SlideShare a Scribd company logo
1 of 14
Critical analysis on cyber crimeCritical analysis on cyber crime
Presented ByPresented By
Name :Depankar Chakraborty
Identification No: 14-1-21-0011
Batch :21st
(A)
Department of Law, ASA University Bangladesh
ContentsContents
 Definition of cyber crimeDefinition of cyber crime
 History of cyber crimeHistory of cyber crime
 Categories of Cyber CrimeCategories of Cyber Crime
 Types of Cyber CrimeTypes of Cyber Crime
 How we make secured our computer orHow we make secured our computer or
other devices from Cyber Crime?other devices from Cyber Crime?
 Combating computer crimeCombating computer crime
 ConclusionConclusion
History of cyber crimeHistory of cyber crime
 Cybercrime first started with hackers trying toCybercrime first started with hackers trying to
break into computer networks. Some did it justbreak into computer networks. Some did it just
for the thrill of accessing high-level securityfor the thrill of accessing high-level security
networks, but others sought to gain sensitive,networks, but others sought to gain sensitive,
classified material. Eventually, criminalsclassified material. Eventually, criminals
started to infect computer systems withstarted to infect computer systems with
computer viruses, which led to breakdowns oncomputer viruses, which led to breakdowns on
personal and business computers.personal and business computers.
What is Cyber Crime?What is Cyber Crime?
 Cybercrime, also called computer crime, isCybercrime, also called computer crime, is
any illegal activity that involves a computerany illegal activity that involves a computer
or network-connected device, such as aor network-connected device, such as a
mobile phone.mobile phone.
Categories of Cyber CrimeCategories of Cyber Crime
 We can categorizeWe can categorize
Cyber Crime Into TwoCyber Crime Into Two
Categories:Categories:
1.1. The Computer as a target:-The Computer as a target:-
Using a Computer to attackUsing a Computer to attack
other computer.other computer.
e.g. Hacking, virus attack,e.g. Hacking, virus attack,
DOS attackDOS attack
2. The Computer as a2. The Computer as a
Weapon:- Using aWeapon:- Using a
computer to commit realcomputer to commit real
world crime, e.g. Cyberworld crime, e.g. Cyber
terrorism, Credit cardterrorism, Credit card
fraud, pornography .fraud, pornography .
Types of Cyber CrimeTypes of Cyber Crime
 1. Hacking1. Hacking:-In simple words, hacking is an act:-In simple words, hacking is an act
committed by an intruder by accessing yourcommitted by an intruder by accessing your
computer system without your permission.computer system without your permission.
 SQL Injections:SQL Injections: An SQL injection is aAn SQL injection is a
technique that allows hackers to play upon thetechnique that allows hackers to play upon the
security vulnerabilities of the software thatsecurity vulnerabilities of the software that
runs a web site.runs a web site.
Types of Cyber CrimeTypes of Cyber Crime
 Theft of FTP Passwords:Theft of FTP Passwords: This is another veryThis is another very
common way to tamper with web sites.common way to tamper with web sites.
Types of Cyber CrimeTypes of Cyber Crime
 Virus disseminationVirus dissemination:-:-
Viruses are computerViruses are computer
programs that attachprograms that attach
themselves to or infect athemselves to or infect a
system or files, andsystem or files, and
have a tendency tohave a tendency to
circulate to othercirculate to other
computers on a network.computers on a network.
Types of Cyber CrimeTypes of Cyber Crime
 Child Pornography: The internet is being highly usedChild Pornography: The internet is being highly used
by it abusers to reach and abuse children sexually,by it abusers to reach and abuse children sexually,
Worldwide.Worldwide.
 Cyber-bullying.Cyber-bullying.
 Email spam and phishing.Email spam and phishing.
 Identity theft.Identity theft.
 Prohibited offensive and illegal content.Prohibited offensive and illegal content.
 Online scams or fraud.Online scams or fraud.
 Online trading issues.Online trading issues.
How we make secured ourHow we make secured our
computer or other devices fromcomputer or other devices from
Cyber Crime?Cyber Crime?
 We need to keep our computer current with the latestWe need to keep our computer current with the latest
patches and updates.patches and updates.
 We need to Make sure our computer is configuredWe need to Make sure our computer is configured
securely.securely.
 Choose strong passwords and keep them safe.Choose strong passwords and keep them safe.
 We need to protect our computer with securityWe need to protect our computer with security
software.software.
 WE need to Protect our personal information.WE need to Protect our personal information.
 Review bank and credit card statements regularly.Review bank and credit card statements regularly.
Combating computer crimeCombating computer crime
InvestigationInvestigation
&&
LegislationLegislation
AwarenessAwareness
Diffusion of cybercrimeDiffusion of cybercrime
PenaltiesPenalties
ConclusionConclusion
Cyber Crime is indeedCyber Crime is indeed
getting the recognitiongetting the recognition
deserves. However, it is notdeserves. However, it is not
going to rusticated thatgoing to rusticated that
easily. In fact, it is highlyeasily. In fact, it is highly
likely that cyber crime andlikely that cyber crime and
its hackers will continueits hackers will continue
developing and upgrading todeveloping and upgrading to
stay ahead of the law.stay ahead of the law.
So to make us safe ,we mustSo to make us safe ,we must
need cyber security.need cyber security.

