SlideShare a Scribd company logo
1 of 19
WELCOME TO THE
PRESENTATION
OVERVIEW OF
THE
PRESENTATION
1. What is Cyber Space and Cyber
Crime?
2. An In depth explanation on what
cyber crime is.
3. Types of cyber crime and their
classification.
4. Causes and reasoning behind the
crime.
5. Consequences and Impact of cyber
crime in society.
6. Preventions.
7. Conclusion and Summary.
Unmasking the dark web:
A journey into the world
of Cyber Crime
CYBER SPACE AND CYBER
CRIME
Cyberspace: The virtual
environment of interconnected
computer networks that
revolutionizes communication,
information sharing, and
transactions.
Cybercrime: Illegal activities
conducted online, including
hacking, identity theft, fraud, and
malware dissemination, posing
significant threats to individuals,
organizations, and governments.
Key Actions: Foster digital
responsibility, collaborate among
stakeholders, and implement
robust security measures to create
a safer online environment.
CYBER CRIME IN DEPTH
• Using Computers as a Tool: In some cases, cybercriminals
utilize computers as a tool to commit various crimes. For
example, they may engage in financial crimes like fraudulent
online transactions or stealing credit card information. Other
activities include distributing spam emails, creating and
spreading viruses, engaging in online scams, or even
conducting cyber terrorism to disrupt computer networks.
• Targeting Computers: In other instances, cybercriminals
focus on targeting computers themselves. This involves
unauthorized access to computer systems, networks, or
personal accounts. They may use techniques like hacking,
where they gain unauthorized access to steal sensitive
information or disrupt services. Other types of attacks include
email bombing (flooding someone's inbox with numerous
emails), data manipulation, or even physically damaging
computer systems.
CYBER CRIME IN DEPTH
• Targeting Computers: In other instances, cybercriminals
focus on targeting computers themselves. This involves
unauthorized access to computer systems, networks, or
personal accounts. They may use techniques like hacking,
where they gain unauthorized access to steal sensitive
information or disrupt services. Other types of attacks include
email bombing (flooding someone's inbox with numerous
emails), data manipulation, or even physically damaging
computer systems. It's important to note that cybercrime is a
constantly evolving landscape. Criminals adapt their methods,
and new types of cybercrimes emerge regularly. As a result, it
can be challenging to classify cybercrimes into distinct
categories since they often overlap or blend . In conclusion,
cybercrime refers to illegal activities that occur in the digital
realm using computers as tools or targets. It encompasses a
wide range of criminal acts, such as financial fraud, hacking,
data theft, and online scams. Understanding the nature of
cybercrime and its potential risks is crucial in safeguarding
ourselves, our personal information, and the digital
infrastructure we rely on.
TYPES OF CYBER CRIME
Types of Cyber Crime: When any crime is committed over
the Internet it is referred to as a cyber crime. There are
many types of cyber crimes and the most common ones
are explained below:
• Hacking.
• Theft
• Cyber stalking
• Identity theft.
• Malicious Software.
Types of Cyber Criminal:
The cyber criminals constitute of
various groups/ category. This
division may be justified on the basis
of the object that they have in their
mind. There are many types of cyber
criminals.
• Children and adolescents between
the age group of 6 – 18 years
• Organized hackers
• Professional hackers / crackers
• Discontented employees
CLASSIFICATION OF CYBER CRIME
Classification of Cyber Crime: The
subject of cyber crime may be broadly
classified under following two groups:
Against Individuals:
• Harassment via e-mails.
• Cyber stalking
• Defamation
• Cheating and Fraud
• Indecent Exposure.
• E-mail spoofing.
• Unauthorized Control and access.
Against Society:
• Child pornography
• Polluting youth through indecent
exposure.
• Trafficking.
• Financial Crimes.
• Sale of illegal articles.
• Online gambling.
• Forger.
CAUSES AND REASONING BEHIND CYBER
CRIME
1.Anonymity and Global Reach: The ability to
remain anonymous and operate globally makes it
challenging to track and apprehend cybercriminals.
2.Financial Gain: The pursuit of monetary profit
drives many cybercriminal activities, such as credit
card fraud, phishing, and online scams.
3.Technological Advancements: Rapid
advancements in technology provide cybercriminals
with new tools and methods to exploit vulnerabilities
