SlideShare a Scribd company logo
1 of 18
Dr B T Sampath Kumar
Professor
Department of Library and Information Science
Tumkur University, Tumakuru, INDIA
www.sampathkumar.info
Cyber Crimes
Cybercrime
• Cybercrime is a crime that involves
a computer and network.
• Cyber crime includes any criminal activity
dealing with computer and Internet.
Cont..
• Recently “The Economic times” published an
article and stated that Bengaluru is India’s
cybercrime capital.
• Bengaluru registered the most number of
cybercrime cases in 2018.
Cont..
• The statistic on Cyber crimes shows that there
are 27,482 cases of Cyber crimes reported in
India in 2019.
• One attack in India every 10 minutes.
• Out of the top 10 most targeted countries by
cyber attackers, India ranks 4th place
Types of cyber crimes
• The different types of cyber crimes are:
– Hacking
– E-mail bombing
– Salami attack
– Email spoofing
– Cyber stalking
– Data diddling
– Denial-of-service attack
– Phishing and spreading of virus.
Hacking
• Computer hacking is the practice of modifying
computer hardware and software.
• Hacking generally refers to unauthorized entry
into a computer or a network.
• A hacker is a person who breaks codes and
passwords to gain unauthorized entry to
computer systems.
E-mail bombing
• E-mail bombing is sending a massive amount
of emails to a specific person or system.
• A huge amount of mail may simply fill up the
recipient's disk space on the server and may
cause the server to stop functioning.
Salami attack
• A “salami attack” is used for the purpose of
committing financial crimes.
• Here criminals steal money or resources a bit
at a time from financial accounts on a system.
Cyberstalking
• Cyber stalking is a crime in which the attacker
teases/threatens a person via e-mail,
WhatsApp, Facebook, Twitter etc.,
• The act of making untrue statements about
another person which damages his/her
reputation is also referred as cyber stalking.
Web jacking
• Web jacking is a process of gaining access and
control over the website of another.
• The information may be manipulated or
changed on the website.
Phishing
• Phishing is an attempt to acquire sensitive
information such as username, password and
credit card details.
Denial-of-service attack
• It is an attempt to make a computer or
network resource unavailable to its intended
users.
• The computer is flooded with more requests
than it can handle which cause it to crash.
• You might have experienced this while
downloading any application form from the
website.
• Even after waiting for several hours the file
will not be downloaded because of the Denial
of service attack
Misleading applications
• Another form of cyber crime is Misleading
applications
• Misleading applications misguide you about
the security status of your computer
• They show you that your computer is infected
by some malware.
Cont..
• You have to download the tool to remove the
threat.
• As you download the tool, it shows some
threats in your computer and to remove it.
• You have to buy the product for which it asks
some personal information like credit card
details etc., which is dangerous.
Adware
• Adware is a software application in which
advertising banners are displayed while any
program is running on your system.
• It can automatically get downloaded to your
system while browsing any website and can be
viewed through pop-up windows.
Spamming
• A most common cyber crime which we face in
the cyber world is Spamming.
• Spamming is a method of flooding the
Internet with copies of the same message.
• They are sent as an unwanted/junk email to
users.
• These spam mails are very irritating as it keeps
coming every day and keeps your mailbox full.
Spywares
• Spyware is a type of program that is installed
without your permission on your personal
computers to collect:
– information about users of the system
– the files in the computer
– your browsing habits
– without your knowledge and send the
information to remote user.
Virus
• Another type of cyber crime is spreading virus
over the Internet.
• Viruses are programs that attach themselves
to a computer or a file and usually affect the
data on a computer, either by altering or
deleting data.

More Related Content

What's hot

What's hot (20)

Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CyberSecurity.ppt
CyberSecurity.pptCyberSecurity.ppt
CyberSecurity.ppt
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cyber Hygiene in Dailylife
Cyber Hygiene in DailylifeCyber Hygiene in Dailylife
Cyber Hygiene in Dailylife
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Computer security
Computer securityComputer security
Computer security
 
Friendships and social media
Friendships and social mediaFriendships and social media
Friendships and social media
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Dos attack
Dos attackDos attack
Dos attack
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
An Introduction to Cyber Ethics
An Introduction to Cyber EthicsAn Introduction to Cyber Ethics
An Introduction to Cyber Ethics
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 

Similar to Cyber crimes

Similar to Cyber crimes (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 

More from Dr. B T Sampath Kumar

More from Dr. B T Sampath Kumar (20)

Selection of scholarly journal in Education
Selection of scholarly journal in EducationSelection of scholarly journal in Education
Selection of scholarly journal in Education
 
Web decay and Internet Archive
Web decay and Internet ArchiveWeb decay and Internet Archive
Web decay and Internet Archive
 
