SlideShare a Scribd company logo
1 of 16
TYPES OF CYBER CRIME
 HACKING IS THE ACT OF ILLEGALLY ACCESSING
THE COMPTUTER SYSTEM/ NETWORK OF AN
INDIVIDUAL , GROUP OR BUSINESS ENTERPRISE
WITHOUT THE CONCENT OR APPROVAL OF THE
OWNER OF THE SYSTEM.
 CRACKING IS A HIGHER FROM OF HACKING IN
WHICH THE UNAUTHORIXED ACCESS
CULMINATES WITH THE PROCESS OF
DEFEATING THE SECURITY SYSTEM FOR RHE
PURPOSE OF ACQUIRING MONEY OR
INFORMATION AND/OR AVAILING OF FREE
SERVICES.
 ONE OF THE VERY PREVELANT COMPUTER
CRIMES IN THE PHILIPPINES , THE SENDING OF
MALICIOUS AND DEFAMATORY ELECTRONIC
MAILS HAS RENDERED OBSOLETE THE
TRADITIONAL ‘’SNAIL-THREAT-MAIL AND HAS
LIKEWISE BECOME A NEW MEDIUM IN
EXTORTING MONEY, OR THREATERING
PROSPECTIVE VICTIMS.
 THE TRAFFICKING , DISTRIBUTION , POSTING AND
DISSEMINATION OF OBSCENE MATERIALS INCLUDING
CHILDRENS NUDE PICTURES, INDECENT EXPOSURE , AND
CHILD SEX SLAVERY POSTED INTO THE INTERNET , LIVE
STREAMING VIDEOS AIRED THROUGHT THE INTERNET
UNDER A CERTAIN FEE CONSTITUTES ONE OF THE MOST
IMPORTANT CYBERCRIMES KNOWN TODAY.
 A LARGE NUMBER OF INTERNET PORNOGRAPHY SITES (
FRIENDS , JACECOOL, NETVENTURES , CAMCONTACTS)
OFFER ITS SURFERS LIVE STEEAMING WEB CHAT WHEREIN
CHATTERS CAN CHAT WITH A GIRL OF HIS CHOICE “REAL
TIME” IN EXCHANGE OF A CERTAIN FEE. SITE ACTRESSES
OR MODEL UNDER THE ASIAN CATEGORY ARE MOSTLY
FILIPINAS AND FEE RANGE FROM $2.00- PER $3.99 PER
MINUTE.
 A COMPUTER VIRUS IS A COMPUTER PROGRAM THAT
CAN COPY ITSELF AND INFECT A COMPUTER
WITHOUT PERMISSIN OR KNOWLEDGE OF THE USER.
THE ORIGINAL MAY MODIFY THE COPIES OR THE
COPIES MAY MODIFY THEMSELVES.
 A VIRUS CAN ONLY SPREAD FROM THE ONE
COMPUTER TO ANOTHER WHEN ITS HOST IS TAKEN
TO THE UNINFECTED COMPUTER , FOR INSTANCE BY
A USER SENDING IT OVER A NETWORK OR CARRYING
IT ON A REMOVABLE MEDIUM SUCH AS A FLOPPY
DISK, CD ,OR USB DRIVE.
 DDOS ATTACKS CAN BE COMMITTED BY
EMPLOYING MULTIPLE COMPUTERS
CONTROLLED BY A SINGLE MASTER
COMPUTER SERVER TO TARGET A
PARTICULAR SERVER BY BOMBARDING IT
WITH THOUSANDS OF PACKETS OF DATA
IN AN ATTEMPT TO OVERWHELM THE
DERVER AND CAUSE IT TI CRASH.
 WEBSITE DEFACEMENT IS THE
UNAUTHORIXED MODIFICATION OF A
WEBSITE.
 IN THE PRIVACY OF YOUR OWN HOME, IF YOU
DO MOT FEEL LIKE GOING TO THE MALL TO BU
SOMETHING , YOU CAN ALWAYSVISIT AN
ONLINE SHOP (E COMMERCE WEBSITE ) AND
YOU SEARCE ALMOST ANYTHING RANGING
FROM GOODS TO SERVICES AND BUY/ AVAIL IT
WITH JUST A CLICK OF THE MOUSE.
 HACKERS PREFER VISA, AMERICAN EXPRESS
AND MASTERCARD WHEN FILTERING CREDIT
CARD INFORMATION. IT IS BECAUSE VISA AND
MASTERCARD ARE WIDELY ACCEPTED BY
ALMOST ALL INTERNET SHOPPING SITES
Presentation1

