers  Professional hackers / crackers  Discontented employees
  • 11. PREVENTION OF CYBER CRIME  Anti-virus software  Frequent password changing.  Firewalls  Safe surfing.  Frequent virus checks.  Email filters.  Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children
  • 12. CONCLUSION Cyber crime is a multi-billion dollar problem. It is criminals activity committed on internet. This is a broad term that describes everything from electronic cracking to denial of service attacks that cause electronic commerce sites to loss money.