SlideShare ist ein Scribd-Unternehmen logo
1 von 20
CYBER CRIMES
• Prepared By : P.RISHITH
13BCE0297
M.Sai Siddharth
13BCE0681
Introduction
• The usage of internet is growing rapidly.
• It has given new oppurtunities in every field we can think
of- be it entertainment,business,sports or education.
• Internet has its own advantages and disadvantages
• One of the major disadvantage is Cyber Crime
What is Cyber Crime?
• Use of Computer/Internet to something that
would be a crime in any case.
• It is an unlawful act where the computer is either a tool or a
target or both
• Acts that are punishable by Information Technology Act.
History
• In the early decades of modern information technology (IT), computer
crimes were largely committed by individual disgruntled and dishonest
employees.
• Physical damage to computer systems was a prominent threat until the
1980s.
• Programmers in the 1980s began writing malicious software, including self-
replicating programs, to interfere with personal computers.
• As the Internet increased access to increasing numbers of systems
worldwide, criminals used unauthorized access to poorly protected systems
for vandalism, political action and financial gain.
Categories of Cyber crime:
• Three categories-
• 1.Cyber crime against persons
• 2.Cyber crime against property
• 3.Cyber crime against government
First categorie:
• Includes various harassements such as
Sexual
Racial
Religious
Nationality etc
Any content that may be found derogatory or offensive is considered
harassment.
Second category
• These crimes include :
-Computer vandalism(destruction of others property)
-Transmission of harmful programs
-Unauthorised trespassing
-Unauthorised possession of computer information
Third Category
• Cyber terrorism is one distinct kind of crime in this
category.
• Cyber space is being used by individuals and groups to
threaten the organizations and international governments.
-Also to terrorize the citizens of a country.
Various Cyber Crimes :
• Unauthorised access to computer system or networks
• Theft of information contained in electronic form
• Data didling(manipulation of data)
• Hacking through various programmes
• Virus/worm attacks
• Trojan attacks
• Key loggers
• Malware(malicious code)
• Internet time thefts(gaining access to other internet
without his knowledge.
• Web jacking(forcefully taking control of the website)
• Theft of computer system
• Physically damaging a computer system
Hacking
• It has been noted that hackers have hacked millions of computers across the
globe and the number is increasing with every passing day.
• Some hackings are done just for fun others are done for stealing
information yet others are done for personal reasons such as taking revenge
from someone and so on.
• Stealing someone's personal data for own use, breaking through into a
company's account and making changes in their database
Cyber Criminals
• Australian nationwide survey conducted in 2006 found that two
in three convicted cyber-criminals were between the ages of 15
and 26
• Organised hackers
• Professional Hackers
• Discontended Employees
Questionnaire
• 1. Have you ever been the recipient of an e-mail you recognized as a scam?
• Yes: 81%
• No: 19%
• 2. Have you ever received a threatening or harassing e-mail? If yes, what did you do about it?
• Yes: 10%
• No: 90%
• 3. Have you ever been asked to meet in person with someone you only knew over the
Internet?
• Yes: 31%
• No: 69%
• 4. Have you ever been the victim of identity theft?
• Yes: 6%
• No: 94%
• 5. Do you know anyone who has been the victim of identity theft?
• Yes: 32%
• No: 68%
• 6. Have you ever had a computer virus that caused significant damage to
your computer or significant personal inconvenience?
• Yes: 78%
• No: 22%
• 7. Have you ever had personal information such as your social insurance number or
bank account numbers stolen through:
• Yes: 4%
• No: 96%
• 8. Have you ever received an e-mail soliciting child pornography?
• Yes: 7%
• No: 93%
• 9. Do you feel you know enough about how cybercrime is committed to do a
reasonable job protecting yourself?
• Yes: 45%
• No: 55%
Prevention
• Set a good firewall
• Disable and log off a specific user account to prevent access
• Disable specific applications for example , an e-mail system subjected
to a Spam attack
• Install intrusion prevention system
• Using various Anti virus , internet security , anti malware software’s
Thank you
Source:
• Britannica.com
• technocache.wordpress.com
• cybercrimeindia.org
• wikipedia

Weitere ähnliche Inhalte

Was ist angesagt?

