Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber crime ppt


Published on

Cyber crime

Published in: Technology
  • Writing a good research paper isn't easy and it's the fruit of hard work. For help you can check writing expert. Check out, please ⇒ ⇐ I think they are the best
    Are you sure you want to  Yes  No
    Your message goes here
  • Dating for everyone is here: ❤❤❤ ❤❤❤
    Are you sure you want to  Yes  No
    Your message goes here
  • Dating direct: ❶❶❶ ❶❶❶
    Are you sure you want to  Yes  No
    Your message goes here

Cyber crime ppt

  1. 1. Cyber Terriosim…..
  2. 2. Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. The U.S. Department of Justice expands the definition of cybercrime to include any illegal activity that uses a computer for the storage of evidence. What Is Cyber Crime ?
  3. 3.  1. Phishing  2. Hacking  3. Stalking and/or Harassment  4. Spam  5.Fraud  6. Obscene or offensive content
  4. 4. Phishing is the practice of sending fraudulent emails in an attempt to trick the recipient, usually for the purpose of obtaining money. The elderly are particularly vulnerable to these types of cyber crime.
  5. 5. Hacking is similar to digital trespassing. Hackers infiltrate online networks to illegally download confidential information, manipulate functions and in some cases steal identities that can be used to fraudulently purchase goods online.
  6. 6. Not all types of cyber crime involve money. Some cyber criminals use the Internet as a cover for other illegal behaviors like stalking, harassment and in lesser cases, bullying.
  7. 7. Spam, or the unsolicited sending of bulk email for commercial purposes, is unlawful in some jurisdictions. While anti-spam laws are relatively new, limits on unsolicited electronic communications have existed for some time.
  8. 8. Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss.
  9. 9. The content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons. In some instances these communications may be illegal.
  10. 10.  1. Loss Of Revenue  2. Wasted Time  3. Damaged Reputations  4. Reduced Productivity
  11. 11. One of the main effects of cyber crime on a company is a loss of revenue. This loss can be caused by an outside party who obtains sensitive financial information, using it to withdraw funds from an organization. It can also occur when a business's e-commerce site becomes compromised-while inoperable, valuable income is lost when consumers are unable to use the site.
  12. 12. Another major effect or consequence of cyber crime is the time that is wasted when IT personnel must devote great portions of their day handling such incidences. Rather than working on productive measures for an organization, many IT staff members spend a large percentage of their time handling security breaches and other problems associated with cyber crime.
  13. 13. In cases where customer records are compromised by a security breach associated with cyber crime, a company's reputation can take a major hit. Customers whose credit cards or other financial data become intercepted by hackers or other infiltrators lose confidence in an organization and often begin taking their business elsewhere.
  14. 14. Due to the measures that many companies must implement to counteract cyber crime, there is often a negative effect on employees' productivity. This is because, due to security measures, employees must enter more passwords and perform other time- consuming acts in order to do their jobs. Every second wasted performing these tasks is a second not spent working in a productive manner.
  15. 15.  1. Ease of Anonymity  2. Holding a Grudge  3. Thrill of the Game
  16. 16. Computer crime has risen at an astronomical rate, in large part due to the ease with which a perpetrator can remain undetected or anonymous. It is much easier to get away with criminal activity in a cyber world than in the real world. However, the ability to track IP network addresses is becoming greater all the time, making it harder to remain invisible when online. Still, there is a strong sense of anonymity that can draw otherwise respectable citizens to abandon their ethics in pursuit of personal gain.
  17. 17. Malicious computer codes like worms and viruses are often spread by someone who is seeking to cause harm to an individual or company--possibly over losing a job, perceived unethical business conduct or maybe even jealousy or envy. Such parties intend to destroy or cripple their targets for the personal satisfaction of seeing them suffer the effects.
  18. 18. For many computer criminals, the excitement and challenge of exploiting a computer system can be too great to resist. Computer gurus are notorious for gleaning information about specific networks and software designs that they have an irresistible urge to put to a test. Unfortunately, much of this information translates into illegally compromising computer systems in one way or another. Still, the lure of "cracking the code" will continue to be a major factor in enticing some to commit computer crimes.
  19. 19. 1.Be Smart 2.Be Safe 3.Be Cautious 4.Stay Updated 5.Pay Securely
  20. 20. Do not provide personal details online to people you have never met. This concept is simple; you do not usually give your personal information to a stranger you met on the street. The same rules apply on the Internet. When you are required to provide some basic information ensure that you are doing so at trusted websites. However, never reply to emails from unknown senders asking you for personal information. Never provide your online banking information online to anyone.
  21. 21. Protect your computer from hackers and malware by installing a firewall, anti-virus software, and anti- spyware software. Beware of free anti- spyware software as some of these will automatically install malware on your computer. Download these programs from trusted websites. Keep your anti- virus software up-to-date by updating the latest virus definitions regularly.
  22. 22. Check the terms of use when installing new software on your computer. Be extra cautious when installing free software downloaded from the Internet. Many of these apparently "free" programs come with hidden programs that install malware on your computer without your knowledge.
  23. 23. Keep your Internet browser up-to- date. Security threats are discovered on a daily basis. Always install the latest version on your computer. Update your operating system and other software installed on your computer with the latest security patches and updates.
  24. 24. Make online payments only on website that have an encrypted connection. Websites that have a security certificate start with "https://" and not "http://". You can verify whether the website is secure by looking for the small padlock icon in your browser window.
  25. 25. Computer crime isn’t victimless. Millions of people lose money to ruthless cyber criminals every year, and some are actually physically harmed by people they meet online. When you’re using the Web, remember to stay alert, stay aware and protect your information. The threat of cyber crime is real, so act accordingly
  26. 26. Say No To Cyber Crime !! The End Thank You Bushra