SlideShare ist ein Scribd-Unternehmen logo
1 von 14
DHRU
SHAH
 When Internet was developed, the founding
fathers of Internet hardly had any inclination that
Internet could also be misused for criminal
activities. Today, there are many disturbing things
happening in cyberspace. Cybercrime refers to all
the activities done with criminal intent in cyberspace.
 Cyber crime refers to any crime that involves
a computer/mobile and a network.The
computer may have been used in the
commission of a crime, or it may be the
target.
Technical Definition of CYBER-CRIME
WHAT IS CYBER-CRIME? SIMPLE THEORY-
 When you purchase a home it comes
with
a door and a lock.You always ensure that
the door/lock exist and working properly.
You may even purchase security systems.
 Well, why would you not secure your
investments?
 Likewise,Your System is your home and
security tools are your door/lock and
security tools.
 So if someone breaches into your
home’s(System), accesses all your
personal
accounts and tampers your data, is the
criminal who is committing the crime.
 And committed crime is known as
cybercrime.
 That means more precisely we can
say that-
 Cyber crime is an illegal activity
committed on the internet.
Various categories of Cyber-Crime.
Cyber Crime may be
basically divided into
3 categories
1.Against Persons. 1.Against Property
1.Against
Government
 Cybercrimes committed against persons include
various crimes like transmission of child pornography,
harassment of any one with the
use of a computer such as e-mail, and cyberstalking.
 The distribution, posting, and dissemination of
obscene material including pornography,
indecent exposure, and child pornography,
constitutes one of the most important
Cybercrimes known today.The potential harm of
such a crime to humanity can hardly be
overstated.
Against Person:
The second category of Cybercrimes
is that of Cybercrimes against all
forms of property.These crimes
include
unauthorized computer trespassing
through cyberspace, computer
vandalism, transmission of harmful
programs, and unauthorized
possession of computerized
information.
Against Property:
The third category of Cybercrimes relate to
Cybercrimes against Government. Cyber
Terrorism is one distinct kind of crime in this
category.The growth of Internet has shown
that the medium of Cyberspace is being
used
by individuals and groups to the
international
governments as also to threaten the citizens
of a country.This crime manifests itself into
terrorism when an individual "cracks“ into a
government or military maintained website.
Against Government:
TYPES OF CYBER-CRIME:
a.Hacking.
b.Theft.
c.Trojan horses.
d.Cyber Stalking.
e.Malicious Software.
f. Child soliciting and Abuse.
And Many More.
• The majority of cybercrimes are
centered on forgery, fraud and
Phishing.
• India is the third-most targeted country
for Phishing attacks after the US and
the UK.
• Social networks as well as ecommerce
sites are
major targets.
• 6.9 million bot-infected systems in
2017,
14,348 website defacements in 2016,
6,850 .in and 4,150 .com domains were
defaced
during 2016.
Cyber-Crimes and their History:
Cyber Laws
Cyber law (also referred to as cyberlaw) is a
term used to describe the legal issues related
to use of communications technology,
particularly "cyberspace", i.e. the Internet. It
is less a distinct field of law in the way that
property or contract are as it is an intersection
of many legal fields, including intellectual
property, privacy, freedom of expression, and
jurisdiction. In essence, cyber law is an
attempt to integrate the challenges presented
by human activity on the Internet with legacy
system of laws applicable to the physical
world.
• Awareness is the first step in protecting
yourself, your family and your business.
• Invest in Anti-virus, Firewall, and SPAM
blocking software for your PC.
• Detect secure websites when conducting
transactions online.
• Do NOT respond or act on emails sent
from unknown sources.
How to Tackle Such Activities?
• The key to protecting yourself is being
aware.
• Not all cybercriminals are “hackers.”
• There is a whole other world that exists in
cyberspace… make sure that your
information travels safely.
• Stay Secure, Stay
Cybercrime

Weitere ähnliche Inhalte

Was ist angesagt?