in software, networks, and systems.
4.Lack of Cybersecurity Awareness: Insufficient
knowledge and awareness about cybersecurity
make individuals and organizations more
susceptible to cyber threats.
CAUSES AND REASONING BEHIND CYBER
CRIME
1.Poor Regulation and Enforcement: Inadequate laws
and enforcement mechanisms struggle to keep up with
the evolving nature of cybercrime, creating an
environment where criminals can operate with minimal
consequences.
2.Availability of Hacking Tools and Services: The dark
web and underground markets offer easy access to
hacking tools, malware, and hacking services, enabling
even non-technical individuals to engage in
cybercriminal activities.
3.Exploitation of Human Vulnerabilities: Cybercriminals
manipulate human emotions and behaviors through
tactics like social engineering and phishing to gain
unauthorized access or extract sensitive information.
4.State-Sponsored Cyber Attacks: Nation-states and
political groups engage in cyber warfare, espionage, or
sabotage to achieve their objectives, targeting critical
infrastructure and government agencies.
IMPACT
Cybercrime has a profound impact on society, affecting
various aspects of our lives. Firstly, it jeopardizes our
personal and financial security, as cybercriminals target
individuals for identity theft, fraud, and financial scams.
Secondly, it undermines trust in online platforms and
transactions, hindering e-commerce and digital
innovation. Thirdly, it poses a threat to national security,
as cyberattacks can target critical infrastructure,
government systems, and sensitive information. Fourthly,
it perpetuates social inequality, as marginalized
communities often face greater vulnerabilities to
cybercrime. Lastly, cybercrime strains law enforcement
and legal systems, requiring constant adaptation to
combat evolving threats. Addressing cybercrime is
essential to safeguarding individuals, organizations, and
the stability of our society.
IMPACT
Impact of cyber crime over youth and teenagers: These
days a worst fear in teenager‘s eyes is Cyber Bullying.
Cybercrime has a significant impact on youth, particularly
through the widespread issue of cyberbullying. Online
platforms provide avenues for bullies to target and harass
young individuals, causing emotional distress, low self-
esteem, and even depression. The anonymity of the internet
exacerbates the problem, making it harder to identify and
address the perpetrators. Cyberbullying can have long-
lasting effects on the mental health and well-being of young
people, leading to social isolation and decreased academic
performance. It is crucial to raise awareness about
cyberbullying, implement effective prevention strategies,
and provide support systems to protect the youth from
such harmful experiences in the digital world.
Timeline Style
.
2013
2009 2018
Bangladesh
formulated its
National Cyber
Security Strategy
to address cyber
threats and
strengthen
cybersecurity
measures across
the country.
Bangladesh established
the Computer Incident
Response Team
Bangladesh (CIRT) in
2013. It serves as a
central authority to
handle and respond to
cyber incidents,
coordinate efforts among
various stakeholders,
and provide
cybersecurity advice and
guidance.
Bangladesh enacted
the Information and
Communication
Technology (ICT) Act,
which includes
provisions to combat
cybercrime and
punish offenders
involved in activities
such as hacking,
identity theft, and
cyberbullying.
PREVENTION OF CYBER CRIME
Prevention of Cyber Crime : Prevention is always better
than cure. It is always better to take certain precaution
while operating the net.
Always avoid sending any photograph online particularly
to strangers and chat friends as there have been incidents
of misuse of the photographs.
To prevent cyber stalking avoid disclosing any
information pertaining to one self. This is as good as
disclosing your identity to strangers in public place.
Always keep a watch on the sites that your children are
accessing to prevent any kind of harassment or
depravation in children.
Never send your credit card number to any site that is
not secured, to guard against frauds.
To prevent porn site for children under 18 years.
Block pornographic sites on the Internet, which is the
primary source of the photos and videos that transmits
through Social networking sites
Summar
y
1. What is Cyber Space and Cyber
Crime?
2. An In depth explanation on what
cyber crime is.
3. Types of cyber crime and their
classification.
4. Causes and reasoning behind the
crime.
5. Consequences and Impact of cyber
crime in society.
6. Preventions.
Summary
Internet
ANY
QUESTION
S?
THANK YOU

