SlideShare a Scribd company logo
1 of 1
Download to read offline
Cybercrime:
Cybercrime is defined as a crime in which a computer is the object of the crime or is used as a
tool to commit an offense.
Categories of Cyber Crime:
The Computer as a Target: Using a computer to attack another computer.
Example: Virus Attack, DOS Attack, Hacking ETC
The Computer as a Weapon: Using A computer to Commit Real World Crime.
Example: Pornography, Cyber Terrorism ETC
Examples of Cyber Crime:
Identity Theft the illegal use of someone else's personal information
Payment fraud is any type of false or illegal transaction completed by a cybercriminal.
Hacking is the un-authorised access to or control over computer network security systems for
some illicit purpose
Piracy is the illegal copying, distribution, or use of software
Cyber-extortion is a crime involving an attack or threat of an attack against an enterprise.
Cyber-terrorism is the use of the Internet to conduct violent acts
Prevention Tips:
 Keep your computer current with the latest patches and updates.
 Make sure your computer is configured securely.
 Choose strong passwords and keep them safe.
 Protect your computer with security software.
 Protect your personal information.
 Online offers that look too good to be true usually are.
 Review bank and credit card statements regularly.

More Related Content

Similar to Cybercrime

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
Priya Saluja
 

Similar to Cybercrime (20)

Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber crime by riyaz mulla
Cyber crime by riyaz mullaCyber crime by riyaz mulla
Cyber crime by riyaz mulla
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

More from Mahmud Hasan Tanvir

More from Mahmud Hasan Tanvir (16)

DATABASE MANAGEMENT SYSTEM
DATABASE MANAGEMENT SYSTEMDATABASE MANAGEMENT SYSTEM
DATABASE MANAGEMENT SYSTEM
 
ANALOG-TO-DIGITAL CONVERSION
ANALOG-TO-DIGITAL CONVERSIONANALOG-TO-DIGITAL CONVERSION
ANALOG-TO-DIGITAL CONVERSION
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer Fundamental
Computer FundamentalComputer Fundamental
Computer Fundamental
 
Chemistry Fundamentals
Chemistry FundamentalsChemistry Fundamentals
Chemistry Fundamentals
 
C++ QNA
C++ QNAC++ QNA
C++ QNA
 
Attributes in Entity-Relationship Model
Attributes in Entity-Relationship ModelAttributes in Entity-Relationship Model
Attributes in Entity-Relationship Model
 
Applications of Radioisotopes.pdf
Applications of Radioisotopes.pdfApplications of Radioisotopes.pdf
Applications of Radioisotopes.pdf
 
Arithmetic Expression
Arithmetic ExpressionArithmetic Expression
Arithmetic Expression
 
FOUR DIFFERENT TYPES OF WRITING STYLES
FOUR DIFFERENT TYPES OF WRITING STYLESFOUR DIFFERENT TYPES OF WRITING STYLES
FOUR DIFFERENT TYPES OF WRITING STYLES
 
Fable.docx
Fable.docxFable.docx
Fable.docx
 
Basic C Programming Lab Practice
Basic C Programming Lab PracticeBasic C Programming Lab Practice
Basic C Programming Lab Practice
 
Rape in Rural Bangladesh.pdf
Rape in Rural Bangladesh.pdfRape in Rural Bangladesh.pdf
Rape in Rural Bangladesh.pdf
 
First Law Of Thermodynamics.pdf
First Law Of Thermodynamics.pdfFirst Law Of Thermodynamics.pdf
First Law Of Thermodynamics.pdf
 
Difference between a variable and a constant.pdf
Difference between a variable and a constant.pdfDifference between a variable and a constant.pdf
Difference between a variable and a constant.pdf
 
Defects In Image Formation By Lenses.pdf
Defects In Image Formation By Lenses.pdfDefects In Image Formation By Lenses.pdf
Defects In Image Formation By Lenses.pdf
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Recently uploaded (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Cybercrime

  • 1. Cybercrime: Cybercrime is defined as a crime in which a computer is the object of the crime or is used as a tool to commit an offense. Categories of Cyber Crime: The Computer as a Target: Using a computer to attack another computer. Example: Virus Attack, DOS Attack, Hacking ETC The Computer as a Weapon: Using A computer to Commit Real World Crime. Example: Pornography, Cyber Terrorism ETC Examples of Cyber Crime: Identity Theft the illegal use of someone else's personal information Payment fraud is any type of false or illegal transaction completed by a cybercriminal. Hacking is the un-authorised access to or control over computer network security systems for some illicit purpose Piracy is the illegal copying, distribution, or use of software Cyber-extortion is a crime involving an attack or threat of an attack against an enterprise. Cyber-terrorism is the use of the Internet to conduct violent acts Prevention Tips:  Keep your computer current with the latest patches and updates.  Make sure your computer is configured securely.  Choose strong passwords and keep them safe.  Protect your computer with security software.  Protect your personal information.  Online offers that look too good to be true usually are.  Review bank and credit card statements regularly.