SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Name of group members are…
          Mayur Sharma.
          Manoj Sharma.
          Jay Visavadiya.
          Jigar Chauhan.
        MBA 3rd SEM H.R.M
   Project mentor: - Urvee Madam
The presentation is presented at




               &
    Topic   of presentation.
      TYPES OF CYBER CRIME
Why learn about CYBER CRIME ?


Because –
– Everybody is using COMPUTERS..
– From white collar criminals to terrorist organizations
  And from Teenagers to Adults.
– Conventional crimes like
  Forgery, extortions, kidnapping etc.. are being
  committed with the help off computers
– New generation is growing up with computers.
– MOST IMPORTANT - Monetary transactions are moving
  on to the INTERNET.
WHAT IS CYBER CRIME?

 All crimes performed or resorted to by abuse of
 electronic media or otherwise, with the purpose
 of influencing the functioning of computer or
 computer system.
              IN SHORT
• COMPUTER CRIME is any crime where –
   – Computer is a target.
   – Computer is a tool of crime
   – Computer is incidental to crime
PROFILE OF CYBER CRIME            VICTIMS


• Disgruntled employees..   • Gullible

• Teenagers..               • Desperados and greedy

• Professional Hackers..      people

• Business Rival..          • Unskilled & Inexperienced

• Ex-Boy Friend..           • Unlucky people

• Divorced Husband.. etc
TYPES OF CYBER CRIME

NOTE: - This is not exhaustive list of cyber crime
1. HACKING                           8. NET EXTORTION
2. DENIAL OF SERVICE                 9. PHISHING
   ATTACK                            10.SPOOFING
3. VIRUS DISSEMINATION               11.CYBER STALKING
4. SOFTWARE PIRACY                   12.CYBER DEFAMATION
5. PORNOGRAPHY                       13.THREATENING
6. IRC Crime                         14.SALAMI ATTACK
7. CREDIT CARD FRAUD                 15.SALE OF NARCOTICS
1. HACKING

Hacking in simple terms means illegal intrusion
into a computer system without the permission
of the computer owner/user.
2. DENIAL OF SERVICE ATTACK 3. VIRUS DISSEMINATION



 • This is an act by the     • Malicious software
   criminal, who floods        that attaches itself to
   the bandwidth of the        other        software.
   victim‘s network or         (virus, worms, Trojan
   fill's his e-mail box       Horse,           Time
   with      spam    mail      bomb,            Logic
   depriving him of the        Bomb, Rabbit and
   services he is entitled     Bacterium are the
   to access or provide.       malicious
                               software's).
4. SOFTWARE PIRACY

 Theft of software through the illegal copying of
  genuine programs or the counterfeiting and
  distribution of products intended to pass for the
  original..
 Retail revenue losses worldwide are ever
  increasing due to this crime.
 Can be done in various ways-
    End        user       copying,,      Hard       disk
    loading, Counterfeiting, Illegal downloads from the
    internet etc.
5. PORNOGRAPHY

 Pornography is the first consistently successful ecommerce
  product.
 Deceptive marketing tactics and mouse trapping
  technologies Pornography encourage customers to access
  their websites.
 Anybody including children can log on to the internet and
  access websites with pornographic contents with a click of
  a mouse.
 Publishing, transmitting any material in electronic form
  which is lascivious or appeals to the prurient interest is an
  offence under the provisions of section 67 of I.T. Act -2000.
6. IRC CRIME

Internet Relay Chat (IRC) servers have chat rooms in which
people from anywhere the world can come together and
chat with each other.
– Criminals use it for meeting.
– Hackers use it for discussing their exploits / sharing the
  techniques.
– Paedophiles use chat rooms to allure small children.
– Cyber Stalking - In order to harass a woman her
  telephone number is given to others as if she wants to
  befriend males.
7. CREDIT CARD FRAUD

• You simply have to type credit card number into www
  page off the vendor for online transaction.
• If electronic transactions are not secured the credit card
  numbers can be stolen by the hackers who can misuse
  this card by impersonating the credit card owner.
             Credit card skimmer
How the credit card skimmer is used

Credit card skimmer, is used to collect the data of user
before it swapped.
Additional Slot In ATM Machine
False pamphlet Box Affixed to ATM Cubical side
Inside the False pamphlet Box
                                Camera position
                                at correct angle to
                                view keypad &
                                monitor.
8. NET EXTORTION         9. PHISHING


• Copying the            • It is technique of
  company’s                pulling out
  confidential data in     confidential
  order to extort said     information from the
  company for huge         bank/financial
  amount..                 institutional account
                           holders by deceptive
                           means.
Actual login page   Fake login page
10. Spoofing               11. CYBER STALKING


