SlideShare a Scribd company logo
1 of 19
CYBER CRIME
&
CYBER SECURITY
ALTHAF YAZIN
S1R
12
1
CONTENTS
ļµINTRODUCTION
ļµDEFINITION
ļµCATEGORIES OF CYBER CRIME
ļµTYPES OF CYBER CRIME
ļµPREVENTION
ļµSECURITY
ļµCONCLUSION
2
INTRODUCTION
ļ¶ The internet in India is growing rapidly. It has given rise to new opportunities in every
field like entertainment, business, sports or education
ļ¶ Internet also has its own disadvantages is Cyber crime- illegal activity committed on
the internet
3
DEFINITON OF CYBER CRIME
ļ¶ Cyber crime is nothing but where the
computer used as an object or subject of
crime..
ļ¶ Crime committed using a computer and the
internet to steal data or information.
ļ¶ Illegal imports.
ļ¶ Malicious programs.
4
CATEGORIZATION OF CYBER CRIME
ļ¶ The Computer as a Target
ļ¶ The computer as a weapon
5
TYPES OF CYBER
CRIME
ā€¢ Hacking
ā€¢ Denial of service attack
ā€¢ Virus Dissemination
ā€¢ Computer Vandalism
ā€¢ Cyber Terrorism
6
HACKING
ā€¢ Hacking is the activity of identifying weaknesses in a
computer system or a network to exploit the security to gain
access to personal data or business data. An example of
computer hacking can be using a password cracking algorithm to
gain access to a computer system.
7
DENIAL OF SERVICE ATTACK
ļ¶Act by the criminal, who floods the bandwidth of the victimā€™s
network.
ļ¶ Fill his e-mail box with spam mail depriving him of the
services.
8
VIRUS DISSEMINATION
Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web
jacking, e-mail bombing etc.)
9
COMPUTER
VANDALISM
ā€¢ Damaging or destroying data rather
than stealing.
ā€¢ Transmitting virus
10
ā€¢ Use of Internet based attacks in terrorist activities.
ā€¢ Technology savvy terrorists are using 512-bit encryption, which is
impossible to decrypt.
CYBER TERRORISM
11
TYPES OF
CYBER
ATTACK BY
PERCENTAGE
Financial fraud: 11%
Sabotage of data/networks: 17%
Theft of proprietary information: 20%
System penetration from the outside: 25%
Denial of service:
27%
Unauthorized access by insiders: 71%
Employee abuse of internet privileges 79%
Viruses 85%
12
SAFETY
TIPS FOR
CYBER
CRIME
ā€¢ Use antivirus softwareā€™s.
ā€¢ Insert firewalls.
ā€¢ Uninstall unnecessary software
ā€¢ Maintain backup.
ā€¢ Check security settings.
ā€¢ Stay anonymous - choose a genderless screen name
ā€¢ Never give your full name or address to strangers.
13
14
CYBER SECURITY
ā€¢ Internet security is a branch of computer security
specifically related to the Internet. ā€¢
ā€¢ Its objective is to establish rules and measure to use
against attacks over the Internet.
15
ADVANTAGES OF CYBER
SECURITY
ā€¢ Defend us from critical attacks.
ā€¢ Browse the safe website.
ā€¢ Internet security process all the incoming and outgoing data on
our computer
This Photo by Unknown Author is licensed under CC BY-SA-NC
16
CONCLUSION
ā€¢ To conclude, we can say that Cyber Crime is a dangerous offense to
someone's privacy or any material. Also, we can avoid Cyber Crime by
following some basic logical things and using our common sense. Above
all, Cyber Crime is a violation of not only law but of human rights too
17
REFERENCE
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and
Techniques
Cybercrime: A Reference Handbook
18
THANK
YOU
ALTHAF YAZIN
12
S1R
19

More Related Content

Similar to CYBER CRIME.pptx

Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuityAlisha Korpal
Ā 
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptxcybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptxRahulDhanware2
Ā 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxMayurSapkale7
Ā 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
Ā 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet vimal kumar arora
Ā 
Cyber security
Cyber securityCyber security
Cyber securityRIPPER95
Ā 
Persentation
PersentationPersentation
PersentationMehar Tayyab
Ā 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxMBRoman1
Ā 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptxANIKETKUMARSHARMA3
Ā 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptxSohamChakraborty61
Ā 
Cyber Security Introduction project comprehensive
Cyber Security Introduction project comprehensiveCyber Security Introduction project comprehensive
Cyber Security Introduction project comprehensivesidraasif9090
Ā 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityBalwantBesra
Ā 

Similar to CYBER CRIME.pptx (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ā 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
Ā 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
Ā 
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptxcybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
Ā 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Ā 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
Ā 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Ā 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
Ā 
Cyber security
Cyber securityCyber security
Cyber security
Ā 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Ā 
Persentation
PersentationPersentation
Persentation
Ā 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Ā 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
Ā 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
Ā 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
Ā 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
Ā 
Cyber Security Introduction project comprehensive
Cyber Security Introduction project comprehensiveCyber Security Introduction project comprehensive
Cyber Security Introduction project comprehensive
Ā 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
Ā 
Seminar
SeminarSeminar
Seminar
Ā 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
Ā 

