SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Cyber Criminals, Classifications of Cybercrimes
Presentation by: Ashwini Rathod
Contents
• Introduction
• Who are Cybercriminals
• Categories of Cybercriminals
• Classification of Cybercrimes
• Conclusion
Introduction
• Cybercrime is defined as any criminal activity which takes place on or
over the medium of computers or internet or other technology
recognized by the Information Technology Act.
• Cyber Crime includes any illegal activity where computer or internet
is either a tool or target or both.
• Cybercrime is growing and current technical models to tackle
cybercrime are inefficient in stemming the increase in cybercrime.
Who are Cybercriminals
• Cybercriminals are individuals or teams of people who use technology to commit
malicious activities on digital systems or networks with the intention of stealing
sensitive company information or personal data, and generating profit.
They can be categorized into 3 groups that reflect their motivation
Type 1: Cybercriminals-hungry for recognition
Hobby Hackers, terrorist organizations
Type 2: Cybercriminals-not interested in recognition
Organized criminals, Financially motivated hackers
Type 3: Cybercriminals-the insiders
Former employees seeking revenge
Classification of Cyber Crimes
The cyber crimes may be broadly classified into four groups.
1.Crime against the Individuals: Crimes that are committed by the cyber
criminals against an individual or a person. A few cyber crimes against
individuals are:
• Harassment via electronic mails.
• Spamming.
• Cyber-stalking.
• Defamation.
• Email spoofing.
2. Crimes against Property: These types of crimes includes vandalism of
computers, Intellectual (Copyright, patented, trademark etc) Property Crimes,
Online threatening etc. Intellectual property crime includes:
•Computer vandalism.
•Transmitting virus.
•Net-trespass.
•Unauthorized access / control over computer system.
•Internet thefts.
.
3. Crime against Organization: Crimes done to threaten the international
governments or any organization by using internet facilities.
These crimes are committed to spread terror among people. Cyber terrorism is
referred as crimes against a government. Cybercrimes against Government
includes cyber attack on the government website, military website or cyber
terrorism etc.
•Unauthorized access / control over computer system.
•Cyber terrorism against the government organization.
•Possession of unauthorized information.
•Distribution of Pirate software.
•Email Bombing.
•Trojan Horse
4. Crime against Society: Those cybercrimes which affects the society interest at
large are known as cyber crimes against society, which include:
•Child pornography.
•Indecent exposure of polluting the youth financial crimes.
•Sale of illegal articles.
•Trafficking.
•Forgery.
•Online gambling.
CONCLUSION
• The future of the Internet is still up for grabs between criminals and
normal users.
• Further, cyber crimes and traditional crimes may seem similar on the
outside yet there are certain differences between the two, which
separate one from another.
• To tackle these issues, cyber forensics is being actively used these
days to deal with cyber crimes, investigate and collect digital evidence
and catch cyber criminals.
THANK YOU

Weitere ähnliche Inhalte

Ähnlich wie Cyber Criminals,Classifications of Cybercrimes aat.pptx

Ähnlich wie Cyber Criminals,Classifications of Cybercrimes aat.pptx (20)

Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
1.2 Who are Cyber Criminals
1.2 Who are Cyber Criminals1.2 Who are Cyber Criminals
1.2 Who are Cyber Criminals
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 

Kürzlich hochgeladen

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 

Kürzlich hochgeladen (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 

Cyber Criminals,Classifications of Cybercrimes aat.pptx

  • 1. Cyber Criminals, Classifications of Cybercrimes Presentation by: Ashwini Rathod
  • 2. Contents • Introduction • Who are Cybercriminals • Categories of Cybercriminals • Classification of Cybercrimes • Conclusion
  • 3. Introduction • Cybercrime is defined as any criminal activity which takes place on or over the medium of computers or internet or other technology recognized by the Information Technology Act. • Cyber Crime includes any illegal activity where computer or internet is either a tool or target or both. • Cybercrime is growing and current technical models to tackle cybercrime are inefficient in stemming the increase in cybercrime.
  • 4. Who are Cybercriminals • Cybercriminals are individuals or teams of people who use technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, and generating profit. They can be categorized into 3 groups that reflect their motivation Type 1: Cybercriminals-hungry for recognition Hobby Hackers, terrorist organizations Type 2: Cybercriminals-not interested in recognition Organized criminals, Financially motivated hackers Type 3: Cybercriminals-the insiders Former employees seeking revenge
  • 5. Classification of Cyber Crimes The cyber crimes may be broadly classified into four groups. 1.Crime against the Individuals: Crimes that are committed by the cyber criminals against an individual or a person. A few cyber crimes against individuals are: • Harassment via electronic mails. • Spamming. • Cyber-stalking. • Defamation. • Email spoofing.
  • 6. 2. Crimes against Property: These types of crimes includes vandalism of computers, Intellectual (Copyright, patented, trademark etc) Property Crimes, Online threatening etc. Intellectual property crime includes: •Computer vandalism. •Transmitting virus. •Net-trespass. •Unauthorized access / control over computer system. •Internet thefts. .
  • 7. 3. Crime against Organization: Crimes done to threaten the international governments or any organization by using internet facilities. These crimes are committed to spread terror among people. Cyber terrorism is referred as crimes against a government. Cybercrimes against Government includes cyber attack on the government website, military website or cyber terrorism etc. •Unauthorized access / control over computer system. •Cyber terrorism against the government organization. •Possession of unauthorized information. •Distribution of Pirate software. •Email Bombing. •Trojan Horse
  • 8. 4. Crime against Society: Those cybercrimes which affects the society interest at large are known as cyber crimes against society, which include: •Child pornography. •Indecent exposure of polluting the youth financial crimes. •Sale of illegal articles. •Trafficking. •Forgery. •Online gambling.
  • 9. CONCLUSION • The future of the Internet is still up for grabs between criminals and normal users. • Further, cyber crimes and traditional crimes may seem similar on the outside yet there are certain differences between the two, which separate one from another. • To tackle these issues, cyber forensics is being actively used these days to deal with cyber crimes, investigate and collect digital evidence and catch cyber criminals.