SlideShare a Scribd company logo
1 of 11
TYPES OF CYBER CRIMES
A.Albert Ravi,
Assistant Professor,
PG & Research Departmentof Commerce,
St. Joseph’sCollege of Arts and Science(Autonomous),
Cuddalore,TamilNadu,India
CYBER CRIME
•The illegal use of any communication device to commit or facilitate the commission of any illegal act" is the definition
of cybercrime.
•Cybercrime may be defined as “Any unlawful act where computer or communication device or computer
network is used to commit or facilitate the commission of a crime”.
•Cyber Crimes result in severe consequences like financial losses, compromises of sensitive data, system failure, and
reputational damage to an organisation,
•A cybercrime is defined as a sort of crime that targets or makes use of a computer, a networked collection of computers,
or both for malicious purposes. Computers and computer networks are used in cybercrimes.
•They may be intended at specific people, corporate entities,Government etc.,
Two Main Types of Cyber Crimes
Criminal activity that targets computers.
This type of cybercrimes includes
every possible way that can lead to
harm to computer devices for
example malware or denial of service
attacks.
Criminal activity that uses computers
01 02
Cybercrime that uses computers
to commit other crimes may
involve using computers to spread
malware, illegal information or
illegal images.
Classifications of Cybercrimes
Individual Cyber Crimes
Property Cybercrimes 2 0 2 1 Society Cyber crimes
Organisation Cyber Crimes
This type targets property like
credit cards or even intellectual
property rights.
This is the most dangerous
form of cybercrime as it
includes cyber-terrorism
.
This type is targeting
individuals. It includes
phishing, spoofing, spam,
cyberstalking, and more.
The main target here is organizations.
Usually, this type of crime is done by
teams of criminals including malware
attacks and denial of service attacks.
.
Types of Cyber Crimes
1. Child Pornography (or) Child Sexually Abusive Material
(CSAM)
•Child sexually abusive material (CSAM) refers to a material
containing sexual images in any form, of a child who is abused
or sexually exploited.
• Section 67 (B) of the IT Act, 2000 states that “it is punishable
for publishing or transmitting of material depicting children in
the sexually explicit act, etc. in electronic form.
2. Cyber Bullying
.
Content
Here
It is also known as online or internet bullying. It
includes sending or sharing harmful and humiliating
content about someone else which causes
embarrassment and can be a reason for the occurrence
of psychological problems.
It became very common lately, especially among
teenagers..
Types of Cyber Crimes
4. Cyber Grooming
5. Online Job Fraud
Online job fraud is an attempt to
take advantage of job seekers by
promising them false hope or
better jobs with more pay.
3. Cyber Stalking
•Cyberstalking is the use of electronic communication to
track down a person or to make repeated attempts to get
in touch with them in order to foster personal interaction
despite their blatant lack of interest.
•Anyone who monitors indirectly the internet, email, or
any other form of electronic communication is guilty of
stalking..
•When a person develops an online contact with a young
person and tricks or forces him or her into performing a
sexual act, this is known as cyber grooming.
The main goal of the Cyber Grooming are:
•To gain trust from the child.
•To obtain intimate and personal data from the Child(often
sexual in nature) in order to threaten and blackmail for
further inappropriate material.
6. Online Sextortion
•Online sextortion is when someone makes a
threat to publish private and sensitive
information through an electronic media if the
victim doesn't submit sexually explicit
photographs, money, or sexual favours.
7 . P h i s h i n g
Phishing
Phishing is a type of social
engineering attack that targets the
user and tricks them by sending fake
messages and emails to get sensitive
information about the user or trying
to download malicious software and
exploit it on the target system.
Phishing is a type of fraud that
involves stealing personal
information such as Customer ID,
IPIN, Credit/Debit Card number,
Card expiry date, CVV number, etc.
through emails that appear to be
from a legitimate source.
8 . V i s h i n g
Vishing
Vishing is an attempt where
fraudsters try to seek personal
information like Customer ID,
Net Banking password, ATM
PIN, OTP, Card expiry date,
CVV etc. through a phone call.
Smishing
Smishing is a type of fraud that uses
mobile phone text messages to lure
victims into calling back on a
fraudulent phone number, visiting
fraudulent websites or downloading
malicious content via phone or web.
9 . S m i s h i n g
Pharming is a cyber-attack aiming to
redirect a website’s traffic to another,
bogus website.
10. Sexting
Sending digitally
explicit sexually
explicit
photographs,
videos, texts, or
emails—typically
over a cell phone—
is known as sexting.
11. Pharming
12. SIM Swap Scam
SIM Swap Scam occurs when
fraudsters manage to get a new SIM
card issued against a registered
mobile number fraudulently through
the mobile service provider.
With the help of this new SIM card,
they get One Time Password (OTP)
and alerts, required for making
financial transactions through the
victim’s bank account. Getting a new
SIM card against a registered mobile
number fraudulently is known as SIM
Swap
1 2 3
4 5 6
7 8 9
0
13. Website Defacement
•Website Defacement is
an attack intended to
change the visual
appearance of a website
and/ or make it
dysfunctional.
•The attacker may post
indecent, hostile and
obscene images,
messages, videos, etc.
.
14.Online Drug Trafficking
Online Drug Trafficking
is a crime of selling,
transporting, or illegally
importing unlawful
controlled substances,
such as heroin, cocaine,
marijuana, or other
illegal drugs using
electronic means.
.
15. Espionage
Espionage is the act
or practice of
obtaining data and
information without
the permission and
knowledge of the
owner.
.
Types of Cyber Crimes
16. Ransomware
Ransomware is a type
of computer malware
that encrypts the files,
storage media on
communication devices
like desktops, Laptops,
Mobile phones etc.,
holding
data/information as a
hostage.
.
How to Prevent Cybercrimes?
Tips…
1. Ensure that you are running current security programmes like firewalls and
antivirus.
2. Put in place the optimal security configurations and procedures for your
environment.
3. Avoid visiting shady websites, exercise caution when downloading any files, and use
caution when opening email attachments.
4. Make use of reliable authentication procedures and safeguard the security of your
credentials.
5. Don’t share sensitive information online or on your social media accounts
6. Inform your kids about the dangers of online activity and continue to keep an eye
on them.
7. Always be prepared to contact the police right away if you become a victim of a
cybercrime.
THANK YOU
All the Best……..

