SlideShare a Scribd company logo
1 of 9
 Cybercrime, also known as computer crime, by use
of a computer as an tool for criminal activities,
such as fraud, child pornography, data stealing and
privacy breaches.
 Technology has been a wonderful invention, one of
the best of which is the Internet, which is like a sea
of web pages for information, but it has become a
cruse for man by giving birth to cybercrime
nowadays.
I
• Hacking means trespassing remotely into a computer
device or network .
• Hackers write or use computer programs ready-made to
attack the target machine .
• Some hackers hack for personal gains, such as stealing
credit card information, transferring money to their own
account from different bank accounts .
• The most selected locations for the hackers are
government websites .
• The Internet is highly used as a medium for child sexual
abuse.
• The pornographic contents are easily available on the
internet.
• Contact the kids / teens in different chat rooms
• Get Friendly
• By offer them some money or to make a false promise
• Using them as sex objects or sell private information or
images over the internet.
 Piracy in software refers to the illegal
copying of genuine software's
 Such crimes also include :
• copyright violations,
• trademarks,
• computer source code theft,
• patent violations and so on
• Privacy refers to an individual's right to determine when, how and to
what extent it will share his or her personal data with others.
• Privacy breach involves unauthorized use or release of personal data.
• Confidentiality means non-disclosure to unauthorized or unwanted
persons of the information.
• In addition to Personal Information, some other type of information that
is useful for business and leakage of such information to other persons
may cause business or person damage should be protected from such
information.
Phishing is a type of social
engineering attack often used to steal
user data including passwords for
login and numbers for credit cards. It
happens when a victim is fooled into
opening an email, instant
message or text message by an
attacker classified as a trusted third
party.
Cybercrime Types and Risks

More Related Content

What's hot

Technology and Education
Technology and EducationTechnology and Education
Technology and EducationUfraShahidkhan
 
Mobile Phone Addiction
Mobile Phone Addiction Mobile Phone Addiction
Mobile Phone Addiction kangus314
 
The smartphone addiction
The smartphone addictionThe smartphone addiction
The smartphone addictionDilek Göymen
 
Technology in education
Technology in educationTechnology in education
Technology in educationShafeeque Pm
 
Technology In Education
Technology  In  EducationTechnology  In  Education
Technology In EducationShailaja Shah
 
Smart Boards
Smart BoardsSmart Boards
Smart Boardstech4101
 
Smartphone Presentation by Jamin Stodel
Smartphone Presentation by Jamin StodelSmartphone Presentation by Jamin Stodel
Smartphone Presentation by Jamin Stodeljsto20
 
Impact of technology on education
Impact of technology on educationImpact of technology on education
Impact of technology on educationSrikanth Gelli
 
Online education vs classroom teaching
Online education vs classroom teachingOnline education vs classroom teaching
Online education vs classroom teachingSteve Johnson
 
Negative Effects Of Technology On Children
Negative Effects Of Technology On ChildrenNegative Effects Of Technology On Children
Negative Effects Of Technology On Childrenguest2630606
 
Digital addiction with special reference to smartphone
Digital addiction with special reference to smartphoneDigital addiction with special reference to smartphone
Digital addiction with special reference to smartphoneSaksham Sharma
 
Regular vs online education
Regular vs online educationRegular vs online education
Regular vs online educationDev Agrawal
 
The importance of technology in education
The importance of technology in education The importance of technology in education
The importance of technology in education Eliza Batomalaque
 
Advantages of disadvantages of using the computer
Advantages of disadvantages of using the computerAdvantages of disadvantages of using the computer
Advantages of disadvantages of using the computerMissNDuncan
 
The effect of technology on today's society ppt
The effect of technology on today's society pptThe effect of technology on today's society ppt
The effect of technology on today's society pptoacore
 
Technology in our society
Technology in our societyTechnology in our society
Technology in our societyPaulo Arieu
 
use of mobile phones in school/colleges
use of mobile phones in school/collegesuse of mobile phones in school/colleges
use of mobile phones in school/collegesdig2015
 

What's hot (20)

Technology and Education
Technology and EducationTechnology and Education
Technology and Education
 
Mobile Phone Addiction
Mobile Phone Addiction Mobile Phone Addiction
Mobile Phone Addiction
 
The smartphone addiction
The smartphone addictionThe smartphone addiction
The smartphone addiction
 
Technology in education
Technology in educationTechnology in education
Technology in education
 
Online vs traditional education.
Online vs traditional education.Online vs traditional education.
Online vs traditional education.
 