More Related Content

What's hot

What's hot (19)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 

Similar to Cyber crime

Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crimeAman Kumar
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber lawYagnesh Garud
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Skills Academy
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptJatinRajput67
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 

Similar to Cyber crime (20)

Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Tracking and Surveillance
Tracking and SurveillanceTracking and Surveillance
Tracking and Surveillance
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 

Recently uploaded

FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955Abheet Mangleek
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 

Recently uploaded (20)

FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 

Cyber crime

  • 1. Critical analysis on cyber crimeCritical analysis on cyber crime
  • 2. Presented ByPresented By Name :Depankar Chakraborty Identification No: 14-1-21-0011 Batch :21st (A) Department of Law, ASA University Bangladesh
  • 3. ContentsContents  Definition of cyber crimeDefinition of cyber crime  History of cyber crimeHistory of cyber crime  Categories of Cyber CrimeCategories of Cyber Crime  Types of Cyber CrimeTypes of Cyber Crime  How we make secured our computer orHow we make secured our computer or other devices from Cyber Crime?other devices from Cyber Crime?  Combating computer crimeCombating computer crime  ConclusionConclusion
  • 4.
  • 5. History of cyber crimeHistory of cyber crime  Cybercrime first started with hackers trying toCybercrime first started with hackers trying to break into computer networks. Some did it justbreak into computer networks. Some did it just for the thrill of accessing high-level securityfor the thrill of accessing high-level security networks, but others sought to gain sensitive,networks, but others sought to gain sensitive, classified material. Eventually, criminalsclassified material. Eventually, criminals started to infect computer systems withstarted to infect computer systems with computer viruses, which led to breakdowns oncomputer viruses, which led to breakdowns on personal and business computers.personal and business computers.
  • 6. What is Cyber Crime?What is Cyber Crime?  Cybercrime, also called computer crime, isCybercrime, also called computer crime, is any illegal activity that involves a computerany illegal activity that involves a computer or network-connected device, such as aor network-connected device, such as a mobile phone.mobile phone.
  • 7. Categories of Cyber CrimeCategories of Cyber Crime  We can categorizeWe can categorize Cyber Crime Into TwoCyber Crime Into Two Categories:Categories: 1.1. The Computer as a target:-The Computer as a target:- Using a Computer to attackUsing a Computer to attack other computer.other computer. e.g. Hacking, virus attack,e.g. Hacking, virus attack, DOS attackDOS attack 2. The Computer as a2. The Computer as a Weapon:- Using aWeapon:- Using a computer to commit realcomputer to commit real world crime, e.g. Cyberworld crime, e.g. Cyber terrorism, Credit cardterrorism, Credit card fraud, pornography .fraud, pornography .
  • 8. Types of Cyber CrimeTypes of Cyber Crime  1. Hacking1. Hacking:-In simple words, hacking is an act:-In simple words, hacking is an act committed by an intruder by accessing yourcommitted by an intruder by accessing your computer system without your permission.computer system without your permission.  SQL Injections:SQL Injections: An SQL injection is aAn SQL injection is a technique that allows hackers to play upon thetechnique that allows hackers to play upon the security vulnerabilities of the software thatsecurity vulnerabilities of the software that runs a web site.runs a web site.
  • 9. Types of Cyber CrimeTypes of Cyber Crime  Theft of FTP Passwords:Theft of FTP Passwords: This is another veryThis is another very common way to tamper with web sites.common way to tamper with web sites.
  • 10. Types of Cyber CrimeTypes of Cyber Crime  Virus disseminationVirus dissemination:-:- Viruses are computerViruses are computer programs that attachprograms that attach themselves to or infect athemselves to or infect a system or files, andsystem or files, and have a tendency tohave a tendency to circulate to othercirculate to other computers on a network.computers on a network.
  • 11. Types of Cyber CrimeTypes of Cyber Crime  Child Pornography: The internet is being highly usedChild Pornography: The internet is being highly used by it abusers to reach and abuse children sexually,by it abusers to reach and abuse children sexually, Worldwide.Worldwide.  Cyber-bullying.Cyber-bullying.  Email spam and phishing.Email spam and phishing.  Identity theft.Identity theft.  Prohibited offensive and illegal content.Prohibited offensive and illegal content.  Online scams or fraud.Online scams or fraud.  Online trading issues.Online trading issues.
  • 12. How we make secured ourHow we make secured our computer or other devices fromcomputer or other devices from Cyber Crime?Cyber Crime?  We need to keep our computer current with the latestWe need to keep our computer current with the latest patches and updates.patches and updates.  We need to Make sure our computer is configuredWe need to Make sure our computer is configured securely.securely.  Choose strong passwords and keep them safe.Choose strong passwords and keep them safe.  We need to protect our computer with securityWe need to protect our computer with security software.software.  WE need to Protect our personal information.WE need to Protect our personal information.  Review bank and credit card statements regularly.Review bank and credit card statements regularly.
  • 13. Combating computer crimeCombating computer crime InvestigationInvestigation && LegislationLegislation AwarenessAwareness Diffusion of cybercrimeDiffusion of cybercrime PenaltiesPenalties
  • 14. ConclusionConclusion Cyber Crime is indeedCyber Crime is indeed getting the recognitiongetting the recognition deserves. However, it is notdeserves. However, it is not going to rusticated thatgoing to rusticated that easily. In fact, it is highlyeasily. In fact, it is highly likely that cyber crime andlikely that cyber crime and its hackers will continueits hackers will continue developing and upgrading todeveloping and upgrading to stay ahead of the law.stay ahead of the law. So to make us safe ,we mustSo to make us safe ,we must need cyber security.need cyber security.