SlideShare ist ein Scribd-Unternehmen logo
1 von 14
 Introduction
 History
 Types of cyber crime
 Causes
 Types of criminals
 Cyber laws
 Tips to prevent
 Cyber security
 Advantages of cyber security
 Conclusion
 Cyber crime committed using a computer
and the internet to steal a person’s identity
or illegal imports or malicious programs
.cyber crime is nothing but where the
computer used as an object or subject of
crime.
 Fraud and financial crimes
 Cyber terrorism
 Hacking
 Computer as a target
 Spamming
 Obscene or offensive content
 Harassment
 Child pornography
 Confidential Information is online
 Personally Motivated Cyber Crime
 Desire of Making quick money
 Passion of youngsters
 Negligence
 Complexity in understanding
 New Form of Crime
 Accessibility to Victims
 Lack of Evidence
 Drawbacks in judiciary system
 Children and youngsters between the age
group of 6 – 18 years
 Expert hackers / crackers
 Structured hackers
 Dissatisfied employees
 There are some provisions in the ICT Act,
2006 which mention penalties for various
cyberspace related crimes. For instance,
section 54 (1) of this Act declares the
offences concerning cyberspace. Then,
section-54(2) says, “If any person commits
offences under sub-section (1) of this
section, he shall be punishable with
imprisonment for a term which may extend
to ten years, or with fine which may extend
to taka ten lakhs, or with both”.
 Secure mobile devices
 Protect your Data
 Be aware of what you do while using
public Wi-Fi Hotspots
 Protect your e-identity
 Avoid being scammed
 Constantly update passwords and login
details
 A secure computer will deter cyber
criminals
 Computer security, also known as cyber
security or IT security, is the protection of
information systems from theft or damage to
the hardware, the software, and to the
information on them, as well as from
disruption or misdirection of the services
they provide.
 It includes controlling physical access to the
hardware, as well as protecting against harm
that may come via network access.
 Protects system against viruses, worms and
other unwanted programs
 Protection against data from theft
 Protects the computer from being hacked
 It helps us to browse the site and website
 It will defend us from hacks and virus
 Gives privacy to users
The key to protecting yourself is being aware
Not all cybercriminals are hackers
There is a whole other world that exists in
cyberspace…make sure that your information
travels safely
Stay secure , stay safe
Cyber crime

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 

Was ist angesagt? (20)

Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ppt
PptPpt
Ppt
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Andere mochten auch

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
vinyas87
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 

Andere mochten auch (20)

Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Crime : Incident Highlights of 2011-2012
Cyber Crime : Incident Highlights of 2011-2012Cyber Crime : Incident Highlights of 2011-2012
Cyber Crime : Incident Highlights of 2011-2012
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
DEA
DEADEA
DEA
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Credit Card Frauds
Credit Card FraudsCredit Card Frauds
Credit Card Frauds
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
cyber crime
cyber crimecyber crime
cyber crime
 

Ähnlich wie Cyber crime

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
Priya Saluja
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
Mahmudul hasan
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
hm5314581
 

Ähnlich wie Cyber crime (20)

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 

Mehr von Grant Thornton Bangladesh

Mehr von Grant Thornton Bangladesh (20)

Technical & Fundamental Analysis of USD/BDT
Technical & Fundamental Analysis of USD/BDTTechnical & Fundamental Analysis of USD/BDT
Technical & Fundamental Analysis of USD/BDT
 
Report of Banking Company
Report of Banking CompanyReport of Banking Company
Report of Banking Company
 
Analysis of IFIC, South-East, BRAC, EBL, DBBL Company
Analysis of IFIC, South-East, BRAC, EBL, DBBL CompanyAnalysis of IFIC, South-East, BRAC, EBL, DBBL Company
Analysis of IFIC, South-East, BRAC, EBL, DBBL Company
 
Ratio Analysis
Ratio AnalysisRatio Analysis
Ratio Analysis
 
Louis Vuitton
Louis VuittonLouis Vuitton
Louis Vuitton
 
Horizontal Communication
Horizontal CommunicationHorizontal Communication
Horizontal Communication
 
Human Resource Management
Human Resource ManagementHuman Resource Management
Human Resource Management
 
Fundamental & Technicla analysis of Lankabangla
Fundamental & Technicla analysis of LankabanglaFundamental & Technicla analysis of Lankabangla
Fundamental & Technicla analysis of Lankabangla
 
Insurance
Insurance Insurance
Insurance
 
Fundamental and Technical Analysis of City Bank
Fundamental and Technical Analysis of City BankFundamental and Technical Analysis of City Bank
Fundamental and Technical Analysis of City Bank
 
Agricultural revolution. 1ppt
Agricultural revolution. 1pptAgricultural revolution. 1ppt
Agricultural revolution. 1ppt
 
Financial accounting
Financial accountingFinancial accounting
Financial accounting
 
Management
ManagementManagement
Management
 
Financial accounting
Financial accountingFinancial accounting
Financial accounting
 
Bussiness plan (mrinmoy)
Bussiness plan (mrinmoy)Bussiness plan (mrinmoy)
Bussiness plan (mrinmoy)
 
Louis vuitton
Louis vuittonLouis vuitton
Louis vuitton
 
Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
principle of management
principle of managementprinciple of management
principle of management
 
Spring 16 introduction to business lecture 2
Spring 16 introduction to business lecture 2Spring 16 introduction to business lecture 2
Spring 16 introduction to business lecture 2
 

Kürzlich hochgeladen

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Cyber crime

  • 1.
  • 2.  Introduction  History  Types of cyber crime  Causes  Types of criminals  Cyber laws  Tips to prevent  Cyber security  Advantages of cyber security  Conclusion
  • 3.  Cyber crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs .cyber crime is nothing but where the computer used as an object or subject of crime.
  • 4.
  • 5.  Fraud and financial crimes  Cyber terrorism  Hacking  Computer as a target  Spamming  Obscene or offensive content  Harassment  Child pornography
  • 6.  Confidential Information is online  Personally Motivated Cyber Crime  Desire of Making quick money  Passion of youngsters  Negligence  Complexity in understanding  New Form of Crime  Accessibility to Victims  Lack of Evidence  Drawbacks in judiciary system
  • 7.  Children and youngsters between the age group of 6 – 18 years  Expert hackers / crackers  Structured hackers  Dissatisfied employees
  • 8.
  • 9.  There are some provisions in the ICT Act, 2006 which mention penalties for various cyberspace related crimes. For instance, section 54 (1) of this Act declares the offences concerning cyberspace. Then, section-54(2) says, “If any person commits offences under sub-section (1) of this section, he shall be punishable with imprisonment for a term which may extend to ten years, or with fine which may extend to taka ten lakhs, or with both”.
  • 10.  Secure mobile devices  Protect your Data  Be aware of what you do while using public Wi-Fi Hotspots  Protect your e-identity  Avoid being scammed  Constantly update passwords and login details  A secure computer will deter cyber criminals
  • 11.  Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.  It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access.
  • 12.  Protects system against viruses, worms and other unwanted programs  Protection against data from theft  Protects the computer from being hacked  It helps us to browse the site and website  It will defend us from hacks and virus  Gives privacy to users
  • 13. The key to protecting yourself is being aware Not all cybercriminals are hackers There is a whole other world that exists in cyberspace…make sure that your information travels safely Stay secure , stay safe