SlideShare a Scribd company logo
1 of 10
THE CYBER WORLD
The cyber world or cyberspace is an online
environment of computer networks through which you
can communicate with other people.
It provides users with ways to conduct business and
network with other people as easily as they do in the
physical world .For example ,online shopping has
reduced trips to the market and social networking sites
allow you to connect with friends staying thousands of
miles away. In addition to all the benefits , there are
some serious concerns too that the cyber world offers.
Let’s learn more about the dangers of the cyber world
so that we can keep ourselves safe.
CYBERCRIMES
Cybercrime is a broad term used to define any unlawful activity
where a computer is either used as a tool or a target to both to
commit a crime.
From banking to social networking, millions of people use the
internet every day for various purposes. There has been a
phenomenal rise in the number of internet users in recent times.
However, the ease and anonymity with which people can use the
internet has led to an increasing number of cybercrimes.
DIFFERENT TYPES OF CYBERCRIMES
Just like there are many types of activities you can perform on the internet ,there
are different types of crimes too. Let’s have a look at the most commonly
performed crimes.
According to the National Crime Prevention Council, cyber bullying takes place “
where the internet, cell phones or other devices are used to send or post text or
images intended to hurt or embarrass another person.”
Cyber bullying involves acts that seek to control ,manipulate ,falsely
dishonor, or humiliate a person or entity using the computer as a mode
of communication. The actions are deliberate and done repeatedly on
purpose with the sole intention of causing harm.
Cyber bullying is being increasingly used in schools. In a recent incident a young
school boy who was excellent in basketball was bullied by his jealous seniors over the
internet as they could not prove themselves better at the basketball court. As a result
,the young boy started to withdraw and his sport suffered.
This is incident of cybercrime, and if reported, the accused may have to face serious
legal consequences.
A person is said to “cheat by personation” if he/she cheats by pretending to be some
other person. By providing a false identity, the person does not feel responsible for
his/her words or actions and thus behaves badly or uses his/her false identity to
gather the other person’s personal details. These personal details may then be
misused. However, it is important to keep in mind that if such an incident is reported,
the cybercrimes branch can easily track the person who is cheating and take legal
action against the persons.
The distribution of obscene publishing material in electronics form is a criminal
offence. Committed with the purpose to sexually exploit underage children , child
pornography uses electronic media and its network to create , distribute , and
access different types of obscene and indecent material .
Sending offensive messages through online media to threaten the receiver is also
a cybercrime. Such messages could include the following:
1. Information that is grossly disrespectful.
2. Consistently sending false information using various communication device with
the aim of causing annoyance, inconvenience, danger, obstruction, insult, injury,
enmity, or hatred.
Cyber defamation takes place when :
1. Hurtful word intended to be read online are published on websites or circulated
using emails to damage the reputation of an individual.
2. Hurtful signs or visible representation are circulated online with the intention to
damage the reputation of an individual, group of individuals, brand, or a product.
Pursuing or following a person online is called cyber stalking. The privacy of the
individual is threatened and every move is watched. The internet and other electronic
means are used to stalk or harass an individual, group, or organization. The purpose
of cyber stalking may include false accusations, defamation, monitoring, identity theft ,
threats, or gathering information with an intention to threat or harass.
Phishing is a cyber crime where people (called phishers ) use spam, fake website,
crimeware, and other similar techniques to trick people into divulging sensitive
information, such as bank account numbers, debit / credit card account details,
passwords etc.
The stolen details are then misused to use the victim’s bank account or the details
are sold in the black market. Phishers often use scare tactics that threaten to
disable accounts or delay important services.
Phishing can be avoided by deleting fraud emails and not clicking on any suspicious
link in emails. In addition, always remember to sign out from your account s when
using a public computer.
Hacking is defined as identifying weakness in computer system and / or network. The
weakness are exploited to gain access to the computer system and destroy / misuse
data as well as computer programs.
People who follow the practice of hacking are called hackers. Computer hacking is
unethical when the hackers brake into the system to peek in to the extreme details of
computer applications, programs, or the whole system with the purpose to either
extending its capabilities or modify its functionalities.
Based on their intentions, hackers are classified into the following types:
. Ethical hackers – white hat
An ethical hacker access the system to fix identified weakness. They may
also perform tests and exposure assessments.
. Cracker – black hat
A cracker gains unauthorized access to computer system for personal gains
with unethical intentions, such as staling corporate data, violate privacy
rights, stealing funds, etc.
Skimming is a cyber crime where scammers steal your credit / debit card details by
fitting a skimmer device to an ATM machine. The device reads and record the card
details from the magnetic strip on the card, resulting in misuse an frauds.
The information from the strip is ‘skimmed’ to create a fake or cloned card with
the stolen details. The personal details and account numbers are used to borrow
money or take loans in the victim’s name.
You can protect yourself from card skimming by keeping these simple pointers
In mind:
. Keep all your bank detail in a safe place. Refrain from sharing your Personal
Identity Number (PIN) with anyone.
. Check your bank account statements. Report any suspicious or unexplained
transaction to the bank.
Referred to as the crime of the new millennium, identity theft is defined as stealing and
using someone’s personal information primarily for monetary gain.
Identity theft is a crime in which the imposter obtains important personal identity
information, such as electronic signature, passwords, and driver’s license numbers, and
uses them for their personal gains. The nature of the crime varies widely and can
include credit card frauds, cheque frauds, identity theft, etc. Phishing, hacking,
skimming also lead to identity theft.
Viruses are malicious programs that infects other programs in computers.
A virus can also make copies of itself and spread to other programs. Viruses
Affects the data on a computer, either by altering or deleting it. Examples of malicious
programs include worms, Trojan horse, Time bombs, Rabbit, and Bacterium.
Technical awareness, common sense, using antivirus, choosing strong passwords
and protecting personal information can help prevent your computer from virus
attacks.
Financial frauds are the direct result of hacking, phishing, skimming, virus attack, and
Identity thefts. In such cases, the victim’s personal and confidential information is
obtained to access their bank account and use their money.

