SlideShare ist ein Scribd-Unternehmen logo
1 von 18
 Cyber Crime Akash Dolas
“The infectiousness of crime is like that of the plague”.                             Napoleon Bonaparte
 Agenda ,[object Object]
What is cyber crime?
History.
  Profile of cyber criminal.
Victims.
  General Reasons for cyber crime.
Computer crimes are vulnerable.
  Types of cyber crime.
Impact.
  Uncovering Digital Evidence.
  Countries where cyber crime happens.
  Life Cycle of cyber attack.
 How to prevent them.
Data
 Future,[object Object]
What is cyber crime ? “All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system “.

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Andere mochten auch

Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Physical fitness components
Physical fitness componentsPhysical fitness components
Physical fitness componentsmizrach
 
Computers as the Third Revolution In Education, Computer as Information and C...
Computers as the Third Revolution In Education, Computer as Information and C...Computers as the Third Revolution In Education, Computer as Information and C...
Computers as the Third Revolution In Education, Computer as Information and C...Jonathan Padilla
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber AttacksVenafi
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
Top 10 internet uses in teaching and learning
Top 10 internet uses in teaching and learningTop 10 internet uses in teaching and learning
Top 10 internet uses in teaching and learningdjames73583
 

Andere mochten auch (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hackers
HackersHackers
Hackers
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
hacker
hackerhacker
hacker
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Physical fitness components
Physical fitness componentsPhysical fitness components
Physical fitness components
 
"One MIL a Day Keeps the (IL) Literate Away"
"One MIL a Day Keeps the (IL) Literate Away""One MIL a Day Keeps the (IL) Literate Away"
"One MIL a Day Keeps the (IL) Literate Away"
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computers as the Third Revolution In Education, Computer as Information and C...
Computers as the Third Revolution In Education, Computer as Information and C...Computers as the Third Revolution In Education, Computer as Information and C...
Computers as the Third Revolution In Education, Computer as Information and C...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Top 10 internet uses in teaching and learning
Top 10 internet uses in teaching and learningTop 10 internet uses in teaching and learning
Top 10 internet uses in teaching and learning
 

Ähnlich wie Cyber Crime (20)

cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
cyber crime
 cyber crime cyber crime
cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Cyber Crime