SlideShare a Scribd company logo
1 of 15
CYBER CRIME
PLAN
 Introduction
 History
 Cyber Threat Evoulation
 Cyber Criminals
 Categories of Cyber Crime
 Typesof Cyber Crime
 Cyber Crimes in Tunisia
 Conclusion
INTRODUCTION
• Internet crime or Cyber Crime is a term used to broadly describe
criminal and illegal activity in which computers or computer networks
are a tool, a target, or a place of criminal activity and include
everything from electronic cracking to denial of service attacks
• It is also used to include traditional crimes in which computers or
networks are used to enable the illicit activity
HISTORY
The first recorded cyber crime took place in the year 1820
The first spam email took place in 1976 when it was sent out over the ARPANT.
The first VIRUS was installed on an Apple computer in 1982
CYBER THREAT EVOULATION
 The Cyber criminal community is evoulved from Morris Worm to the
ransomware and other organized crime That have high payoff and
contiously changingandaffecting brutally nations
1997
• Malicios code
• Trojen
• Advanced Worms
2004
• Identity theft
• Phishing
2007
• DNS attacks
• Rise of Botnets
• SQL attacks
• Anti Spam sites
2010
• Social Engineering
• Maliclious Email
• Ransomware attack
2013
• Banking Malware
• Keylogger
• Android Hack
• Stealer
• Bitcoin wallet
CYBER CRIMINALS
 Cybercriminals are individuals or teams of people like, Hackers, criminals groups,
hacktivists, virus writers, terrorists who use technology to commit malicious activities on
digital systems or networks with the intention of stealing sensitive company information or
personal data, andgeneratingprofit.
CATEGORIES OF CYBER CRIME
Cyber Criminals used the computer as :
• Target: using a computer to attacks other computer, e.g. Hacking, virus/Worms attacks, Dos
attack etc.
• weapon : using a computer to commit realworld crime e.g. cyber terrorism, credit card fraud and
pornography etc.
 Cyber Crimescan be categorized to three :
Against Person
Against Property
Against Government
Against Person
• Harassment via emails,
• cyber stalking,
• email spoofing,
• carding,
• assault by threat.
• The potential harm of such a
crime to humanity can hardly
be overstated
Against Property
• Cybercrimes against all
forms of property.
• Unauthorized computer
trespassing through
cyberspace
• computer vandalism
• transmission of harmful
programs
• unauthorized possession of
computerized information
Against Government
• unauthorized possession of
computerized information,
• The growth of Internet has shown
that the medium of Cyberspace is
being used by individuals and
groups to the international
governments as also to threaten
the citizens of a country.
• This crimemanifests itself into
terrorism when an individual
"cracks“ into a government or
military maintained website
TYPES OF CYBER CRIME
 Hacking :
 Hacking in simple terms means an illegal intrusion or unauthorized access to or control over a computer
system and/or network.
 Denial of Service(DOS) :
 Act by the criminal, who floods the bandwidth of the victims network or Internet serveris flooded with
continuous requests so as to crash the server •
 Its an attempt to makea machine or network resource unavailable to its intended users
 Virus Dissemination :
 Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail
bombing etc.)
 Computer Vandalism:
 Damaging or destroying data rather than stealing.
 Transmitting virus to destroy system files.
 Software Piracy :
 Theft of software through the illegal copying of genuine programs.
 The counterfeiting and distribution of products intended to pass for the original,
 CreditCard Fraud :
 Personal information stolen from a card, or the theft of a card itself, can be used to commitfraud.
 Fraudsters might use the information to purchase goods in your nameor obtain unauthorized funds from an
account.
 Net Extortion :
 Copying of someone’s confidential data in order to extort for huge amount,
 Ransomware :
 Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the
system's screen or by locking the users' files unless a ransom is paid.
 Phishing :
 To request confidential information over the internet or by telephone under false pretenses in orderto fraudulently
obtain credit card numbers, passwords, or other personal data.
 ChildPornography :
 The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more
homes have access to internet,
 more children would be using the internet and more are the chances of falling victim to the aggression of
Pedophiles.
 Cyber Terrorism :
 Use of Internet based attacks in terrorist activities.
 Terrorist attacks on the Internet is by distributed denial of service attacks,
 hate websites and hate emails,
 attacks on sensitive computer networks, etc.
 . • Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
CYBER CRIMES IN TUNISIA
 In 2013 a study by the IDC (International Data Corporation), The dangerous world of counterfeit and pirated
software commissioned by Microsoft estimated that 33% of all software in the world was counterfeit and estimated
that on the global scale the phenomenon cost 114 billion dollars.
 In Africa, the twelve countries with the most infected IT infrastructure are: Libya (98%), Zimbabwe (92%),Algeria (84%),
Cameroon (83%), Nigeria (82%), IvoryCoast (81%), Kenya (78%), Senegal (78%), Tunisia (74%),Morocco (66%)and
Mauritius (57%).
 An earlier study by BSA in 2011estimated that the proportion of pirated software in the whole of Africa and the Middle
East was of 58%
 Members of Anonymous, known as Anons, also became famous for launching attacks against government agencies in
the United States, Israel, Senegal, Tunisia, Uganda, etc.
CONCLUSION
Technology is destructive only in the hands of people who do
not realize that they are one and the same process as the
universe.it is highly likely that cyber crime and its hackers
will continue developing and upgrading to stay ahead of the
law.
THANK YOU FOR YOUR ATTENTION