More Related Content

What's hot (6)

Security, Copyright and the Law
Security, Copyright and the LawSecurity, Copyright and the Law
Security, Copyright and the Law
 
Internet culture
Internet cultureInternet culture
Internet culture
 
IE Business School (J)
IE Business School (J) IE Business School (J)
IE Business School (J)
 
Social Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer SocietySocial Media and Privacy - National Conference, Australian Computer Society
Social Media and Privacy - National Conference, Australian Computer Society
 
Incentive: getting started
Incentive: getting startedIncentive: getting started
Incentive: getting started
 
Interview with the web’s creator
Interview with the web’s creatorInterview with the web’s creator
Interview with the web’s creator
 

Viewers also liked

Hardawere Y Sistemas Operativos
Hardawere Y Sistemas OperativosHardawere Y Sistemas Operativos
Hardawere Y Sistemas Operativos
juanxope18
 

Viewers also liked (12)

World IA Day, London: IA at GOV.UK
World IA Day, London: IA at GOV.UKWorld IA Day, London: IA at GOV.UK
World IA Day, London: IA at GOV.UK
 
Reunion de personal. 22 2-11
Reunion de personal. 22 2-11Reunion de personal. 22 2-11
Reunion de personal. 22 2-11
 
Атлетический клуб "Аксон"
Атлетический клуб "Аксон"Атлетический клуб "Аксон"
Атлетический клуб "Аксон"
 
Painting Projects Two
Painting Projects TwoPainting Projects Two
Painting Projects Two
 
Hardawere Y Sistemas Operativos
Hardawere Y Sistemas OperativosHardawere Y Sistemas Operativos
Hardawere Y Sistemas Operativos
 
Bavaria
BavariaBavaria
Bavaria
 
Πανελλαδική Πολιτική Έρευνα Σεπτέμβριος 2016
Πανελλαδική Πολιτική Έρευνα Σεπτέμβριος 2016Πανελλαδική Πολιτική Έρευνα Σεπτέμβριος 2016
Πανελλαδική Πολιτική Έρευνα Σεπτέμβριος 2016
 
El hombre del camino
El hombre del caminoEl hombre del camino
El hombre del camino
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Film Poster Drafts
Film Poster DraftsFilm Poster Drafts
Film Poster Drafts
 
Modo de produccion esclavista
Modo de produccion esclavistaModo de produccion esclavista
Modo de produccion esclavista
 
Muerta de frío
Muerta de fríoMuerta de frío
Muerta de frío
 

Similar to Presentation1

Challenges in The Virtual.pptx
Challenges in The Virtual.pptxChallenges in The Virtual.pptx
Challenges in The Virtual.pptx
AneSieras
 
Challenges in The Virtual.pdf
Challenges in The Virtual.pdfChallenges in The Virtual.pdf
Challenges in The Virtual.pdf
AneSieras
 

Similar to Presentation1 (20)

Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cybersecurity-101_4
cybersecurity-101_4cybersecurity-101_4
cybersecurity-101_4
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Dangers of Computer devices
Dangers of Computer devices Dangers of Computer devices
Dangers of Computer devices
 
Cybersecurity #SciChallenge2017
Cybersecurity #SciChallenge2017Cybersecurity #SciChallenge2017
Cybersecurity #SciChallenge2017
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
E-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptxE-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptx
 
Saloni & Niyati comp project.pptx
Saloni & Niyati comp project.pptxSaloni & Niyati comp project.pptx
Saloni & Niyati comp project.pptx
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Challenges in The Virtual.pptx
Challenges in The Virtual.pptxChallenges in The Virtual.pptx
Challenges in The Virtual.pptx
 
challengesinthevirtual-221002110839-58eb5f0b.pdf
challengesinthevirtual-221002110839-58eb5f0b.pdfchallengesinthevirtual-221002110839-58eb5f0b.pdf
challengesinthevirtual-221002110839-58eb5f0b.pdf
 
Challenges in The Virtual.pdf
Challenges in The Virtual.pdfChallenges in The Virtual.pdf
Challenges in The Virtual.pdf
 

Recently uploaded

Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdfFinancial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
MinawBelay
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 

Recently uploaded (20)

“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdfFinancial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 

