SlideShare ist ein Scribd-Unternehmen logo
1 von 11
A 
PRESENTATION ON 
“CYBER CRIMES” 
21-11-2014 Guided by: Riya Malkani Ma’am
INTRODUCTION 
• Computer crime, or Cybercrime, refers to any crime that involves 
a computer and a network. The computer may have been used in the 
commission of a crime, or it may be the target. 
• Cybercrime is nothing but: "Offences that are committed against individuals or 
groups of individuals with a criminal motive to intentionally harm the reputation of 
the victim or cause physical or mental harm to the victim directly or indirectly, 
using modern telecommunication networks such as Internet". 
• Such crimes may threaten a nation’s security and financial health. Issues 
surrounding these types of crimes have become high-profile, particularly those 
surrounding cracking, copyright infringement. There are also problems 
of privacy when confidential information is lost or intercepted, lawfully or 
otherwise.
CLASSIFICATION 
Computer crime encompasses a broad range of activities: 
• Computer viruses 
• Cyber stalking 
• Information warfare 
• Malware(malicious code) 
• Identity theft 
• Phishing scams
COMPUTER VIRUSES 
• A computer virus is 
a malware program that, when 
executed, replicates by inserting 
copies of itself (possibly modified) into 
other computer programs, data files, or 
the boot sector of the hard drive; when 
this replication succeeds, the affected 
areas are then said to be "infected“ 
• Viruses often perform some type of 
harmful activity on infected hosts, such 
as stealing hard disk space 
or CPU time, accessing private 
information, corrupting data, displaying 
political messages on the user's 
screen, spamming their contacts, 
or logging their keystrokes.
CYBER STALKING 
• Cyberstalking is often accompanied by 
real-time or offline stalking. Both are 
criminal offenses. Both are motivated by 
a desire to control, intimidate or influence 
a victim. A stalker may be an online 
stranger or a person whom the target 
knows. He may be anonymous and solicit 
involvement of other people online who 
do not even know the target. 
• Cyberstalking is a criminal offense under 
various state anti-stalking, 
slander and harassment laws. A 
conviction can result in a restraining 
order, probation, or criminal penalties 
against the assailant, including jail.
INFORMATION WARFARE 
• Information warfare may involve collection of tactical 
information, assurances that one's own information is valid, 
spreading of propaganda or disinformation to demoralize or 
manipulate the enemy and the public, undermining the quality of 
opposing force information and denial of information-collection 
opportunities to opposing forces. Information warfare is closely 
linked to psychological warfare. 
- Overview 
- Information warfare can take many forms: 
• Television and radio transmissions can be jammed. 
• Television and radio transmissions can be hijacked for 
a disinformation campaign. 
• Logistics networks can be disabled. 
• Enemy communications networks can be disabled or spoofed. 
• Stock exchange transactions can be sabotaged, either with 
electronic intervention, by leaking sensitive information or by
MALWARE(MALICIOUS CODE) 
• Malware, short for malicious software, is any software 
used to disrupt computer operation, gather sensitive 
information, or gain access to private computer systems. 
It can appear in the form of executable code, scripts, 
active content, and other software. 
• 'Malware' is a general term used to refer to a variety of 
forms of hostile or intrusive software. Malware 
includes computer viruses, worms, trojan 
horses, ransomware, spyware, adware, scareware, and 
other malicious programs. 
• Spyware or other malware is sometimes found embedded 
in programs supplied officially by companies, e.g., 
downloadable from websites, that appear useful or 
attractive, but may have, for example, additional hidden 
tracking functionality that gathers marketing statistics.
IDENTITY THEFT 
• Identity theft is a form of stealing 
someone's identity in which someone pretends 
to be someone else by assuming that person's 
identity. 
• The victim of identity theft can suffer adverse 
consequences if they are held responsible for 
the perpetrator's actions. 
• Identity theft occurs when someone uses 
another's personally identifying information, 
without their permission, to commit fraud or 
other crimes.
PHISHING SCAMS 
• Phishing is the attempt to acquire sensitive 
information such as usernames, passwords, by 
masquerading as a trustworthy entity in 
an electronic communication. 
• Phishing is typically carried out by email 
spoofing or instant messaging. 
• Phishing is a continual threat that keeps growing 
to this day. The risk grows even larger in social 
media such as Facebook, Twitter, etc.
PRECAUTIONS 
• Secure your computer: Activate your firewall, Use anti-virus/malware 
software, Block spyware attacks. 
• Install the latest operating system updates: Keep your applications and 
operating system (e.g. Windows, Mac, Linux) current with the latest system 
updates. Turn on automatic updates to prevent potential attacks on older 
software. 
• Secure your wireless network: Wi-Fi (wireless) networks at home are 
vulnerable to intrusion if they are not properly secured. Avoid conducting 
financial or corporate transactions on these networks. 
• Avoid being scammed: Always think before you click on a link or file of 
unknown origin. Don’t feel pressured by any emails. Check the source of the 
message. When in doubt, verify the source. Never reply to emails that ask 
you to verify your information or confirm your user ID or password.
Thank You 


Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

Was ist angesagt? (20)

Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber
CyberCyber
Cyber
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Ähnlich wie Cyber crimes

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Hiren Selani
 

Ähnlich wie Cyber crimes (20)

Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
cyber security
cyber security cyber security
cyber security
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER FORENSIC PRESENTATION and cyber.pptx
CYBER FORENSIC PRESENTATION and cyber.pptxCYBER FORENSIC PRESENTATION and cyber.pptx
CYBER FORENSIC PRESENTATION and cyber.pptx
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

KĂźrzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

KĂźrzlich hochgeladen (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Cyber crimes

  • 1. A PRESENTATION ON “CYBER CRIMES” 21-11-2014 Guided by: Riya Malkani Ma’am
  • 2. INTRODUCTION • Computer crime, or Cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. • Cybercrime is nothing but: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet". • Such crimes may threaten a nation’s security and financial health. Issues surrounding these types of crimes have become high-profile, particularly those surrounding cracking, copyright infringement. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
  • 3. CLASSIFICATION Computer crime encompasses a broad range of activities: • Computer viruses • Cyber stalking • Information warfare • Malware(malicious code) • Identity theft • Phishing scams
  • 4. COMPUTER VIRUSES • A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected“ • Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political messages on the user's screen, spamming their contacts, or logging their keystrokes.
  • 5. CYBER STALKING • Cyberstalking is often accompanied by real-time or offline stalking. Both are criminal offenses. Both are motivated by a desire to control, intimidate or influence a victim. A stalker may be an online stranger or a person whom the target knows. He may be anonymous and solicit involvement of other people online who do not even know the target. • Cyberstalking is a criminal offense under various state anti-stalking, slander and harassment laws. A conviction can result in a restraining order, probation, or criminal penalties against the assailant, including jail.
  • 6. INFORMATION WARFARE • Information warfare may involve collection of tactical information, assurances that one's own information is valid, spreading of propaganda or disinformation to demoralize or manipulate the enemy and the public, undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces. Information warfare is closely linked to psychological warfare. - Overview - Information warfare can take many forms: • Television and radio transmissions can be jammed. • Television and radio transmissions can be hijacked for a disinformation campaign. • Logistics networks can be disabled. • Enemy communications networks can be disabled or spoofed. • Stock exchange transactions can be sabotaged, either with electronic intervention, by leaking sensitive information or by
  • 7. MALWARE(MALICIOUS CODE) • Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of executable code, scripts, active content, and other software. • 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software. Malware includes computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. • Spyware or other malware is sometimes found embedded in programs supplied officially by companies, e.g., downloadable from websites, that appear useful or attractive, but may have, for example, additional hidden tracking functionality that gathers marketing statistics.
  • 8. IDENTITY THEFT • Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity. • The victim of identity theft can suffer adverse consequences if they are held responsible for the perpetrator's actions. • Identity theft occurs when someone uses another's personally identifying information, without their permission, to commit fraud or other crimes.
  • 9. PHISHING SCAMS • Phishing is the attempt to acquire sensitive information such as usernames, passwords, by masquerading as a trustworthy entity in an electronic communication. • Phishing is typically carried out by email spoofing or instant messaging. • Phishing is a continual threat that keeps growing to this day. The risk grows even larger in social media such as Facebook, Twitter, etc.
  • 10. PRECAUTIONS • Secure your computer: Activate your firewall, Use anti-virus/malware software, Block spyware attacks. • Install the latest operating system updates: Keep your applications and operating system (e.g. Windows, Mac, Linux) current with the latest system updates. Turn on automatic updates to prevent potential attacks on older software. • Secure your wireless network: Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not properly secured. Avoid conducting financial or corporate transactions on these networks. • Avoid being scammed: Always think before you click on a link or file of unknown origin. Don’t feel pressured by any emails. Check the source of the message. When in doubt, verify the source. Never reply to emails that ask you to verify your information or confirm your user ID or password.