More Related Content

Similar to SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx

Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 

Similar to SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx (20)

Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
CYBERCRIME.pptx
CYBERCRIME.pptxCYBERCRIME.pptx
CYBERCRIME.pptx
 

More from Aalbert Albert (8)

CSR -Corporate Social Resposibility- Companies Act 2013-SJCTNC.pptx
 CSR -Corporate Social Resposibility- Companies Act 2013-SJCTNC.pptx CSR -Corporate Social Resposibility- Companies Act 2013-SJCTNC.pptx
CSR -Corporate Social Resposibility- Companies Act 2013-SJCTNC.pptx
 
TYPES OF COMPANIES-Companies Act ,2013-SJCTNC
TYPES OF COMPANIES-Companies Act ,2013-SJCTNCTYPES OF COMPANIES-Companies Act ,2013-SJCTNC
TYPES OF COMPANIES-Companies Act ,2013-SJCTNC
 
SJCTNC- INTRODUCTION TO DIRECTORS.pptx
SJCTNC- INTRODUCTION TO DIRECTORS.pptxSJCTNC- INTRODUCTION TO DIRECTORS.pptx
SJCTNC- INTRODUCTION TO DIRECTORS.pptx
 
Authorities of income tax.pptx
Authorities of income tax.pptxAuthorities of income tax.pptx
Authorities of income tax.pptx
 
BASIC DEFINTIONS OF INCOME TAX
BASIC DEFINTIONS OF INCOME TAXBASIC DEFINTIONS OF INCOME TAX
BASIC DEFINTIONS OF INCOME TAX
 
SJCTNC-Functions of Human Resource Management( CM512Q)
SJCTNC-Functions of Human Resource Management( CM512Q)SJCTNC-Functions of Human Resource Management( CM512Q)
SJCTNC-Functions of Human Resource Management( CM512Q)
 
HUMAN RESOURCE MANAGEMENT(INTRODUCTION)-CM512Q/SJCTNC/
HUMAN RESOURCE MANAGEMENT(INTRODUCTION)-CM512Q/SJCTNC/HUMAN RESOURCE MANAGEMENT(INTRODUCTION)-CM512Q/SJCTNC/
HUMAN RESOURCE MANAGEMENT(INTRODUCTION)-CM512Q/SJCTNC/
 
Retail Marketing Management- INTRODUCTION
Retail Marketing Management- INTRODUCTIONRetail Marketing Management- INTRODUCTION
Retail Marketing Management- INTRODUCTION
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx

