Your SlideShare is downloading. ×
Cyber  Crime
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cyber Crime

9,321
views

Published on

cyber crime is most happened thing with us.so be aware.

cyber crime is most happened thing with us.so be aware.

Published in: Education

1 Comment
8 Likes
Statistics
Notes
No Downloads
Views
Total Views
9,321
On Slideshare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
718
Comments
1
Likes
8
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. CYBER CRIME
    NOISELESS & CLUELESS THEFT
    PRESENTED BY - MUKESH KUMAR
  • 2. WHAT IS CYBER CRIME ?
    Computer crime or cybercrime is a form of crime where the Internet or computers are used as a medium to commit crime.
  • 3. SOME THOUGHTS ABOUT CYBER CRIME
    "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb".– National Research Council, "Computers at Risk", 1991.
  • 4. TYPES OF CYBER CRIME
    Cyber crimes can be basically divided into 3 major categories:1. Cybercrimes against persons.2. Cybercrimes against property.3. Cybercrimes against government.
  • 5. 1.AGAINST PERSON
    This committed against persons include various harassment of any one with the use of a computer such as e-mail.
    Eg:-The Melissa virus first appeared on the internet in March of 1999. It spread rapidly throughout computer systems in the United States and Europe. It is estimated that the virus caused 80 million dollars in damages to computers worldwide.
  • 6. 1. AGAINST PERSON
    Cyber harassment is a distinct Cybercrime.
    Harassment can be sexual, racial, religious, or other. Persons perpetuating such harassment are also guilty of cybercrimes.
    Cyber harassment as a crime also brings us to another related area of violation of privacy of citizens.
    No one likes any other person invading the invaluable and extremely touchy area of his or her own privacy which the medium of internet grants to the citizen.
  • 7. 2.AGAINST PROPERTY
    The second category of Cyber-crimes is that of Cybercrimes against all forms of property. These crimes include computer vandalism (destruction of others' property), transmission of harmful programmes.
    Eg : A Mumbai-based upstart engineering company lost a say and much money in the business when the rival company, an industry major, stole the technical database from their computers with the help of a corporate cyber spy.
  • 8. 3.AGAINST GOVERNMENT
    This crime manifests itself into terrorism when an individual "cracks" into a government or military maintained website.
    Eg:-Lashker-e-Toibais collecting contributions online from its sympathisers all over the world. During the investigation of the Red Fort shootout in Dec. 2000, the accused Ashfaq Ahmed of this terrorist group revealed that the militants are making extensive use of the internet to communicate with the operatives and the sympathisers and also using the medium for intra-bank transfer of funds".
  • 9. Why learn about CYBER CRIME ?
    Because –
    Everybody is using COMPUTERS.
    Terrorist targeted the teenagers.
    Conventional crimes like Forgery,, extortion,, kidnapping are being committed with the help off computers.
    New generation is growing up with computers
    MOST IMPORTANT - Monetary transactions
    are moving on to the INTERNET.
  • 10. IN SHORT
    COMPUTER CRIME is any crime where –
    Computer is a target.
    Computer is a tool of crime
    Computer is incidental to crime
  • 11. VICTIMS
    Desperados and greedy people
    Unskilled & Inexperienced
    Unlucky people
  • 12. HACKING
    Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
  • 13. VIRUSDISSEMINATION
    • Malicious software that attaches itself to other software.
    Eg:-
    (virus,, worms,, Trojan Horse,, Time bomb,
    Logic Bomb,, Rabbit and Bacterium are the
    malicious software)
  • 14. SOFTWARE PRIVACY
    Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
    Retail revenue losses worldwide are ever increasing due to this crimeCan be done in various ways
    Eg:-End user copying, Hard disk loading, Counterfeiting,
    Illegal downloads from the internet etc.
  • 15. INTERNET RELAY CHAT
    Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other.
    Criminals use it for meeting co-conspirators.
    Hackers use it for discussing their exploits / sharing the techniques.
    Cyber Stalking - In order to harass a woman her telephone number is given to others as if she wants to befriend males
  • 16. CREDIT CARD FRAUD
  • 17. CREDIT CARD FRAUD
  • 18. ATM CARD FRAUD
  • 19. ATM CARD FRAUD
  • 20. ATM CARD FRAUD
  • 21. NET EXTORTION
    Copying the company’s confidential data in order to extort said company for hugeamount.
  • 22. PHISHING
    It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means.
  • 23. PHISHING
  • 24. PHISHING
  • 25. PHISHING
  • 26. CYBER DEFAMATION
    The Criminal sends emails containingdefamatory matters to all concerned off the victim or post the defamatory matters on a website..
    Eg:-(disgruntled employee may do this againstboss,, ex-boys friend against girl,, divorcedhusband against wife etc.)
  • 27. CONCLUSION
    Present time-
    -We are always suffering from these type of problems.
    So , now we should think about that how we can use our most valuable resources.
  • 28. ARE WE READY FOR THIS CHALLENGE !!!!!!!
  • 29. THANK YOU

×