Recently uploaded

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
Ā 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
Ā 
(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...
(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...
(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...gurkirankumar98700
Ā 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
Ā 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
Ā 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
Ā 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
Ā 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
Ā 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
Ā 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
Ā 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
Ā 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
Ā 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
Ā 
Call Girls in Naraina Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Naraina Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls in Naraina Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Naraina Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
Ā 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
Ā 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
Ā 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
Ā 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
Ā 

Recently uploaded (20)

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
Ā 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
Ā 
(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...
(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...
(Genuine) Escort Service Lucknow | Starting ā‚¹,5K To @25k with A/C šŸ§‘šŸ½ā€ā¤ļøā€šŸ§‘šŸ» 89...
Ā 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
Ā 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Ā 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
Ā 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
Ā 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
Ā 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
Ā 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
Ā 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
Ā 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Ā 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Ā 
Call Girls in Naraina Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Naraina Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls in Naraina Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Naraina Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Ā 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
Ā 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Ā 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
Ā 
Call Girls In Mukherjee Nagar šŸ“± 9999965857 šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SE...
Call Girls In Mukherjee Nagar šŸ“±  9999965857  šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SE...Call Girls In Mukherjee Nagar šŸ“±  9999965857  šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SE...
Call Girls In Mukherjee Nagar šŸ“± 9999965857 šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SE...
Ā 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
Ā 

CYBER CRIME.pptx

  • 2. CONTENTS ļµINTRODUCTION ļµDEFINITION ļµCATEGORIES OF CYBER CRIME ļµTYPES OF CYBER CRIME ļµPREVENTION ļµSECURITY ļµCONCLUSION 2
  • 3. INTRODUCTION ļ¶ The internet in India is growing rapidly. It has given rise to new opportunities in every field like entertainment, business, sports or education ļ¶ Internet also has its own disadvantages is Cyber crime- illegal activity committed on the internet 3
  • 4. DEFINITON OF CYBER CRIME ļ¶ Cyber crime is nothing but where the computer used as an object or subject of crime.. ļ¶ Crime committed using a computer and the internet to steal data or information. ļ¶ Illegal imports. ļ¶ Malicious programs. 4
  • 5. CATEGORIZATION OF CYBER CRIME ļ¶ The Computer as a Target ļ¶ The computer as a weapon 5
  • 6. TYPES OF CYBER CRIME ā€¢ Hacking ā€¢ Denial of service attack ā€¢ Virus Dissemination ā€¢ Computer Vandalism ā€¢ Cyber Terrorism 6
  • 7. HACKING ā€¢ Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data. An example of computer hacking can be using a password cracking algorithm to gain access to a computer system. 7
  • 8. DENIAL OF SERVICE ATTACK ļ¶Act by the criminal, who floods the bandwidth of the victimā€™s network. ļ¶ Fill his e-mail box with spam mail depriving him of the services. 8
  • 9. VIRUS DISSEMINATION Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.) 9
  • 10. COMPUTER VANDALISM ā€¢ Damaging or destroying data rather than stealing. ā€¢ Transmitting virus 10
  • 11. ā€¢ Use of Internet based attacks in terrorist activities. ā€¢ Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt. CYBER TERRORISM 11
  • 12. TYPES OF CYBER ATTACK BY PERCENTAGE Financial fraud: 11% Sabotage of data/networks: 17% Theft of proprietary information: 20% System penetration from the outside: 25% Denial of service: 27% Unauthorized access by insiders: 71% Employee abuse of internet privileges 79% Viruses 85% 12
  • 13. SAFETY TIPS FOR CYBER CRIME ā€¢ Use antivirus softwareā€™s. ā€¢ Insert firewalls. ā€¢ Uninstall unnecessary software ā€¢ Maintain backup. ā€¢ Check security settings. ā€¢ Stay anonymous - choose a genderless screen name ā€¢ Never give your full name or address to strangers. 13
  • 14. 14
  • 15. CYBER SECURITY ā€¢ Internet security is a branch of computer security specifically related to the Internet. ā€¢ ā€¢ Its objective is to establish rules and measure to use against attacks over the Internet. 15
  • 16. ADVANTAGES OF CYBER SECURITY ā€¢ Defend us from critical attacks. ā€¢ Browse the safe website. ā€¢ Internet security process all the incoming and outgoing data on our computer This Photo by Unknown Author is licensed under CC BY-SA-NC 16
  • 17. CONCLUSION ā€¢ To conclude, we can say that Cyber Crime is a dangerous offense to someone's privacy or any material. Also, we can avoid Cyber Crime by following some basic logical things and using our common sense. Above all, Cyber Crime is a violation of not only law but of human rights too 17
  • 18. REFERENCE Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques Cybercrime: A Reference Handbook 18