More Related Content

Similar to Cyber crime

Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)Priyatham Kanigarla
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simonudhaya jeni
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptxMehedi Hasan
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfkirtigoyal328
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 

Similar to Cyber crime (20)

Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 

Recently uploaded

Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectBoston Institute of Analytics
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改yuu sss
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsVICTOR MAESTRE RAMIREZ
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)jennyeacort
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home ServiceSapana Sha
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfchwongval
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 

Recently uploaded (20)

Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis Project
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdf
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 

Cyber crime

  • 2. OVERVIEW OF THE PRESENTATION 1. What is Cyber Space and Cyber Crime? 2. An In depth explanation on what cyber crime is. 3. Types of cyber crime and their classification. 4. Causes and reasoning behind the crime. 5. Consequences and Impact of cyber crime in society. 6. Preventions. 7. Conclusion and Summary.
  • 3. Unmasking the dark web: A journey into the world of Cyber Crime
  • 4.
  • 5. CYBER SPACE AND CYBER CRIME Cyberspace: The virtual environment of interconnected computer networks that revolutionizes communication, information sharing, and transactions. Cybercrime: Illegal activities conducted online, including hacking, identity theft, fraud, and malware dissemination, posing significant threats to individuals, organizations, and governments. Key Actions: Foster digital responsibility, collaborate among stakeholders, and implement robust security measures to create a safer online environment.
  • 6. CYBER CRIME IN DEPTH • Using Computers as a Tool: In some cases, cybercriminals utilize computers as a tool to commit various crimes. For example, they may engage in financial crimes like fraudulent online transactions or stealing credit card information. Other activities include distributing spam emails, creating and spreading viruses, engaging in online scams, or even conducting cyber terrorism to disrupt computer networks. • Targeting Computers: In other instances, cybercriminals focus on targeting computers themselves. This involves unauthorized access to computer systems, networks, or personal accounts. They may use techniques like hacking, where they gain unauthorized access to steal sensitive information or disrupt services. Other types of attacks include email bombing (flooding someone's inbox with numerous emails), data manipulation, or even physically damaging computer systems.
  • 7. CYBER CRIME IN DEPTH • Targeting Computers: In other instances, cybercriminals focus on targeting computers themselves. This involves unauthorized access to computer systems, networks, or personal accounts. They may use techniques like hacking, where they gain unauthorized access to steal sensitive information or disrupt services. Other types of attacks include email bombing (flooding someone's inbox with numerous emails), data manipulation, or even physically damaging computer systems. It's important to note that cybercrime is a constantly evolving landscape. Criminals adapt their methods, and new types of cybercrimes emerge regularly. As a result, it can be challenging to classify cybercrimes into distinct categories since they often overlap or blend . In conclusion, cybercrime refers to illegal activities that occur in the digital realm using computers as tools or targets. It encompasses a wide range of criminal acts, such as financial fraud, hacking, data theft, and online scams. Understanding the nature of cybercrime and its potential risks is crucial in safeguarding ourselves, our personal information, and the digital infrastructure we rely on.
  • 8. TYPES OF CYBER CRIME Types of Cyber Crime: When any crime is committed over the Internet it is referred to as a cyber crime. There are many types of cyber crimes and the most common ones are explained below: • Hacking. • Theft • Cyber stalking • Identity theft. • Malicious Software. Types of Cyber Criminal: The cyber criminals constitute of various groups/ category. This division may be justified on the basis of the object that they have in their mind. There are many types of cyber criminals. • Children and adolescents between the age group of 6 – 18 years • Organized hackers • Professional hackers / crackers • Discontented employees
  • 9. CLASSIFICATION OF CYBER CRIME Classification of Cyber Crime: The subject of cyber crime may be broadly classified under following two groups: Against Individuals: • Harassment via e-mails. • Cyber stalking • Defamation • Cheating and Fraud • Indecent Exposure. • E-mail spoofing. • Unauthorized Control and access. Against Society: • Child pornography • Polluting youth through indecent exposure. • Trafficking. • Financial Crimes. • Sale of illegal articles. • Online gambling. • Forger.
