SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
CYBER CRIME
D BY:
NKUSH SALOURIA
S/SL/14/1012
SUBMITTED TO:
Lect. ASHISH GIRDHAR
DEFINITION
 Harmful acts committed from or
against a computer or network.
 Unlawful acts wherein the
computer is either a tool or target
or both
 Online or Internet-based illegal
acts
TYPES OF CYBER CRIME
 HACKING
 VIRUS ATTACKS
 CYBER THEFT
 SOFTWARE PIRACY
 E-MAIL BOMBS
 CYBER TERRORISM
 PASSWORD TRAFFICKING
 IDENTITY THEFT
 PHISHING
 CREDIT CARD FRAUD
 Hacking is commonly referred as unauthorized access to
computer systems or network without the permission of
the computer owner/user
 Hackers write or use ready-made computer programs to
attack the target computer
 Computer hacking includes breaking into a computer with
the intent to steal, damage or modify the data within the
system.
VIRUS ATTACKS
 Malicious software that attaches itself to other software
 Circulate themselves to other files and to other computers on
a network
 Affect the data on a computer, either by altering or deleting it
CYBER
THEFT In such crime criminal makes
insignificant changes in such a
manner that such changes
would go unnoticed
 Criminals makes such program
that deducts small amount like
Rs. 2.50 per month from the
account of all the customer of
the bank and deposit the same
in his account. In this case no
account holder will approach
the bank for such small amount
but criminal gains huge amount
SOFTWARE PIRACY
 Theft of software through the illegal copying of genuine
programs and distribution of products intended to pass for the
original
 Copying and using computer programs in violation of
copyrights and trade secret laws
 Retail revenue losses worldwide are ever increasing due to this
crime
E-MAIL BOMBS
 It refers to sending large numbers of mail to the victim, which
may be an individual or a company by ultimately resulting into
crashing.
 E-mail "bombing" is characterized by abusers repeatedly
sending an identical email message to a particular address
CYBER TERRORISM
 It is the actual use of computers
and Internet technology to cause
intimidation and destruction
 Uses the Internet or network to
destroy computers for political
reasons
 Cyber terrorist could hack into a
pharmaceutical company’s
computers, changing the formula
of some essential medication
and causing thousands to die.
PASSWORD TRAFFICKING
 Misuse of other people’s passwords.
 Break a company’s password and misuse the password or sale
that password to another company or an individual.
IDENTITY THEFT
 Identity theft occurs when
somebody steals a personal name
and other personal information for
fraudulent purposes
 Identity theft is a form of identity
crime where somebody uses a
false identity to commit a crime
 It involves stealing victims’
personal information and
credentials, often to make
purchases
Phishing involves fraudulently
acquiring sensitive information
(e.g. passwords, credit card
details etc.) by masquerading
as a trusted entity.
CREDIT CARD FRAUD
 If electronic transaction are not secured the credit
card numbers can be stolen by the hackers who can
misuse this card by impersonating the credit card
owner.
Safety Tips to Cyber Crime
 Use antivirus software’s.
 Insert firewalls.
 Maintain backup.
 Check security settings.
 Never give your full name or e-mail address to strangers.
 Don't respond to harassing or negative messages (flames).
 Get out of uncomfortable or hostile situations quickly .
 Save offending messages.
 Learn more about Internet privacy.
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Cyber crime
Cyber crimeCyber crime
Cyber crimedixitas
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & SecurityAnchit Rajawat
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet vimal kumar arora
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityHome
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 

Was ist angesagt? (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 

Andere mochten auch

Software piracy
Software piracySoftware piracy
Software piracyTi-Sun
 
Cybercrime bullying report
Cybercrime bullying reportCybercrime bullying report
Cybercrime bullying reportJonald Urcz
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Ethics, Part 1
Ethics, Part 1Ethics, Part 1
Ethics, Part 1ARH_Miller
 
Computer worm
Computer wormComputer worm
Computer wormzelkan19
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and usechrispaul8676
 
Software Piracy
Software PiracySoftware Piracy
Software PiracyByerdavi
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy PowerpointMbradber
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 

Andere mochten auch (20)

Software piracy
Software piracySoftware piracy
Software piracy
 
Cybercrime bullying report
Cybercrime bullying reportCybercrime bullying report
Cybercrime bullying report
 
Cyber theft !!!
Cyber theft !!!Cyber theft !!!
Cyber theft !!!
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Piracy
PiracyPiracy
Piracy
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Ethics, Part 1
Ethics, Part 1Ethics, Part 1
Ethics, Part 1
 
Human Trafficking
Human TraffickingHuman Trafficking
Human Trafficking
 
Computer worm
Computer wormComputer worm
Computer worm
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Dc machines
Dc machinesDc machines
Dc machines
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Et lab
Et labEt lab
Et lab
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 

Ähnlich wie Cyber Crime

Ähnlich wie Cyber Crime (20)

Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Various cyber crime
Various cyber crimeVarious cyber crime
Various cyber crime
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
E-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptxE-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptx
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 

Kürzlich hochgeladen

Modelling Guide for Timber Structures - FPInnovations
Modelling Guide for Timber Structures - FPInnovationsModelling Guide for Timber Structures - FPInnovations
Modelling Guide for Timber Structures - FPInnovationsYusuf Yıldız
 
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Amil baba
 
Nodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptxNodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptxwendy cai
 
Dev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingDev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingMarian Marinov
 
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...Amil baba
 
Power System electrical and electronics .pptx
Power System electrical and electronics .pptxPower System electrical and electronics .pptx
Power System electrical and electronics .pptxMUKULKUMAR210
 
UNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptxUNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptxrealme6igamerr
 