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 

Was ist angesagt? (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime presentation school level
Cyber crime presentation school levelCyber crime presentation school level
Cyber crime presentation school level
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 

Ähnlich wie Cyber crime

cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 

Ähnlich wie Cyber crime (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Cyber crime

  • 1. CYBER CRIMES • Prepared By : P.RISHITH 13BCE0297 M.Sai Siddharth 13BCE0681
  • 2. Introduction • The usage of internet is growing rapidly. • It has given new oppurtunities in every field we can think of- be it entertainment,business,sports or education. • Internet has its own advantages and disadvantages • One of the major disadvantage is Cyber Crime
  • 3. What is Cyber Crime? • Use of Computer/Internet to something that would be a crime in any case.
  • 4. • It is an unlawful act where the computer is either a tool or a target or both • Acts that are punishable by Information Technology Act.
  • 5. History • In the early decades of modern information technology (IT), computer crimes were largely committed by individual disgruntled and dishonest employees. • Physical damage to computer systems was a prominent threat until the 1980s. • Programmers in the 1980s began writing malicious software, including self- replicating programs, to interfere with personal computers. • As the Internet increased access to increasing numbers of systems worldwide, criminals used unauthorized access to poorly protected systems for vandalism, political action and financial gain.
  • 6. Categories of Cyber crime: • Three categories- • 1.Cyber crime against persons • 2.Cyber crime against property • 3.Cyber crime against government
  • 7. First categorie: • Includes various harassements such as Sexual Racial Religious Nationality etc Any content that may be found derogatory or offensive is considered harassment.
  • 8. Second category • These crimes include : -Computer vandalism(destruction of others property) -Transmission of harmful programs -Unauthorised trespassing -Unauthorised possession of computer information
  • 9. Third Category • Cyber terrorism is one distinct kind of crime in this category. • Cyber space is being used by individuals and groups to threaten the organizations and international governments. -Also to terrorize the citizens of a country.
  • 10. Various Cyber Crimes : • Unauthorised access to computer system or networks • Theft of information contained in electronic form • Data didling(manipulation of data) • Hacking through various programmes • Virus/worm attacks • Trojan attacks • Key loggers
  • 11. • Malware(malicious code) • Internet time thefts(gaining access to other internet without his knowledge. • Web jacking(forcefully taking control of the website) • Theft of computer system • Physically damaging a computer system
  • 12. Hacking • It has been noted that hackers have hacked millions of computers across the globe and the number is increasing with every passing day. • Some hackings are done just for fun others are done for stealing information yet others are done for personal reasons such as taking revenge from someone and so on. • Stealing someone's personal data for own use, breaking through into a company's account and making changes in their database
  • 13.
  • 14.
  • 15. Cyber Criminals • Australian nationwide survey conducted in 2006 found that two in three convicted cyber-criminals were between the ages of 15 and 26 • Organised hackers • Professional Hackers • Discontended Employees
  • 16. Questionnaire • 1. Have you ever been the recipient of an e-mail you recognized as a scam? • Yes: 81% • No: 19% • 2. Have you ever received a threatening or harassing e-mail? If yes, what did you do about it? • Yes: 10% • No: 90% • 3. Have you ever been asked to meet in person with someone you only knew over the Internet? • Yes: 31% • No: 69%
  • 17. • 4. Have you ever been the victim of identity theft? • Yes: 6% • No: 94% • 5. Do you know anyone who has been the victim of identity theft? • Yes: 32% • No: 68% • 6. Have you ever had a computer virus that caused significant damage to your computer or significant personal inconvenience? • Yes: 78% • No: 22%
  • 18. • 7. Have you ever had personal information such as your social insurance number or bank account numbers stolen through: • Yes: 4% • No: 96% • 8. Have you ever received an e-mail soliciting child pornography? • Yes: 7% • No: 93% • 9. Do you feel you know enough about how cybercrime is committed to do a reasonable job protecting yourself? • Yes: 45% • No: 55%
  • 19. Prevention • Set a good firewall • Disable and log off a specific user account to prevent access • Disable specific applications for example , an e-mail system subjected to a Spam attack • Install intrusion prevention system • Using various Anti virus , internet security , anti malware software’s
  • 20. Thank you Source: • Britannica.com • technocache.wordpress.com • cybercrimeindia.org • wikipedia