2. Name of group members areâŚ
Mayur Sharma.
Manoj Sharma.
Jay Visavadiya.
Jigar Chauhan.
MBA 3rd SEM H.R.M
Project mentor: - Urvee Madam
3. The presentation is presented at
&
Topic of presentation.
TYPES OF CYBER CRIME
4. Why learn about CYBER CRIME ?
Because â
â Everybody is using COMPUTERS..
â From white collar criminals to terrorist organizations
And from Teenagers to Adults.
â Conventional crimes like
Forgery, extortions, kidnapping etc.. are being
committed with the help off computers
â New generation is growing up with computers.
â MOST IMPORTANT - Monetary transactions are moving
on to the INTERNET.
5. WHAT IS CYBER CRIME?
All crimes performed or resorted to by abuse of
electronic media or otherwise, with the purpose
of influencing the functioning of computer or
computer system.
IN SHORT
⢠COMPUTER CRIME is any crime where â
â Computer is a target.
â Computer is a tool of crime
â Computer is incidental to crime
6. PROFILE OF CYBER CRIME VICTIMS
⢠Disgruntled employees.. ⢠Gullible
⢠Teenagers.. ⢠Desperados and greedy
⢠Professional Hackers.. people
⢠Business Rival.. ⢠Unskilled & Inexperienced
⢠Ex-Boy Friend.. ⢠Unlucky people
⢠Divorced Husband.. etc
7. TYPES OF CYBER CRIME
NOTE: - This is not exhaustive list of cyber crime
1. HACKING 8. NET EXTORTION
2. DENIAL OF SERVICE 9. PHISHING
ATTACK 10.SPOOFING
3. VIRUS DISSEMINATION 11.CYBER STALKING
4. SOFTWARE PIRACY 12.CYBER DEFAMATION
5. PORNOGRAPHY 13.THREATENING
6. IRC Crime 14.SALAMI ATTACK
7. CREDIT CARD FRAUD 15.SALE OF NARCOTICS
8. 1. HACKING
Hacking in simple terms means illegal intrusion
into a computer system without the permission
of the computer owner/user.
9. 2. DENIAL OF SERVICE ATTACK 3. VIRUS DISSEMINATION
⢠This is an act by the ⢠Malicious software
criminal, who floods that attaches itself to
the bandwidth of the other software.
victimâs network or (virus, worms, Trojan
fill's his e-mail box Horse, Time
with spam mail bomb, Logic
depriving him of the Bomb, Rabbit and
services he is entitled Bacterium are the
to access or provide. malicious
software's).
10. 4. SOFTWARE PIRACY
ďź Theft of software through the illegal copying of
genuine programs or the counterfeiting and
distribution of products intended to pass for the
original..
ďź Retail revenue losses worldwide are ever
increasing due to this crime.
ďź Can be done in various ways-
End user copying,, Hard disk
loading, Counterfeiting, Illegal downloads from the
internet etc.
11. 5. PORNOGRAPHY
ďź Pornography is the first consistently successful ecommerce
product.
ďź Deceptive marketing tactics and mouse trapping
technologies Pornography encourage customers to access
their websites.
ďź Anybody including children can log on to the internet and
access websites with pornographic contents with a click of
a mouse.
ďź Publishing, transmitting any material in electronic form
which is lascivious or appeals to the prurient interest is an
offence under the provisions of section 67 of I.T. Act -2000.
12. 6. IRC CRIME
Internet Relay Chat (IRC) servers have chat rooms in which
people from anywhere the world can come together and
chat with each other.
â Criminals use it for meeting.
â Hackers use it for discussing their exploits / sharing the
techniques.
â Paedophiles use chat rooms to allure small children.
â Cyber Stalking - In order to harass a woman her
telephone number is given to others as if she wants to
befriend males.
13. 7. CREDIT CARD FRAUD
⢠You simply have to type credit card number into www
page off the vendor for online transaction.
⢠If electronic transactions are not secured the credit card
numbers can be stolen by the hackers who can misuse
this card by impersonating the credit card owner.
Credit card skimmer
14. How the credit card skimmer is used
Credit card skimmer, is used to collect the data of user
before it swapped.
17. Inside the False pamphlet Box
Camera position
at correct angle to
view keypad &
monitor.
18. 8. NET EXTORTION 9. PHISHING
⢠Copying the ⢠It is technique of
companyâs pulling out
confidential data in confidential
order to extort said information from the
company for huge bank/financial
amount.. institutional account
holders by deceptive
means.
20. 10. Spoofing 11. CYBER STALKING
⢠Getting one computer ⢠The Criminal follows
on a network to the victim by
pretend to have the sending
identity off another
computer, usually one
emails, entering the
with special access chat rooms
privileges , so as to frequently.
obtain access to the
other computers on the
network.
21. 12) CYBER DEFAMATION 13) THREATENING
⢠The Criminal sends emails ⢠The Criminal sends
containing defamatory threatening email or
matters to all concerned comes in contact in chat
off the victim or post the rooms with victim.
defamatory matters on a
website..
⢠(disgruntled employee ⢠(Any one disgruntled
may do this against may do this against
boss,, ex-boys friend boss, friend or official)
against girl, divorced
husband against wife etc)
22. 14) SALAMI ATTACK 15) SALE OF NARCOTICS
⢠In such crime criminal makes ⢠Sale & Purchase through
insignificant changes in such a net..
manner that such changes would
⢠There are web site which
go unnoticed.
offer sale and
⢠Criminal makes such program
that deducts small amount like ⢠Shipment off contrabands
Rs. 2.50 per month from the drugs..
account of all the customer of ⢠They may use the techniques
the Bank and deposit the same in off
his account. In this case no
⢠Stegnography for hiding the
account holder will approach the
bank for such small amount but
messages..
criminal gains huge amount.