ICT in Education
ICT in EducationICT in Education
ICT in Education
 
Technology In Education
Technology  In  EducationTechnology  In  Education
Technology In Education
 
Smart Boards
Smart BoardsSmart Boards
Smart Boards
 
Mobile addiction
Mobile addictionMobile addiction
Mobile addiction
 
Smartphone Presentation by Jamin Stodel
Smartphone Presentation by Jamin StodelSmartphone Presentation by Jamin Stodel
Smartphone Presentation by Jamin Stodel
 
Impact of technology on education
Impact of technology on educationImpact of technology on education
Impact of technology on education
 
Online education vs classroom teaching
Online education vs classroom teachingOnline education vs classroom teaching
Online education vs classroom teaching
 
Negative Effects Of Technology On Children
Negative Effects Of Technology On ChildrenNegative Effects Of Technology On Children
Negative Effects Of Technology On Children
 
Digital addiction with special reference to smartphone
Digital addiction with special reference to smartphoneDigital addiction with special reference to smartphone
Digital addiction with special reference to smartphone
 
Regular vs online education
Regular vs online educationRegular vs online education
Regular vs online education
 
The importance of technology in education
The importance of technology in education The importance of technology in education
The importance of technology in education
 
Advantages of disadvantages of using the computer
Advantages of disadvantages of using the computerAdvantages of disadvantages of using the computer
Advantages of disadvantages of using the computer
 
The effect of technology on today's society ppt
The effect of technology on today's society pptThe effect of technology on today's society ppt
The effect of technology on today's society ppt
 
Technology in our society
Technology in our societyTechnology in our society
Technology in our society
 
use of mobile phones in school/colleges
use of mobile phones in school/collegesuse of mobile phones in school/colleges
use of mobile phones in school/colleges
 

Similar to Cybercrime Types and Risks

cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxJoelGautham
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 

Similar to Cybercrime Types and Risks (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Cybercrime Types and Risks

  • 1.
  • 2.  Cybercrime, also known as computer crime, by use of a computer as an tool for criminal activities, such as fraud, child pornography, data stealing and privacy breaches.  Technology has been a wonderful invention, one of the best of which is the Internet, which is like a sea of web pages for information, but it has become a cruse for man by giving birth to cybercrime nowadays.
  • 3.
  • 4. I • Hacking means trespassing remotely into a computer device or network . • Hackers write or use computer programs ready-made to attack the target machine . • Some hackers hack for personal gains, such as stealing credit card information, transferring money to their own account from different bank accounts . • The most selected locations for the hackers are government websites .
  • 5. • The Internet is highly used as a medium for child sexual abuse. • The pornographic contents are easily available on the internet. • Contact the kids / teens in different chat rooms • Get Friendly • By offer them some money or to make a false promise • Using them as sex objects or sell private information or images over the internet.
  • 6.  Piracy in software refers to the illegal copying of genuine software's  Such crimes also include : • copyright violations, • trademarks, • computer source code theft, • patent violations and so on
  • 7. • Privacy refers to an individual's right to determine when, how and to what extent it will share his or her personal data with others. • Privacy breach involves unauthorized use or release of personal data. • Confidentiality means non-disclosure to unauthorized or unwanted persons of the information. • In addition to Personal Information, some other type of information that is useful for business and leakage of such information to other persons may cause business or person damage should be protected from such information.
  • 8. Phishing is a type of social engineering attack often used to steal user data including passwords for login and numbers for credit cards. It happens when a victim is fooled into opening an email, instant message or text message by an attacker classified as a trusted third party.