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
Kudakwashe Shamu
 

Was ist angesagt? (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crime
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Computer crime
 Computer crime Computer crime
Computer crime
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Ähnlich wie Cybercrime

cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
Kira Dess
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
sainnrg
 

Ähnlich wie Cybercrime (20)

Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 

Kürzlich hochgeladen

No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 

Kürzlich hochgeladen (20)

Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 

Cybercrime

  • 2.
  • 3.  When Internet was developed, the founding fathers of Internet hardly had any inclination that Internet could also be misused for criminal activities. Today, there are many disturbing things happening in cyberspace. Cybercrime refers to all the activities done with criminal intent in cyberspace.  Cyber crime refers to any crime that involves a computer/mobile and a network.The computer may have been used in the commission of a crime, or it may be the target. Technical Definition of CYBER-CRIME
  • 4. WHAT IS CYBER-CRIME? SIMPLE THEORY-  When you purchase a home it comes with a door and a lock.You always ensure that the door/lock exist and working properly. You may even purchase security systems.  Well, why would you not secure your investments?  Likewise,Your System is your home and security tools are your door/lock and security tools.  So if someone breaches into your home’s(System), accesses all your personal accounts and tampers your data, is the criminal who is committing the crime.  And committed crime is known as cybercrime.  That means more precisely we can say that-  Cyber crime is an illegal activity committed on the internet.
  • 5. Various categories of Cyber-Crime. Cyber Crime may be basically divided into 3 categories 1.Against Persons. 1.Against Property 1.Against Government
  • 6.  Cybercrimes committed against persons include various crimes like transmission of child pornography, harassment of any one with the use of a computer such as e-mail, and cyberstalking.  The distribution, posting, and dissemination of obscene material including pornography, indecent exposure, and child pornography, constitutes one of the most important Cybercrimes known today.The potential harm of such a crime to humanity can hardly be overstated. Against Person:
  • 7. The second category of Cybercrimes is that of Cybercrimes against all forms of property.These crimes include unauthorized computer trespassing through cyberspace, computer vandalism, transmission of harmful programs, and unauthorized possession of computerized information. Against Property:
  • 8. The third category of Cybercrimes relate to Cybercrimes against Government. Cyber Terrorism is one distinct kind of crime in this category.The growth of Internet has shown that the medium of Cyberspace is being used by individuals and groups to the international governments as also to threaten the citizens of a country.This crime manifests itself into terrorism when an individual "cracks“ into a government or military maintained website. Against Government:
  • 9. TYPES OF CYBER-CRIME: a.Hacking. b.Theft. c.Trojan horses. d.Cyber Stalking. e.Malicious Software. f. Child soliciting and Abuse. And Many More.
  • 10. • The majority of cybercrimes are centered on forgery, fraud and Phishing. • India is the third-most targeted country for Phishing attacks after the US and the UK. • Social networks as well as ecommerce sites are major targets. • 6.9 million bot-infected systems in 2017, 14,348 website defacements in 2016, 6,850 .in and 4,150 .com domains were defaced during 2016. Cyber-Crimes and their History:
  • 11. Cyber Laws Cyber law (also referred to as cyberlaw) is a term used to describe the legal issues related to use of communications technology, particularly "cyberspace", i.e. the Internet. It is less a distinct field of law in the way that property or contract are as it is an intersection of many legal fields, including intellectual property, privacy, freedom of expression, and jurisdiction. In essence, cyber law is an attempt to integrate the challenges presented by human activity on the Internet with legacy system of laws applicable to the physical world.
  • 12. • Awareness is the first step in protecting yourself, your family and your business. • Invest in Anti-virus, Firewall, and SPAM blocking software for your PC. • Detect secure websites when conducting transactions online. • Do NOT respond or act on emails sent from unknown sources. How to Tackle Such Activities?
  • 13. • The key to protecting yourself is being aware. • Not all cybercriminals are “hackers.” • There is a whole other world that exists in cyberspace… make sure that your information travels safely. • Stay Secure, Stay