  • 10. CAUSES AND REASONING BEHIND CYBER CRIME 1.Anonymity and Global Reach: The ability to remain anonymous and operate globally makes it challenging to track and apprehend cybercriminals. 2.Financial Gain: The pursuit of monetary profit drives many cybercriminal activities, such as credit card fraud, phishing, and online scams. 3.Technological Advancements: Rapid advancements in technology provide cybercriminals with new tools and methods to exploit vulnerabilities in software, networks, and systems. 4.Lack of Cybersecurity Awareness: Insufficient knowledge and awareness about cybersecurity make individuals and organizations more susceptible to cyber threats.
  • 11. CAUSES AND REASONING BEHIND CYBER CRIME 1.Poor Regulation and Enforcement: Inadequate laws and enforcement mechanisms struggle to keep up with the evolving nature of cybercrime, creating an environment where criminals can operate with minimal consequences. 2.Availability of Hacking Tools and Services: The dark web and underground markets offer easy access to hacking tools, malware, and hacking services, enabling even non-technical individuals to engage in cybercriminal activities. 3.Exploitation of Human Vulnerabilities: Cybercriminals manipulate human emotions and behaviors through tactics like social engineering and phishing to gain unauthorized access or extract sensitive information. 4.State-Sponsored Cyber Attacks: Nation-states and political groups engage in cyber warfare, espionage, or sabotage to achieve their objectives, targeting critical infrastructure and government agencies.
  • 12. IMPACT Cybercrime has a profound impact on society, affecting various aspects of our lives. Firstly, it jeopardizes our personal and financial security, as cybercriminals target individuals for identity theft, fraud, and financial scams. Secondly, it undermines trust in online platforms and transactions, hindering e-commerce and digital innovation. Thirdly, it poses a threat to national security, as cyberattacks can target critical infrastructure, government systems, and sensitive information. Fourthly, it perpetuates social inequality, as marginalized communities often face greater vulnerabilities to cybercrime. Lastly, cybercrime strains law enforcement and legal systems, requiring constant adaptation to combat evolving threats. Addressing cybercrime is essential to safeguarding individuals, organizations, and the stability of our society.
  • 13. IMPACT Impact of cyber crime over youth and teenagers: These days a worst fear in teenager‘s eyes is Cyber Bullying. Cybercrime has a significant impact on youth, particularly through the widespread issue of cyberbullying. Online platforms provide avenues for bullies to target and harass young individuals, causing emotional distress, low self- esteem, and even depression. The anonymity of the internet exacerbates the problem, making it harder to identify and address the perpetrators. Cyberbullying can have long- lasting effects on the mental health and well-being of young people, leading to social isolation and decreased academic performance. It is crucial to raise awareness about cyberbullying, implement effective prevention strategies, and provide support systems to protect the youth from such harmful experiences in the digital world.
  • 14. Timeline Style . 2013 2009 2018 Bangladesh formulated its National Cyber Security Strategy to address cyber threats and strengthen cybersecurity measures across the country. Bangladesh established the Computer Incident Response Team Bangladesh (CIRT) in 2013. It serves as a central authority to handle and respond to cyber incidents, coordinate efforts among various stakeholders, and provide cybersecurity advice and guidance. Bangladesh enacted the Information and Communication Technology (ICT) Act, which includes provisions to combat cybercrime and punish offenders involved in activities such as hacking, identity theft, and cyberbullying.
  • 15. PREVENTION OF CYBER CRIME Prevention of Cyber Crime : Prevention is always better than cure. It is always better to take certain precaution while operating the net. Always avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs. To prevent cyber stalking avoid disclosing any information pertaining to one self. This is as good as disclosing your identity to strangers in public place. Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children. Never send your credit card number to any site that is not secured, to guard against frauds. To prevent porn site for children under 18 years. Block pornographic sites on the Internet, which is the primary source of the photos and videos that transmits through Social networking sites
  • 17. 1. What is Cyber Space and Cyber Crime? 2. An In depth explanation on what cyber crime is. 3. Types of cyber crime and their classification. 4. Causes and reasoning behind the crime. 5. Consequences and Impact of cyber crime in society. 6. Preventions. Summary Internet