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS Bahzad5
 
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...amrabdallah9
 
Clutches and brkesSelect any 3 position random motion out of real world and d...
Clutches and brkesSelect any 3 position random motion out of real world and d...Clutches and brkesSelect any 3 position random motion out of real world and d...
Clutches and brkesSelect any 3 position random motion out of real world and d...sahb78428
 
Phase noise transfer functions.pptx
Phase noise transfer      functions.pptxPhase noise transfer      functions.pptx
Phase noise transfer functions.pptxSaiGouthamSunkara
 
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdfsdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdfJulia Kaye
 
Basic Principle of Electrochemical Sensor
Basic Principle of  Electrochemical SensorBasic Principle of  Electrochemical Sensor
Basic Principle of Electrochemical SensorTanvir Moin
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabusViolet Violet
 
Design of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptxDesign of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptxYogeshKumarKJMIT
 
Graphics Primitives and CG Display Devices
Graphics Primitives and CG Display DevicesGraphics Primitives and CG Display Devices
Graphics Primitives and CG Display DevicesDIPIKA83
 
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...Sean Meyn
 

Kürzlich hochgeladen (20)

Modelling Guide for Timber Structures - FPInnovations
Modelling Guide for Timber Structures - FPInnovationsModelling Guide for Timber Structures - FPInnovations
Modelling Guide for Timber Structures - FPInnovations
 
Lecture 2 .pdf
Lecture 2                           .pdfLecture 2                           .pdf
Lecture 2 .pdf
 
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
 
Nodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptxNodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptx
 
Dev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingDev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & Logging
 
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...
Best-NO1 Best Rohani Amil In Lahore Kala Ilam In Lahore Kala Jadu Amil In Lah...
 
Présentation IIRB 2024 Chloe Dufrane.pdf
Présentation IIRB 2024 Chloe Dufrane.pdfPrésentation IIRB 2024 Chloe Dufrane.pdf
Présentation IIRB 2024 Chloe Dufrane.pdf
 
Power System electrical and electronics .pptx
Power System electrical and electronics .pptxPower System electrical and electronics .pptx
Power System electrical and electronics .pptx
 
UNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptxUNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptx
 
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
 
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
 
Clutches and brkesSelect any 3 position random motion out of real world and d...
Clutches and brkesSelect any 3 position random motion out of real world and d...Clutches and brkesSelect any 3 position random motion out of real world and d...
Clutches and brkesSelect any 3 position random motion out of real world and d...
 
Lecture 2 .pptx
Lecture 2                            .pptxLecture 2                            .pptx
Lecture 2 .pptx
 
Phase noise transfer functions.pptx
Phase noise transfer      functions.pptxPhase noise transfer      functions.pptx
Phase noise transfer functions.pptx
 
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdfsdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
 
Basic Principle of Electrochemical Sensor
Basic Principle of  Electrochemical SensorBasic Principle of  Electrochemical Sensor
Basic Principle of Electrochemical Sensor
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
Design of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptxDesign of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptx
 
Graphics Primitives and CG Display Devices
Graphics Primitives and CG Display DevicesGraphics Primitives and CG Display Devices
Graphics Primitives and CG Display Devices
 
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
 

Cyber Crime

  • 1. CYBER CRIME D BY: NKUSH SALOURIA S/SL/14/1012 SUBMITTED TO: Lect. ASHISH GIRDHAR
  • 2. DEFINITION  Harmful acts committed from or against a computer or network.  Unlawful acts wherein the computer is either a tool or target or both  Online or Internet-based illegal acts
  • 3. TYPES OF CYBER CRIME  HACKING  VIRUS ATTACKS  CYBER THEFT  SOFTWARE PIRACY  E-MAIL BOMBS  CYBER TERRORISM  PASSWORD TRAFFICKING  IDENTITY THEFT  PHISHING  CREDIT CARD FRAUD
  • 4.  Hacking is commonly referred as unauthorized access to computer systems or network without the permission of the computer owner/user  Hackers write or use ready-made computer programs to attack the target computer  Computer hacking includes breaking into a computer with the intent to steal, damage or modify the data within the system.
  • 5. VIRUS ATTACKS  Malicious software that attaches itself to other software  Circulate themselves to other files and to other computers on a network  Affect the data on a computer, either by altering or deleting it
  • 6. CYBER THEFT In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed  Criminals makes such program that deducts small amount like Rs. 2.50 per month from the account of all the customer of the bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount
  • 7. SOFTWARE PIRACY  Theft of software through the illegal copying of genuine programs and distribution of products intended to pass for the original  Copying and using computer programs in violation of copyrights and trade secret laws  Retail revenue losses worldwide are ever increasing due to this crime
  • 8. E-MAIL BOMBS  It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing.  E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address
  • 9. CYBER TERRORISM  It is the actual use of computers and Internet technology to cause intimidation and destruction  Uses the Internet or network to destroy computers for political reasons  Cyber terrorist could hack into a pharmaceutical company’s computers, changing the formula of some essential medication and causing thousands to die.
  • 10. PASSWORD TRAFFICKING  Misuse of other people’s passwords.  Break a company’s password and misuse the password or sale that password to another company or an individual.
  • 11. IDENTITY THEFT  Identity theft occurs when somebody steals a personal name and other personal information for fraudulent purposes  Identity theft is a form of identity crime where somebody uses a false identity to commit a crime  It involves stealing victims’ personal information and credentials, often to make purchases
  • 12. Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details etc.) by masquerading as a trusted entity.
  • 13. CREDIT CARD FRAUD  If electronic transaction are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
  • 14. Safety Tips to Cyber Crime  Use antivirus software’s.  Insert firewalls.  Maintain backup.  Check security settings.  Never give your full name or e-mail address to strangers.  Don't respond to harassing or negative messages (flames).  Get out of uncomfortable or hostile situations quickly .  Save offending messages.  Learn more about Internet privacy.