More Related Content

What's hot (20)

Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Ppt
PptPpt
Ppt
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
cyber crime
cyber crimecyber crime
cyber crime
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in Pakistan
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hacking
HackingHacking
Hacking
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 

Similar to THE CYBER WORLD.pptx

Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdfgaherwarsaloni1234
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeetaAparajeeta Salu
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 

Similar to THE CYBER WORLD.pptx (20)

Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 

Recently uploaded

Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolinonuriaiuzzolino1
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 

Recently uploaded (20)

Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 

THE CYBER WORLD.pptx

  • 1. THE CYBER WORLD The cyber world or cyberspace is an online environment of computer networks through which you can communicate with other people. It provides users with ways to conduct business and network with other people as easily as they do in the physical world .For example ,online shopping has reduced trips to the market and social networking sites allow you to connect with friends staying thousands of miles away. In addition to all the benefits , there are some serious concerns too that the cyber world offers. Let’s learn more about the dangers of the cyber world so that we can keep ourselves safe.
  • 2. CYBERCRIMES Cybercrime is a broad term used to define any unlawful activity where a computer is either used as a tool or a target to both to commit a crime. From banking to social networking, millions of people use the internet every day for various purposes. There has been a phenomenal rise in the number of internet users in recent times. However, the ease and anonymity with which people can use the internet has led to an increasing number of cybercrimes.
  • 3. DIFFERENT TYPES OF CYBERCRIMES Just like there are many types of activities you can perform on the internet ,there are different types of crimes too. Let’s have a look at the most commonly performed crimes. According to the National Crime Prevention Council, cyber bullying takes place “ where the internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person.” Cyber bullying involves acts that seek to control ,manipulate ,falsely dishonor, or humiliate a person or entity using the computer as a mode of communication. The actions are deliberate and done repeatedly on purpose with the sole intention of causing harm. Cyber bullying is being increasingly used in schools. In a recent incident a young school boy who was excellent in basketball was bullied by his jealous seniors over the internet as they could not prove themselves better at the basketball court. As a result ,the young boy started to withdraw and his sport suffered. This is incident of cybercrime, and if reported, the accused may have to face serious legal consequences.
  • 4. A person is said to “cheat by personation” if he/she cheats by pretending to be some other person. By providing a false identity, the person does not feel responsible for his/her words or actions and thus behaves badly or uses his/her false identity to gather the other person’s personal details. These personal details may then be misused. However, it is important to keep in mind that if such an incident is reported, the cybercrimes branch can easily track the person who is cheating and take legal action against the persons. The distribution of obscene publishing material in electronics form is a criminal offence. Committed with the purpose to sexually exploit underage children , child pornography uses electronic media and its network to create , distribute , and access different types of obscene and indecent material .
  • 5. Sending offensive messages through online media to threaten the receiver is also a cybercrime. Such messages could include the following: 1. Information that is grossly disrespectful. 2. Consistently sending false information using various communication device with the aim of causing annoyance, inconvenience, danger, obstruction, insult, injury, enmity, or hatred. Cyber defamation takes place when : 1. Hurtful word intended to be read online are published on websites or circulated using emails to damage the reputation of an individual. 2. Hurtful signs or visible representation are circulated online with the intention to damage the reputation of an individual, group of individuals, brand, or a product.
