SlideShare a Scribd company logo
1 of 13
What is Cybercrime?
 Cybercrime or computer crime is any crime that
involves a computer and a network.
 The computer used in the commission of a crime
or may be the target.
 Both governmental and non-state actors engage
in cybercrimes.
 annual damage to the global economy is at $445
billion.
Types of Cybercrimes
 Hacking: a person’s computer is broken into so
that his personal or sensitive information can be
accessed .
 Theft: This crime occurs when a person violates
copyrights and downloads music, movies, games
and software.
 Cyber Stalking: Online harassment wherein the
victim is subjected to a barrage of online messages
and emails.
Types of Cybercrimes
 Identity Theft : a criminal accesses data about a person’s
bank account, credit cards, Social Security, debit card
and other sensitive information .
 Malicious Software :These are Internet-based software
or programs that are used to disrupt a network.
 Child soliciting and Abuse :cyber crime wherein
criminals solicit minors via chat rooms for the purpose
of child pornography.
Causes of Cybercrime
 Economy : perception of low risk and very high
financial reward.
 Ideology :perceived ethical, ideological or moral
reasons.
 Structural causes :the environment in which cyber
crime is committed.
More and more personal and sensitive information
is stored online.
 Personal: Personal emotions and vendettas.
Cybercrimes:Past & Present
Past: ego or expertise
Present: steal, deceive and exploit people.
Cybercrimes can be committed single handedly and does not require
the physical presence of the criminals.
Categories of Cyber Crime:
i. Individual:cyber stalking, distributing pornography
ii. Property:
iii. Government: cyber terrorism
Effects of Cyber Crime
 Loss Of Revenue:Caused by an outside party who
obtains sensitive financial information, using it to
withdraw funds from an organization.
 Time Loss: Time is wasted when IT personnel must
devote great portions of their day handling such
incidences.
 Damaged Reputations: customer records are
compromised by a security breach associated with
cyber crime.
 Reduced Productivity: Due to the measures that many
companies must implement to counteract cyber
crime, there is often a negative effect on employees'
productivity.
Cybercrimes in Nepal
Past
• email blackmail
• SMS blackmail
• illicit publication in online
world
• data piracy
Present
• unauthorized access of data
• Phishing
• online fraud
• online sale of counterfeit
products
• online illegal activities such
as prostitution
 How did she become victim of
cybercrime?
Cases:
a. Defamation online or Internet harassment: Nepal
Police have caught a 27 -year-old man, who allegedly impersonated a
girl in a Facebook account.
b. In Cyber cafes, children of young ages can be seen using porn sites.
c. From government to private organizations are using pirated CDs.
Software CDs can be seen in the footpaths of Kathmandu.
d. The police’s Central Investigation Bureau arrested four people, including
two foreign nationals from Nigeria and Sierra Leone, for operating a
fraud racket via SMS.
Existing measures:
a. The 2004 Act declared hacking, stealing data, pirating software and
posting defamatory information online as criminal and civil offences.
Under this law, the government can punish cyber-offenders with up to
five years of imprisonment and/or a fine of up to Rs 50,000, contingent
upon the crime’s severity.
Weak Enforcement
Although the present Act does touch on a few
important issues, the enforcement part is minimal
because of several reasons. First, both the police and
judiciary have not developed sophisticated tools to
investigate cybercrimes. At present, there are only
two units that deal with cybercrimes—the Cybercrime
Investigation Cell at Hanuman Dhoka and the Central
Investigation Bureau. But even when cybercrime cell
discovers a fake Facebook account, it can only block
the account because Nepali law does not allow access
to a user’s IP address.
Tips for Safety
1. latest security software, web browser and
operating system,updated.
2. Strong Password
3. Install Firewall
4. If you are connected to a public WiFi, don't
access sites where you need to enter your
password, credit card information etc.
5. Install Anti-virus Software
6. Monitor your Children’s Online Activities
Facebook: Emerging Cyber Crime
o What are the precautions before
crime?
o What to do after becoming victim
of cybercrime?
Zero Minute
Any Questions?
……………………………………………………
Your comments:
…………………………………………………………………..
Our Message:
………………………………………………………………………….
Best of Luck: Your SLC Exam
Thank You
Kathmandu Valley Leo Club

More Related Content

What's hot

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 

What's hot (20)

cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 

Viewers also liked

Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
sureshjogesh48
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
Yogendra Wagh
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

Viewers also liked (17)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Current trends in cyber crime scenario
Current trends in cyber crime scenarioCurrent trends in cyber crime scenario
Current trends in cyber crime scenario
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
 
Cyber law in nepal and implementation
Cyber law in nepal and implementationCyber law in nepal and implementation
Cyber law in nepal and implementation
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Disposal of sewage on land
Disposal of sewage on landDisposal of sewage on land
Disposal of sewage on land
 
Sewage Disposal
Sewage DisposalSewage Disposal
Sewage Disposal
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Cybercrime Awareness

Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
CYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdfCYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdf
annaielectronicsvill
 

Similar to Cybercrime Awareness (20)

Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
cyber crime
 cyber crime  cyber crime
cyber crime
 
CYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdfCYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdf
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
 
cybercrime-191029040729.pptx ciber crime
cybercrime-191029040729.pptx ciber crimecybercrime-191029040729.pptx ciber crime
cybercrime-191029040729.pptx ciber crime
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 

Recently uploaded

IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
17thcssbs2
 

Recently uploaded (20)

How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
 
Behavioral-sciences-dr-mowadat rana (1).pdf
Behavioral-sciences-dr-mowadat rana (1).pdfBehavioral-sciences-dr-mowadat rana (1).pdf
Behavioral-sciences-dr-mowadat rana (1).pdf
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
Discover the Dark Web .pdf InfosecTrain
Discover the Dark Web .pdf  InfosecTrainDiscover the Dark Web .pdf  InfosecTrain
Discover the Dark Web .pdf InfosecTrain
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdfPost Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 

Cybercrime Awareness

  • 1. What is Cybercrime?  Cybercrime or computer crime is any crime that involves a computer and a network.  The computer used in the commission of a crime or may be the target.  Both governmental and non-state actors engage in cybercrimes.  annual damage to the global economy is at $445 billion.
  • 2. Types of Cybercrimes  Hacking: a person’s computer is broken into so that his personal or sensitive information can be accessed .  Theft: This crime occurs when a person violates copyrights and downloads music, movies, games and software.  Cyber Stalking: Online harassment wherein the victim is subjected to a barrage of online messages and emails.
  • 3. Types of Cybercrimes  Identity Theft : a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information .  Malicious Software :These are Internet-based software or programs that are used to disrupt a network.  Child soliciting and Abuse :cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography.
  • 4. Causes of Cybercrime  Economy : perception of low risk and very high financial reward.  Ideology :perceived ethical, ideological or moral reasons.  Structural causes :the environment in which cyber crime is committed. More and more personal and sensitive information is stored online.  Personal: Personal emotions and vendettas.
  • 5. Cybercrimes:Past & Present Past: ego or expertise Present: steal, deceive and exploit people. Cybercrimes can be committed single handedly and does not require the physical presence of the criminals. Categories of Cyber Crime: i. Individual:cyber stalking, distributing pornography ii. Property: iii. Government: cyber terrorism
  • 6. Effects of Cyber Crime  Loss Of Revenue:Caused by an outside party who obtains sensitive financial information, using it to withdraw funds from an organization.  Time Loss: Time is wasted when IT personnel must devote great portions of their day handling such incidences.  Damaged Reputations: customer records are compromised by a security breach associated with cyber crime.  Reduced Productivity: Due to the measures that many companies must implement to counteract cyber crime, there is often a negative effect on employees' productivity.
  • 7. Cybercrimes in Nepal Past • email blackmail • SMS blackmail • illicit publication in online world • data piracy Present • unauthorized access of data • Phishing • online fraud • online sale of counterfeit products • online illegal activities such as prostitution
  • 8.  How did she become victim of cybercrime?
  • 9. Cases: a. Defamation online or Internet harassment: Nepal Police have caught a 27 -year-old man, who allegedly impersonated a girl in a Facebook account. b. In Cyber cafes, children of young ages can be seen using porn sites. c. From government to private organizations are using pirated CDs. Software CDs can be seen in the footpaths of Kathmandu. d. The police’s Central Investigation Bureau arrested four people, including two foreign nationals from Nigeria and Sierra Leone, for operating a fraud racket via SMS. Existing measures: a. The 2004 Act declared hacking, stealing data, pirating software and posting defamatory information online as criminal and civil offences. Under this law, the government can punish cyber-offenders with up to five years of imprisonment and/or a fine of up to Rs 50,000, contingent upon the crime’s severity.
  • 10. Weak Enforcement Although the present Act does touch on a few important issues, the enforcement part is minimal because of several reasons. First, both the police and judiciary have not developed sophisticated tools to investigate cybercrimes. At present, there are only two units that deal with cybercrimes—the Cybercrime Investigation Cell at Hanuman Dhoka and the Central Investigation Bureau. But even when cybercrime cell discovers a fake Facebook account, it can only block the account because Nepali law does not allow access to a user’s IP address.
  • 11. Tips for Safety 1. latest security software, web browser and operating system,updated. 2. Strong Password 3. Install Firewall 4. If you are connected to a public WiFi, don't access sites where you need to enter your password, credit card information etc. 5. Install Anti-virus Software 6. Monitor your Children’s Online Activities
  • 12. Facebook: Emerging Cyber Crime o What are the precautions before crime? o What to do after becoming victim of cybercrime?
  • 13. Zero Minute Any Questions? …………………………………………………… Your comments: ………………………………………………………………….. Our Message: …………………………………………………………………………. Best of Luck: Your SLC Exam Thank You Kathmandu Valley Leo Club