  • 1. TYPES OF CYBER CRIMES A.Albert Ravi, Assistant Professor, PG & Research Departmentof Commerce, St. Joseph’sCollege of Arts and Science(Autonomous), Cuddalore,TamilNadu,India
  • 2. CYBER CRIME •The illegal use of any communication device to commit or facilitate the commission of any illegal act" is the definition of cybercrime. •Cybercrime may be defined as “Any unlawful act where computer or communication device or computer network is used to commit or facilitate the commission of a crime”. •Cyber Crimes result in severe consequences like financial losses, compromises of sensitive data, system failure, and reputational damage to an organisation, •A cybercrime is defined as a sort of crime that targets or makes use of a computer, a networked collection of computers, or both for malicious purposes. Computers and computer networks are used in cybercrimes. •They may be intended at specific people, corporate entities,Government etc.,
  • 3. Two Main Types of Cyber Crimes Criminal activity that targets computers. This type of cybercrimes includes every possible way that can lead to harm to computer devices for example malware or denial of service attacks. Criminal activity that uses computers 01 02 Cybercrime that uses computers to commit other crimes may involve using computers to spread malware, illegal information or illegal images.
  • 4. Classifications of Cybercrimes Individual Cyber Crimes Property Cybercrimes 2 0 2 1 Society Cyber crimes Organisation Cyber Crimes This type targets property like credit cards or even intellectual property rights. This is the most dangerous form of cybercrime as it includes cyber-terrorism . This type is targeting individuals. It includes phishing, spoofing, spam, cyberstalking, and more. The main target here is organizations. Usually, this type of crime is done by teams of criminals including malware attacks and denial of service attacks. .
  • 5. Types of Cyber Crimes 1. Child Pornography (or) Child Sexually Abusive Material (CSAM) •Child sexually abusive material (CSAM) refers to a material containing sexual images in any form, of a child who is abused or sexually exploited. • Section 67 (B) of the IT Act, 2000 states that “it is punishable for publishing or transmitting of material depicting children in the sexually explicit act, etc. in electronic form. 2. Cyber Bullying . Content Here It is also known as online or internet bullying. It includes sending or sharing harmful and humiliating content about someone else which causes embarrassment and can be a reason for the occurrence of psychological problems. It became very common lately, especially among teenagers..
  • 6. Types of Cyber Crimes 4. Cyber Grooming 5. Online Job Fraud Online job fraud is an attempt to take advantage of job seekers by promising them false hope or better jobs with more pay. 3. Cyber Stalking •Cyberstalking is the use of electronic communication to track down a person or to make repeated attempts to get in touch with them in order to foster personal interaction despite their blatant lack of interest. •Anyone who monitors indirectly the internet, email, or any other form of electronic communication is guilty of stalking.. •When a person develops an online contact with a young person and tricks or forces him or her into performing a sexual act, this is known as cyber grooming. The main goal of the Cyber Grooming are: •To gain trust from the child. •To obtain intimate and personal data from the Child(often sexual in nature) in order to threaten and blackmail for further inappropriate material. 6. Online Sextortion •Online sextortion is when someone makes a threat to publish private and sensitive information through an electronic media if the victim doesn't submit sexually explicit photographs, money, or sexual favours.
  • 7. 7 . P h i s h i n g Phishing Phishing is a type of social engineering attack that targets the user and tricks them by sending fake messages and emails to get sensitive information about the user or trying to download malicious software and exploit it on the target system. Phishing is a type of fraud that involves stealing personal information such as Customer ID, IPIN, Credit/Debit Card number, Card expiry date, CVV number, etc. through emails that appear to be from a legitimate source. 8 . V i s h i n g Vishing Vishing is an attempt where fraudsters try to seek personal information like Customer ID, Net Banking password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call. Smishing Smishing is a type of fraud that uses mobile phone text messages to lure victims into calling back on a fraudulent phone number, visiting fraudulent websites or downloading malicious content via phone or web. 9 . S m i s h i n g
  • 8. Pharming is a cyber-attack aiming to redirect a website’s traffic to another, bogus website. 10. Sexting Sending digitally explicit sexually explicit photographs, videos, texts, or emails—typically over a cell phone— is known as sexting. 11. Pharming 12. SIM Swap Scam SIM Swap Scam occurs when fraudsters manage to get a new SIM card issued against a registered mobile number fraudulently through the mobile service provider. With the help of this new SIM card, they get One Time Password (OTP) and alerts, required for making financial transactions through the victim’s bank account. Getting a new SIM card against a registered mobile number fraudulently is known as SIM Swap
  • 9. 1 2 3 4 5 6 7 8 9 0 13. Website Defacement •Website Defacement is an attack intended to change the visual appearance of a website and/ or make it dysfunctional. •The attacker may post indecent, hostile and obscene images, messages, videos, etc. . 14.Online Drug Trafficking Online Drug Trafficking is a crime of selling, transporting, or illegally importing unlawful controlled substances, such as heroin, cocaine, marijuana, or other illegal drugs using electronic means. . 15. Espionage Espionage is the act or practice of obtaining data and information without the permission and knowledge of the owner. . Types of Cyber Crimes 16. Ransomware Ransomware is a type of computer malware that encrypts the files, storage media on communication devices like desktops, Laptops, Mobile phones etc., holding data/information as a hostage. .
  • 10. How to Prevent Cybercrimes? Tips… 1. Ensure that you are running current security programmes like firewalls and antivirus. 2. Put in place the optimal security configurations and procedures for your environment. 3. Avoid visiting shady websites, exercise caution when downloading any files, and use caution when opening email attachments. 4. Make use of reliable authentication procedures and safeguard the security of your credentials. 5. Don’t share sensitive information online or on your social media accounts 6. Inform your kids about the dangers of online activity and continue to keep an eye on them. 7. Always be prepared to contact the police right away if you become a victim of a cybercrime.
  • 11. THANK YOU All the Best……..