More Related Content

Similar to cyber_crime (1).pptx

Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaDr. Arun Verma
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxBigBoss647822
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cybercrime
CybercrimeCybercrime
CybercrimeFraz Ali
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 

Similar to cyber_crime (1).pptx (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
pravallika chowdary
pravallika chowdarypravallika chowdary
pravallika chowdary
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 

Recently uploaded

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escortsindian call girls near you
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Recently uploaded (20)

Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 

cyber_crime (1).pptx

  • 2. PLAN  Introduction  History  Cyber Threat Evoulation  Cyber Criminals  Categories of Cyber Crime  Typesof Cyber Crime  Cyber Crimes in Tunisia  Conclusion
  • 3. INTRODUCTION • Internet crime or Cyber Crime is a term used to broadly describe criminal and illegal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks • It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity
  • 4. HISTORY The first recorded cyber crime took place in the year 1820 The first spam email took place in 1976 when it was sent out over the ARPANT. The first VIRUS was installed on an Apple computer in 1982
  • 5. CYBER THREAT EVOULATION  The Cyber criminal community is evoulved from Morris Worm to the ransomware and other organized crime That have high payoff and contiously changingandaffecting brutally nations
  • 6. 1997 • Malicios code • Trojen • Advanced Worms 2004 • Identity theft • Phishing 2007 • DNS attacks • Rise of Botnets • SQL attacks • Anti Spam sites 2010 • Social Engineering • Maliclious Email • Ransomware attack 2013 • Banking Malware • Keylogger • Android Hack • Stealer • Bitcoin wallet
  • 7. CYBER CRIMINALS  Cybercriminals are individuals or teams of people like, Hackers, criminals groups, hacktivists, virus writers, terrorists who use technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, andgeneratingprofit.
  • 8. CATEGORIES OF CYBER CRIME Cyber Criminals used the computer as : • Target: using a computer to attacks other computer, e.g. Hacking, virus/Worms attacks, Dos attack etc. • weapon : using a computer to commit realworld crime e.g. cyber terrorism, credit card fraud and pornography etc.  Cyber Crimescan be categorized to three : Against Person Against Property Against Government
  • 9. Against Person • Harassment via emails, • cyber stalking, • email spoofing, • carding, • assault by threat. • The potential harm of such a crime to humanity can hardly be overstated Against Property • Cybercrimes against all forms of property. • Unauthorized computer trespassing through cyberspace • computer vandalism • transmission of harmful programs • unauthorized possession of computerized information Against Government • unauthorized possession of computerized information, • The growth of Internet has shown that the medium of Cyberspace is being used by individuals and groups to the international governments as also to threaten the citizens of a country. • This crimemanifests itself into terrorism when an individual "cracks“ into a government or military maintained website
  • 10. TYPES OF CYBER CRIME  Hacking :  Hacking in simple terms means an illegal intrusion or unauthorized access to or control over a computer system and/or network.  Denial of Service(DOS) :  Act by the criminal, who floods the bandwidth of the victims network or Internet serveris flooded with continuous requests so as to crash the server •  Its an attempt to makea machine or network resource unavailable to its intended users  Virus Dissemination :  Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)  Computer Vandalism:  Damaging or destroying data rather than stealing.  Transmitting virus to destroy system files.
  • 11.  Software Piracy :  Theft of software through the illegal copying of genuine programs.  The counterfeiting and distribution of products intended to pass for the original,  CreditCard Fraud :  Personal information stolen from a card, or the theft of a card itself, can be used to commitfraud.  Fraudsters might use the information to purchase goods in your nameor obtain unauthorized funds from an account.  Net Extortion :  Copying of someone’s confidential data in order to extort for huge amount,  Ransomware :  Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.  Phishing :  To request confidential information over the internet or by telephone under false pretenses in orderto fraudulently obtain credit card numbers, passwords, or other personal data.
  • 12.  ChildPornography :  The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet,  more children would be using the internet and more are the chances of falling victim to the aggression of Pedophiles.  Cyber Terrorism :  Use of Internet based attacks in terrorist activities.  Terrorist attacks on the Internet is by distributed denial of service attacks,  hate websites and hate emails,  attacks on sensitive computer networks, etc.  . • Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 13. CYBER CRIMES IN TUNISIA  In 2013 a study by the IDC (International Data Corporation), The dangerous world of counterfeit and pirated software commissioned by Microsoft estimated that 33% of all software in the world was counterfeit and estimated that on the global scale the phenomenon cost 114 billion dollars.  In Africa, the twelve countries with the most infected IT infrastructure are: Libya (98%), Zimbabwe (92%),Algeria (84%), Cameroon (83%), Nigeria (82%), IvoryCoast (81%), Kenya (78%), Senegal (78%), Tunisia (74%),Morocco (66%)and Mauritius (57%).  An earlier study by BSA in 2011estimated that the proportion of pirated software in the whole of Africa and the Middle East was of 58%  Members of Anonymous, known as Anons, also became famous for launching attacks against government agencies in the United States, Israel, Senegal, Tunisia, Uganda, etc.
  • 14. CONCLUSION Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law.
  • 15. THANK YOU FOR YOUR ATTENTION