SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Presented By:-
Ramesh Upadhaya
MCA 4th SEM
CIME,BBSR
CONTENTS
 Introduction.
 Definition.
 History & Evolution.
 Categories of cyber crime.
 Types of cyber crime.
 Prevention.
 Conclusion.
 References.
INTRODUCTION
o The Internet in India is growing rapidly. It
has given rise to new opportunities in every
field we can think of like entertainment,
business, sports & education.
o There’re two sides to a coin. Internet also
has it’s own disadvantage,
i.e. Cyber crime
What is CYBER CRIME ?
 Cybercrime, refers to any crime that involves
a computer and a network(Internet).
 Data Theft.
 Malicious programs.
HISTORY & EVOLUTION
The first recorded cyber crime took place
in the year 1820.
Virus (1977)
Breaking Websites (1995)
Malicious Code (2000)
Advanced Worm (Trojan) (2003-04)
Identity Theft (Phishing) (2005-06 )
CATEGORIZATION OF CYBER CRIME
Cyber Crime Against Individual
Email-spoofing, spamming, Phishing etc.
Cyber Crime Against Property
Credit card fraud, internet time theft etc.
Cyber Crime Against Organization
Denial of service, Virus attack etc.
Cyber Crime Against Society
Forgery, terrorism, web jacking etc.
TYPES OF CYBER CRIME
Hacking
Virus Dissemination
Denial of Service
Computer Vandalism
Cyber Terrorism
Software Piracy
HACKING
Hacking in simple terms means an
illegal intrusion into a computer
system or network.
VIRUS DISSEMINATION
Malicious software that attaches itself
to other software. (spywares,worms,
Trojan Horse, Time bomb, Logic Bomb
etc.)
DENIAL OF SERVICE ATTACK
In this Type of attack ,
Internet server is flooded
with continuous requests so
as to crash the server.
Its an attempt to make a machine or network
resource unavailable to its intended users
COMPUTER VANDALISM
Damaging or destroying data rather
than stealing or misusing them is called
Computer Vandalism.
E.g. Transmitting Virus To destroy
system files.
CYBER TERRORISM
Use of Internet based attacks
in terrorist activities.
Technology savvy terrorists are using 512-
bit encryption, which is likely impossible to
decrypt.
SOFTWARE PIRACY
 Theft of software through the illegal copying of
genuine programs.
 Distribution of products intended to pass for
the original.
TYPES OF CYBER ATTACK BY PERCENTAGE
• Financial fraud: 11%
• Sabotage of data/networks: 17%
• Theft of proprietary information: 20%
• System penetration from the outside: 25%
• Denial of service: 27%
• Unauthorized access by insiders: 71%
• Employee abuse of internet privileges 79%
• Viruses 85%
SAFETY TIPS FOR CYBER CRIME
 Use antivirus software’s.
 Insert firewalls.
 Uninstall unnecessary software
 Maintain backup.
 Check security settings.
 Stay anonymous - choose a genderless screen name.
 Never give your full name or address to strangers.
 Learn more about Internet privacy.
CONCLUSION
Technology is destructive only in the hands of
people who do not know or care about the
outcomes .
References
 Google
 Wikipedia
 www.cybercellmumbai.com
 www.Interpol.int
 www.webopedia.com
Any Questions ?
Cyber Crime

Weitere ähnliche Inhalte

Was ist angesagt?

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

Was ist angesagt? (20)

It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Ähnlich wie Cyber Crime

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
Arshad Khan
 
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptxcybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
RahulDhanware2
 

Ähnlich wie Cyber Crime (20)

Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdfcybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber security        Cyber security
Cyber security
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptxcybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Cyber Crime

  • 2. CONTENTS  Introduction.  Definition.  History & Evolution.  Categories of cyber crime.  Types of cyber crime.  Prevention.  Conclusion.  References.
  • 3. INTRODUCTION o The Internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of like entertainment, business, sports & education. o There’re two sides to a coin. Internet also has it’s own disadvantage, i.e. Cyber crime
  • 4. What is CYBER CRIME ?  Cybercrime, refers to any crime that involves a computer and a network(Internet).  Data Theft.  Malicious programs.
  • 5. HISTORY & EVOLUTION The first recorded cyber crime took place in the year 1820. Virus (1977) Breaking Websites (1995) Malicious Code (2000) Advanced Worm (Trojan) (2003-04) Identity Theft (Phishing) (2005-06 )
  • 6. CATEGORIZATION OF CYBER CRIME Cyber Crime Against Individual Email-spoofing, spamming, Phishing etc. Cyber Crime Against Property Credit card fraud, internet time theft etc. Cyber Crime Against Organization Denial of service, Virus attack etc. Cyber Crime Against Society Forgery, terrorism, web jacking etc.
  • 7. TYPES OF CYBER CRIME Hacking Virus Dissemination Denial of Service Computer Vandalism Cyber Terrorism Software Piracy
  • 8. HACKING Hacking in simple terms means an illegal intrusion into a computer system or network.
  • 9. VIRUS DISSEMINATION Malicious software that attaches itself to other software. (spywares,worms, Trojan Horse, Time bomb, Logic Bomb etc.)
  • 10. DENIAL OF SERVICE ATTACK In this Type of attack , Internet server is flooded with continuous requests so as to crash the server. Its an attempt to make a machine or network resource unavailable to its intended users
  • 11. COMPUTER VANDALISM Damaging or destroying data rather than stealing or misusing them is called Computer Vandalism. E.g. Transmitting Virus To destroy system files.
  • 12. CYBER TERRORISM Use of Internet based attacks in terrorist activities. Technology savvy terrorists are using 512- bit encryption, which is likely impossible to decrypt.
  • 13. SOFTWARE PIRACY  Theft of software through the illegal copying of genuine programs.  Distribution of products intended to pass for the original.
  • 14. TYPES OF CYBER ATTACK BY PERCENTAGE • Financial fraud: 11% • Sabotage of data/networks: 17% • Theft of proprietary information: 20% • System penetration from the outside: 25% • Denial of service: 27% • Unauthorized access by insiders: 71% • Employee abuse of internet privileges 79% • Viruses 85%
  • 15. SAFETY TIPS FOR CYBER CRIME  Use antivirus software’s.  Insert firewalls.  Uninstall unnecessary software  Maintain backup.  Check security settings.  Stay anonymous - choose a genderless screen name.  Never give your full name or address to strangers.  Learn more about Internet privacy.
  • 16. CONCLUSION Technology is destructive only in the hands of people who do not know or care about the outcomes .
  • 17. References  Google  Wikipedia  www.cybercellmumbai.com  www.Interpol.int  www.webopedia.com