SlideShare a Scribd company logo
1 of 9
1
© AIR LAW ACADEMY & RESEARCH CENTRE,
NAGPUR
Email has fast emerged as the world's most
preferred form of communication. Billions of
email messages traverse the globe daily. Like
any other form of communication, email is also
misused by criminal elements. The ease, speed
and relative anonymity of email has made it a
powerful tool for criminals.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
2
 Email frauds
 Email spoofing
 Sending malicious codes through email
 Email bombing
 Sending threatening emails
 Defamatory emails
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 3
Email frauds are very often used to commit
financial crimes. It becomes a simple thing not
just to assume someone else's identity but
also to hide one's own. The person committing
the crime understands that there is very little
chance of his actually being identified.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
4
A spoofed email is one that appears to originate
from one source but has actually emerged from
another source. Falsifying the name and email
address of the originator of the email usually
does email spoofing.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 5
Emails are often the fastest and easiest ways to
propagate malicious code over the Internet.
Hackers often bind Trojans, viruses, worms and
other computer contaminants with e-greeting
cards and then email them to unsuspecting
persons. Such contaminants can also be bound
with software that appears to be an anti-virus
patch.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 6
 Email bombing refers to sending a large
amount of emails to the victim resulting in the
victim's email account or servers crashing.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 7
Email is a useful tool for technology savvy
criminals thanks to the relative anonymity
offered by it. It becomes fairly easy for anyone
with even a basic knowledge of computers to
become a blackmailer by threatening someone
via e-mail.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 8
Cyber-defamation or even cyber-slander as it
is called can prove to be very harmful and
even fatal to the people who have been made
its victims.
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 9

More Related Content

What's hot (20)

Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
 
E mail Investigation
E mail InvestigationE mail Investigation
E mail Investigation
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Reconnaissance
ReconnaissanceReconnaissance
Reconnaissance
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Nature of crime
Nature of crimeNature of crime
Nature of crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Criminal Investigations (Part One)
Criminal Investigations (Part One)Criminal Investigations (Part One)
Criminal Investigations (Part One)
 
Forensic/Investigation report writing techniques
Forensic/Investigation report writing techniquesForensic/Investigation report writing techniques
Forensic/Investigation report writing techniques
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Viewers also liked

Perseguição e honra de deus
Perseguição e honra de deusPerseguição e honra de deus
Perseguição e honra de deusRodrigo Mendonça
 
Nzcom writing for the journal.pptx with sound
Nzcom writing for the journal.pptx with soundNzcom writing for the journal.pptx with sound
Nzcom writing for the journal.pptx with soundNZCollegeofMidwives
 
Is PMP Certification Worth Getting?
Is PMP Certification Worth Getting?Is PMP Certification Worth Getting?
Is PMP Certification Worth Getting?Cognixia
 
25 websites/blogs for your photography inspiration
25 websites/blogs for your photography inspiration25 websites/blogs for your photography inspiration
25 websites/blogs for your photography inspirationSinca Beni
 
IDCC 218 Pa relatif au temps partiel dérogatoire
IDCC 218 Pa relatif au temps partiel dérogatoireIDCC 218 Pa relatif au temps partiel dérogatoire
IDCC 218 Pa relatif au temps partiel dérogatoireMame Mariéme Traoré
 
Chinh sach quang cao nganh tham my - Facebook Support
Chinh sach quang cao nganh tham my - Facebook SupportChinh sach quang cao nganh tham my - Facebook Support
Chinh sach quang cao nganh tham my - Facebook Supporthoanghuydigital
 
Eurostat exportations de biens
Eurostat exportations de biensEurostat exportations de biens
Eurostat exportations de biensSociété Tripalio
 
Applying a public policy lens to environmental decision making
Applying a public policy lens to environmental decision makingApplying a public policy lens to environmental decision making
Applying a public policy lens to environmental decision makingMegan Evans
 
Bibblio - Distribution to Discovery
Bibblio - Distribution to DiscoveryBibblio - Distribution to Discovery
Bibblio - Distribution to DiscoveryMads Holmen
 
5 aula 11 esparta e atenas
5   aula 11 esparta e atenas5   aula 11 esparta e atenas
5 aula 11 esparta e atenasprofdu
 

Viewers also liked (14)

Perseguição e honra de deus
Perseguição e honra de deusPerseguição e honra de deus
Perseguição e honra de deus
 
Eurostat déficit public
Eurostat déficit publicEurostat déficit public
Eurostat déficit public
 
Nzcom writing for the journal.pptx with sound
Nzcom writing for the journal.pptx with soundNzcom writing for the journal.pptx with sound
Nzcom writing for the journal.pptx with sound
 
Is PMP Certification Worth Getting?
Is PMP Certification Worth Getting?Is PMP Certification Worth Getting?
Is PMP Certification Worth Getting?
 