  • 6. Pursuing or following a person online is called cyber stalking. The privacy of the individual is threatened and every move is watched. The internet and other electronic means are used to stalk or harass an individual, group, or organization. The purpose of cyber stalking may include false accusations, defamation, monitoring, identity theft , threats, or gathering information with an intention to threat or harass. Phishing is a cyber crime where people (called phishers ) use spam, fake website, crimeware, and other similar techniques to trick people into divulging sensitive information, such as bank account numbers, debit / credit card account details, passwords etc. The stolen details are then misused to use the victim’s bank account or the details are sold in the black market. Phishers often use scare tactics that threaten to disable accounts or delay important services. Phishing can be avoided by deleting fraud emails and not clicking on any suspicious link in emails. In addition, always remember to sign out from your account s when using a public computer.
  • 7. Hacking is defined as identifying weakness in computer system and / or network. The weakness are exploited to gain access to the computer system and destroy / misuse data as well as computer programs. People who follow the practice of hacking are called hackers. Computer hacking is unethical when the hackers brake into the system to peek in to the extreme details of computer applications, programs, or the whole system with the purpose to either extending its capabilities or modify its functionalities. Based on their intentions, hackers are classified into the following types: . Ethical hackers – white hat An ethical hacker access the system to fix identified weakness. They may also perform tests and exposure assessments. . Cracker – black hat A cracker gains unauthorized access to computer system for personal gains with unethical intentions, such as staling corporate data, violate privacy rights, stealing funds, etc.
  • 8. Skimming is a cyber crime where scammers steal your credit / debit card details by fitting a skimmer device to an ATM machine. The device reads and record the card details from the magnetic strip on the card, resulting in misuse an frauds. The information from the strip is ‘skimmed’ to create a fake or cloned card with the stolen details. The personal details and account numbers are used to borrow money or take loans in the victim’s name. You can protect yourself from card skimming by keeping these simple pointers In mind: . Keep all your bank detail in a safe place. Refrain from sharing your Personal Identity Number (PIN) with anyone. . Check your bank account statements. Report any suspicious or unexplained transaction to the bank.
  • 9. Referred to as the crime of the new millennium, identity theft is defined as stealing and using someone’s personal information primarily for monetary gain. Identity theft is a crime in which the imposter obtains important personal identity information, such as electronic signature, passwords, and driver’s license numbers, and uses them for their personal gains. The nature of the crime varies widely and can include credit card frauds, cheque frauds, identity theft, etc. Phishing, hacking, skimming also lead to identity theft. Viruses are malicious programs that infects other programs in computers. A virus can also make copies of itself and spread to other programs. Viruses Affects the data on a computer, either by altering or deleting it. Examples of malicious programs include worms, Trojan horse, Time bombs, Rabbit, and Bacterium. Technical awareness, common sense, using antivirus, choosing strong passwords and protecting personal information can help prevent your computer from virus attacks.
  • 10. Financial frauds are the direct result of hacking, phishing, skimming, virus attack, and Identity thefts. In such cases, the victim’s personal and confidential information is obtained to access their bank account and use their money.