Presentation1

  • 2.  HACKING IS THE ACT OF ILLEGALLY ACCESSING THE COMPTUTER SYSTEM/ NETWORK OF AN INDIVIDUAL , GROUP OR BUSINESS ENTERPRISE WITHOUT THE CONCENT OR APPROVAL OF THE OWNER OF THE SYSTEM.
  • 3.
  • 4.  CRACKING IS A HIGHER FROM OF HACKING IN WHICH THE UNAUTHORIXED ACCESS CULMINATES WITH THE PROCESS OF DEFEATING THE SECURITY SYSTEM FOR RHE PURPOSE OF ACQUIRING MONEY OR INFORMATION AND/OR AVAILING OF FREE SERVICES.
  • 5.
  • 6.  ONE OF THE VERY PREVELANT COMPUTER CRIMES IN THE PHILIPPINES , THE SENDING OF MALICIOUS AND DEFAMATORY ELECTRONIC MAILS HAS RENDERED OBSOLETE THE TRADITIONAL ‘’SNAIL-THREAT-MAIL AND HAS LIKEWISE BECOME A NEW MEDIUM IN EXTORTING MONEY, OR THREATERING PROSPECTIVE VICTIMS.
  • 7.
  • 8.  THE TRAFFICKING , DISTRIBUTION , POSTING AND DISSEMINATION OF OBSCENE MATERIALS INCLUDING CHILDRENS NUDE PICTURES, INDECENT EXPOSURE , AND CHILD SEX SLAVERY POSTED INTO THE INTERNET , LIVE STREAMING VIDEOS AIRED THROUGHT THE INTERNET UNDER A CERTAIN FEE CONSTITUTES ONE OF THE MOST IMPORTANT CYBERCRIMES KNOWN TODAY.  A LARGE NUMBER OF INTERNET PORNOGRAPHY SITES ( FRIENDS , JACECOOL, NETVENTURES , CAMCONTACTS) OFFER ITS SURFERS LIVE STEEAMING WEB CHAT WHEREIN CHATTERS CAN CHAT WITH A GIRL OF HIS CHOICE “REAL TIME” IN EXCHANGE OF A CERTAIN FEE. SITE ACTRESSES OR MODEL UNDER THE ASIAN CATEGORY ARE MOSTLY FILIPINAS AND FEE RANGE FROM $2.00- PER $3.99 PER MINUTE.
  • 9.
  • 10.  A COMPUTER VIRUS IS A COMPUTER PROGRAM THAT CAN COPY ITSELF AND INFECT A COMPUTER WITHOUT PERMISSIN OR KNOWLEDGE OF THE USER. THE ORIGINAL MAY MODIFY THE COPIES OR THE COPIES MAY MODIFY THEMSELVES.  A VIRUS CAN ONLY SPREAD FROM THE ONE COMPUTER TO ANOTHER WHEN ITS HOST IS TAKEN TO THE UNINFECTED COMPUTER , FOR INSTANCE BY A USER SENDING IT OVER A NETWORK OR CARRYING IT ON A REMOVABLE MEDIUM SUCH AS A FLOPPY DISK, CD ,OR USB DRIVE.
  • 11.
  • 12.  DDOS ATTACKS CAN BE COMMITTED BY EMPLOYING MULTIPLE COMPUTERS CONTROLLED BY A SINGLE MASTER COMPUTER SERVER TO TARGET A PARTICULAR SERVER BY BOMBARDING IT WITH THOUSANDS OF PACKETS OF DATA IN AN ATTEMPT TO OVERWHELM THE DERVER AND CAUSE IT TI CRASH.
  • 13.
  • 14.  WEBSITE DEFACEMENT IS THE UNAUTHORIXED MODIFICATION OF A WEBSITE.
  • 15.  IN THE PRIVACY OF YOUR OWN HOME, IF YOU DO MOT FEEL LIKE GOING TO THE MALL TO BU SOMETHING , YOU CAN ALWAYSVISIT AN ONLINE SHOP (E COMMERCE WEBSITE ) AND YOU SEARCE ALMOST ANYTHING RANGING FROM GOODS TO SERVICES AND BUY/ AVAIL IT WITH JUST A CLICK OF THE MOUSE.  HACKERS PREFER VISA, AMERICAN EXPRESS AND MASTERCARD WHEN FILTERING CREDIT CARD INFORMATION. IT IS BECAUSE VISA AND MASTERCARD ARE WIDELY ACCEPTED BY ALMOST ALL INTERNET SHOPPING SITES