EL Complete Group Presentation
EL Complete Group PresentationEL Complete Group Presentation
EL Complete Group Presentation
 
Teleasistencia
TeleasistenciaTeleasistencia
Teleasistencia
 
25 websites/blogs for your photography inspiration
25 websites/blogs for your photography inspiration25 websites/blogs for your photography inspiration
25 websites/blogs for your photography inspiration
 
IDCC 218 Pa relatif au temps partiel dérogatoire
IDCC 218 Pa relatif au temps partiel dérogatoireIDCC 218 Pa relatif au temps partiel dérogatoire
IDCC 218 Pa relatif au temps partiel dérogatoire
 
Chinh sach quang cao nganh tham my - Facebook Support
Chinh sach quang cao nganh tham my - Facebook SupportChinh sach quang cao nganh tham my - Facebook Support
Chinh sach quang cao nganh tham my - Facebook Support
 
Eurostat exportations de biens
Eurostat exportations de biensEurostat exportations de biens
Eurostat exportations de biens
 
Applying a public policy lens to environmental decision making
Applying a public policy lens to environmental decision makingApplying a public policy lens to environmental decision making
Applying a public policy lens to environmental decision making
 
Bibblio - Distribution to Discovery
Bibblio - Distribution to DiscoveryBibblio - Distribution to Discovery
Bibblio - Distribution to Discovery
 
179D Tax Deduction PowerPoint Show 2016
179D Tax Deduction PowerPoint Show  2016179D Tax Deduction PowerPoint Show  2016
179D Tax Deduction PowerPoint Show 2016
 
5 aula 11 esparta e atenas
5   aula 11 esparta e atenas5   aula 11 esparta e atenas
5 aula 11 esparta e atenas
 

Similar to Email crime ppt

TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxErrorError22
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethicsJohnlery Guzman
 
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docxBest e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docxikirkton
 
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docxBest e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docxAASTHA76
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxjonadhe mondeja
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigationNimishaRawat
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017Shyam Pareek
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 

Similar to Email crime ppt (20)

TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
 
Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques Phishing mails: Bonnes pratiques
Phishing mails: Bonnes pratiques
 
Spam
SpamSpam
Spam
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docxBest e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
 
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docxBest e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
Stalking2
Stalking2Stalking2
Stalking2
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
internet security
internet securityinternet security
internet security
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 

Recently uploaded

Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesFinlaw Associates
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 

Recently uploaded (20)

Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and Challenges
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 

Email crime ppt

  • 1. 1 © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 2. Email has fast emerged as the world's most preferred form of communication. Billions of email messages traverse the globe daily. Like any other form of communication, email is also misused by criminal elements. The ease, speed and relative anonymity of email has made it a powerful tool for criminals. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 2
  • 3.  Email frauds  Email spoofing  Sending malicious codes through email  Email bombing  Sending threatening emails  Defamatory emails © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 3
  • 4. Email frauds are very often used to commit financial crimes. It becomes a simple thing not just to assume someone else's identity but also to hide one's own. The person committing the crime understands that there is very little chance of his actually being identified. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 4
  • 5. A spoofed email is one that appears to originate from one source but has actually emerged from another source. Falsifying the name and email address of the originator of the email usually does email spoofing. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 5
  • 6. Emails are often the fastest and easiest ways to propagate malicious code over the Internet. Hackers often bind Trojans, viruses, worms and other computer contaminants with e-greeting cards and then email them to unsuspecting persons. Such contaminants can also be bound with software that appears to be an anti-virus patch. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 6
  • 7.  Email bombing refers to sending a large amount of emails to the victim resulting in the victim's email account or servers crashing. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 7
  • 8. Email is a useful tool for technology savvy criminals thanks to the relative anonymity offered by it. It becomes fairly easy for anyone with even a basic knowledge of computers to become a blackmailer by threatening someone via e-mail. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 8
  • 9. Cyber-defamation or even cyber-slander as it is called can prove to be very harmful and even fatal to the people who have been made its victims. © AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR 9