• Getting one computer     • The Criminal follows
  on a network to            the     victim    by
  pretend to have the        sending
  identity off another
  computer, usually one
                             emails, entering the
  with special access        chat           rooms
  privileges , so as to      frequently.
  obtain access to the
  other computers on the
  network.
12) CYBER DEFAMATION         13) THREATENING



• The Criminal sends emails • The Criminal sends
  containing     defamatory   threatening email or
  matters to all concerned    comes in contact in chat
  off the victim or post the  rooms with victim.
  defamatory matters on a
  website..
• (disgruntled    employee • (Any one disgruntled
  may do this against         may do this against
  boss,, ex-boys friend       boss, friend or official)
  against girl, divorced
  husband against wife etc)
14) SALAMI ATTACK                    15) SALE OF NARCOTICS


• In such crime criminal makes       • Sale & Purchase through
  insignificant changes in such a      net..
  manner that such changes would
                                     • There are web site which
  go unnoticed.
                                       offer sale and
• Criminal makes such program
  that deducts small amount like     • Shipment off contrabands
  Rs. 2.50 per month from the          drugs..
  account of all the customer of     • They may use the techniques
  the Bank and deposit the same in     off
  his account. In this case no
                                     • Stegnography for hiding the
  account holder will approach the
  bank for such small amount but
                                       messages..
  criminal gains huge amount.
ANY QUESTIONS ?????
                      PLEASE ASK




             OR
Legal (Types of Cyber Crime)

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
 
Phishing
PhishingPhishing
PhishingSagar Rai
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cyber security
Cyber securityCyber security
Cyber securityBhavin Shah
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPTAnandKaGe
 
Cyber crime
Cyber crimeCyber crime
Cyber crimeAnees Raza
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet vimal kumar arora
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistanFahad Abbasi
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and HackingParth Makadiya
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptGracy Joseph
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber CrimeDr Raghu Khimani
 

Was ist angesagt? (20)

Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Phishing
PhishingPhishing
Phishing
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 

Andere mochten auch

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
UNDERSTANDING HYPERMEDIA
UNDERSTANDING HYPERMEDIAUNDERSTANDING HYPERMEDIA
UNDERSTANDING HYPERMEDIAkikayfernandez
 
The software as an educational resource copy
The software as an educational resource   copyThe software as an educational resource   copy
The software as an educational resource copymiss yhda
 
Lesson 13: Cooperative learning with the Computer
Lesson 13: Cooperative learning with the ComputerLesson 13: Cooperative learning with the Computer
Lesson 13: Cooperative learning with the Computerjemarmata
 
Understanding hypermedia
Understanding hypermediaUnderstanding hypermedia
Understanding hypermediaLeslie Nicdao
 
The Internet and Education
The Internet and EducationThe Internet and Education
The Internet and Educationleaniesurilla
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 

Andere mochten auch (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
UNDERSTANDING HYPERMEDIA
UNDERSTANDING HYPERMEDIAUNDERSTANDING HYPERMEDIA
UNDERSTANDING HYPERMEDIA
 
The software as an educational resource copy
The software as an educational resource   copyThe software as an educational resource   copy
The software as an educational resource copy
 
Lesson 13: Cooperative learning with the Computer
Lesson 13: Cooperative learning with the ComputerLesson 13: Cooperative learning with the Computer
Lesson 13: Cooperative learning with the Computer
 
Understanding hypermedia
Understanding hypermediaUnderstanding hypermedia
Understanding hypermedia
 
The Internet and Education
The Internet and EducationThe Internet and Education
The Internet and Education
 
Types of Crime
 Types of Crime  Types of Crime
Types of Crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Ähnlich wie Legal (Types of Cyber Crime)

workers participation in management
workers participation in managementworkers participation in management
workers participation in managementlily004
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
CYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdfCYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdfannaielectronicsvill
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminalsOnline
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimesSrishti Jain
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crimeJeet Swain
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptxClichesin
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 

Ähnlich wie Legal (Types of Cyber Crime) (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
workers participation in management
workers participation in managementworkers participation in management
workers participation in management
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdfCYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdf
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 

KĂźrzlich hochgeladen

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

KĂźrzlich hochgeladen (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Legal (Types of Cyber Crime)