Selection of scholarly journal
Selection of scholarly journal Selection of scholarly journal
Selection of scholarly journal
 
Web browser
Web browserWeb browser
Web browser
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Software
SoftwareSoftware
Software
 
Secondary storage devices
Secondary storage devicesSecondary storage devices
Secondary storage devices
 
Search engine
Search engineSearch engine
Search engine
 
Programming
ProgrammingProgramming
Programming
 
Programming languages
Programming languagesProgramming languages
Programming languages
 
Output devices
Output devicesOutput devices
Output devices
 
Online learning courses
Online learning coursesOnline learning courses
Online learning courses
 
Networks
NetworksNetworks
Networks
 
Network topology
Network topologyNetwork topology
Network topology
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Library networks
Library networksLibrary networks
Library networks
 
Language processors
Language processorsLanguage processors
Language processors
 
Internal storage devices
Internal storage devicesInternal storage devices
Internal storage devices
 
Input devices
Input devicesInput devices
Input devices
 
Information and communication technology
Information and communication technologyInformation and communication technology
Information and communication technology
 

Recently uploaded

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Sheetaleventcompany
 

Recently uploaded (20)

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 

Cyber crimes

  • 1. Dr B T Sampath Kumar Professor Department of Library and Information Science Tumkur University, Tumakuru, INDIA www.sampathkumar.info Cyber Crimes
  • 2. Cybercrime • Cybercrime is a crime that involves a computer and network. • Cyber crime includes any criminal activity dealing with computer and Internet.
  • 3. Cont.. • Recently “The Economic times” published an article and stated that Bengaluru is India’s cybercrime capital. • Bengaluru registered the most number of cybercrime cases in 2018.
  • 4. Cont.. • The statistic on Cyber crimes shows that there are 27,482 cases of Cyber crimes reported in India in 2019. • One attack in India every 10 minutes. • Out of the top 10 most targeted countries by cyber attackers, India ranks 4th place
  • 5. Types of cyber crimes • The different types of cyber crimes are: – Hacking – E-mail bombing – Salami attack – Email spoofing – Cyber stalking – Data diddling – Denial-of-service attack – Phishing and spreading of virus.
  • 6. Hacking • Computer hacking is the practice of modifying computer hardware and software. • Hacking generally refers to unauthorized entry into a computer or a network. • A hacker is a person who breaks codes and passwords to gain unauthorized entry to computer systems.
  • 7. E-mail bombing • E-mail bombing is sending a massive amount of emails to a specific person or system. • A huge amount of mail may simply fill up the recipient's disk space on the server and may cause the server to stop functioning.
  • 8. Salami attack • A “salami attack” is used for the purpose of committing financial crimes. • Here criminals steal money or resources a bit at a time from financial accounts on a system.
  • 9. Cyberstalking • Cyber stalking is a crime in which the attacker teases/threatens a person via e-mail, WhatsApp, Facebook, Twitter etc., • The act of making untrue statements about another person which damages his/her reputation is also referred as cyber stalking.
  • 10. Web jacking • Web jacking is a process of gaining access and control over the website of another. • The information may be manipulated or changed on the website.
  • 11. Phishing • Phishing is an attempt to acquire sensitive information such as username, password and credit card details.
  • 12. Denial-of-service attack • It is an attempt to make a computer or network resource unavailable to its intended users. • The computer is flooded with more requests than it can handle which cause it to crash. • You might have experienced this while downloading any application form from the website. • Even after waiting for several hours the file will not be downloaded because of the Denial of service attack
  • 13. Misleading applications • Another form of cyber crime is Misleading applications • Misleading applications misguide you about the security status of your computer • They show you that your computer is infected by some malware.
  • 14. Cont.. • You have to download the tool to remove the threat. • As you download the tool, it shows some threats in your computer and to remove it. • You have to buy the product for which it asks some personal information like credit card details etc., which is dangerous.
  • 15. Adware • Adware is a software application in which advertising banners are displayed while any program is running on your system. • It can automatically get downloaded to your system while browsing any website and can be viewed through pop-up windows.
  • 16. Spamming • A most common cyber crime which we face in the cyber world is Spamming. • Spamming is a method of flooding the Internet with copies of the same message. • They are sent as an unwanted/junk email to users. • These spam mails are very irritating as it keeps coming every day and keeps your mailbox full.
  • 17. Spywares • Spyware is a type of program that is installed without your permission on your personal computers to collect: – information about users of the system – the files in the computer – your browsing habits – without your knowledge and send the information to remote user.
  • 18. Virus • Another type of cyber crime is spreading virus over the Internet. • Viruses are programs that attach themselves to a computer or a file and usually affect the data on a computer, either by altering or deleting data.