  • 1.
  • 2. Name of group members are… Mayur Sharma. Manoj Sharma. Jay Visavadiya. Jigar Chauhan. MBA 3rd SEM H.R.M Project mentor: - Urvee Madam
  • 3. The presentation is presented at & Topic of presentation. TYPES OF CYBER CRIME
  • 4. Why learn about CYBER CRIME ? Because – – Everybody is using COMPUTERS.. – From white collar criminals to terrorist organizations And from Teenagers to Adults. – Conventional crimes like Forgery, extortions, kidnapping etc.. are being committed with the help off computers – New generation is growing up with computers. – MOST IMPORTANT - Monetary transactions are moving on to the INTERNET.
  • 5. WHAT IS CYBER CRIME? All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system. IN SHORT • COMPUTER CRIME is any crime where – – Computer is a target. – Computer is a tool of crime – Computer is incidental to crime
  • 6. PROFILE OF CYBER CRIME VICTIMS • Disgruntled employees.. • Gullible • Teenagers.. • Desperados and greedy • Professional Hackers.. people • Business Rival.. • Unskilled & Inexperienced • Ex-Boy Friend.. • Unlucky people • Divorced Husband.. etc
  • 7. TYPES OF CYBER CRIME NOTE: - This is not exhaustive list of cyber crime 1. HACKING 8. NET EXTORTION 2. DENIAL OF SERVICE 9. PHISHING ATTACK 10.SPOOFING 3. VIRUS DISSEMINATION 11.CYBER STALKING 4. SOFTWARE PIRACY 12.CYBER DEFAMATION 5. PORNOGRAPHY 13.THREATENING 6. IRC Crime 14.SALAMI ATTACK 7. CREDIT CARD FRAUD 15.SALE OF NARCOTICS
  • 8. 1. HACKING Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
  • 9. 2. DENIAL OF SERVICE ATTACK 3. VIRUS DISSEMINATION • This is an act by the • Malicious software criminal, who floods that attaches itself to the bandwidth of the other software. victim‘s network or (virus, worms, Trojan fill's his e-mail box Horse, Time with spam mail bomb, Logic depriving him of the Bomb, Rabbit and services he is entitled Bacterium are the to access or provide. malicious software's).
  • 10. 4. SOFTWARE PIRACY  Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original..  Retail revenue losses worldwide are ever increasing due to this crime.  Can be done in various ways- End user copying,, Hard disk loading, Counterfeiting, Illegal downloads from the internet etc.
  • 11. 5. PORNOGRAPHY  Pornography is the first consistently successful ecommerce product.  Deceptive marketing tactics and mouse trapping technologies Pornography encourage customers to access their websites.  Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse.  Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient interest is an offence under the provisions of section 67 of I.T. Act -2000.
  • 12. 6. IRC CRIME Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other. – Criminals use it for meeting. – Hackers use it for discussing their exploits / sharing the techniques. – Paedophiles use chat rooms to allure small children. – Cyber Stalking - In order to harass a woman her telephone number is given to others as if she wants to befriend males.
  • 13. 7. CREDIT CARD FRAUD • You simply have to type credit card number into www page off the vendor for online transaction. • If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner. Credit card skimmer
  • 14. How the credit card skimmer is used Credit card skimmer, is used to collect the data of user before it swapped.
  • 15. Additional Slot In ATM Machine
  • 16. False pamphlet Box Affixed to ATM Cubical side
  • 17. Inside the False pamphlet Box Camera position at correct angle to view keypad & monitor.
  • 18. 8. NET EXTORTION 9. PHISHING • Copying the • It is technique of company’s pulling out confidential data in confidential order to extort said information from the company for huge bank/financial amount.. institutional account holders by deceptive means.
  • 19. Actual login page Fake login page
  • 20. 10. Spoofing 11. CYBER STALKING • Getting one computer • The Criminal follows on a network to the victim by pretend to have the sending identity off another computer, usually one emails, entering the with special access chat rooms privileges , so as to frequently. obtain access to the other computers on the network.
  • 21. 12) CYBER DEFAMATION 13) THREATENING • The Criminal sends emails • The Criminal sends containing defamatory threatening email or matters to all concerned comes in contact in chat off the victim or post the rooms with victim. defamatory matters on a website.. • (disgruntled employee • (Any one disgruntled may do this against may do this against boss,, ex-boys friend boss, friend or official) against girl, divorced husband against wife etc)
  • 22. 14) SALAMI ATTACK 15) SALE OF NARCOTICS • In such crime criminal makes • Sale & Purchase through insignificant changes in such a net.. manner that such changes would • There are web site which go unnoticed. offer sale and • Criminal makes such program that deducts small amount like • Shipment off contrabands Rs. 2.50 per month from the drugs.. account of all the customer of • They may use the techniques the Bank and deposit the same in off his account. In this case no • Stegnography for hiding the account holder will approach the bank for such small amount but messages.. criminal gains huge amount.
  • 23. ANY QUESTIONS ????? PLEASE ASK OR