SlideShare a Scribd company logo
1 of 18
Cyber Crime 
ritesh,tushar and nitish
Crime committed using a computer and the internet to 
steal a person’s identity or illegal imports or malicious 
programs cybercrime is nothing but where the computer 
used as an object or subject of crime
The first recorded cyber crime took place in the year 
1820 That is not surprising considering the fact that the 
abacus, which is thought to be the earliest form of a 
computer, has been around since 3500 B.C.
 HACKING 
 CHILD PORNOGRAPHY 
 DENIAL OF SERVICE ATTACK 
 VIRUS DISSEMINITION 
 COMPUTER VANDALISM 
 CYBER TERRORISM 
 SOFTWARE PIRACY
Hacking in simple terms 
means an illegal intrusion 
into a computer system 
and/or network. It is also 
known as CRACKING. 
Government websites are 
the hot targets of the 
hackers due to the press 
coverage, it receives. 
Hackers enjoy the media 
coverage.
The Internet is being highly used by its abusers to reach 
and abuse children sexually, worldwide. As more homes 
have access to internet, more children would be using 
the internet and more are the chances of falling victim to 
the aggression of pedophiles.
 This is an act by the criminal, who floods the bandwidth 
of the victims network or fills his e-mail box with spam 
mail depriving him of the services he is entitled to access 
or provide
Damaging or destroying data rather than stealing or 
misusing them is called cyber vandalism. Transmitting 
virus: These are programs that attach themselves to a 
file and then circulate .
Malicious software that attaches itself to other software. 
(virus, worms, Trojan Horse, web jacking, e-mail 
bombing etc)
Terrorist attacks on the Internet is by distributed denial of 
service attacks, hate websites and hate emails, attacks 
on sensitive computer networks, etc. Technology savvy 
terrorists are using 512-bit encryption, which is 
impossible to decrypt.
Theft of software through the illegal copying of genuine 
programs or the counterfeiting and distribution of 
products intended to pass for the original.
Five hackers have been charged in what’s being called the biggest data breach in U.S. 
history. 
Yesterday, federal prosecutors announced that they’ve indicted five cyber criminals 
responsible for a hack that cost targeted companies more than $300 million. Prosecutors 
say the five men, who are from Russia and Ukraine, stole and sold at least 160 credit card 
numbers. Two of the suspects are in custody. 
The hacked companies include Nasdaq, Visa Inc., J.C. Penney Co., JetBlue Airways Corp. 
and Carrefour SA. 
According to authorities, each of the men had specialized tasks—two hacked into 
networks, another mined them for data, another provided anonymous web-hosting services 
to hide the group’s activities, and another sold the stolen data and distributed the profits. 
“This type of crime is the cutting edge,” New Jersey U.S. Attorney Paul J. Fishman said in 
a statement. “Those who have the expertise and the inclination to break into our computer 
networks threaten our economic wellbeing, our privacy and our national security.
Are you Protected?
Internet security is a branch 
of computer security specifically 
related to the Internet. 
It's objective is to establish rules 
and measure to use against 
attacks over the Internet.
 Use antivirus software’s 
 insert firewalls 
 uninstall unnecessary software 
 maintain backup 
 check security settings 
 Stay anonymous - choose a genderless screen name 
 Never give your full name or address to strangers
 The cyber security will defend us from critical attacks. 
 It helps us to browse the safe website. 
 Internet security process all the incoming and outgoing 
data on our computer.
Cyber crime ppt

More Related Content

What's hot

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 

What's hot (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Viewers also liked (10)

Eptik makalah
Eptik makalahEptik makalah
Eptik makalah
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 

Similar to Cyber crime ppt

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 

Similar to Cyber crime ppt (20)

UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crimes.pptx
Cyber Crimes.pptxCyber Crimes.pptx
Cyber Crimes.pptx
 
cyber crime
 cyber crime  cyber crime
cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 

Recently uploaded

一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
B
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
AS
 
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
Fi
 
一比一原版(Design毕业证书)新加坡科技设计大学毕业证原件一模一样
一比一原版(Design毕业证书)新加坡科技设计大学毕业证原件一模一样一比一原版(Design毕业证书)新加坡科技设计大学毕业证原件一模一样
一比一原版(Design毕业证书)新加坡科技设计大学毕业证原件一模一样
AS
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
AS
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
c6eb683559b3
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
apekaom
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
AS
 
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
musaddumba454
 
原版定制(Glasgow毕业证书)英国格拉斯哥大学毕业证原件一模一样
原版定制(Glasgow毕业证书)英国格拉斯哥大学毕业证原件一模一样原版定制(Glasgow毕业证书)英国格拉斯哥大学毕业证原件一模一样
原版定制(Glasgow毕业证书)英国格拉斯哥大学毕业证原件一模一样
AS
 

Recently uploaded (20)

The Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfThe Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdf
 
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
 
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
 
Subdomain enumeration is a crucial phase in cybersecurity, particularly durin...
Subdomain enumeration is a crucial phase in cybersecurity, particularly durin...Subdomain enumeration is a crucial phase in cybersecurity, particularly durin...
Subdomain enumeration is a crucial phase in cybersecurity, particularly durin...
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
 
一比一原版(Design毕业证书)新加坡科技设计大学毕业证原件一模一样
一比一原版(Design毕业证书)新加坡科技设计大学毕业证原件一模一样一比一原版(Design毕业证书)新加坡科技设计大学毕业证原件一模一样
一比一原版(Design毕业证书)新加坡科技设计大学毕业证原件一模一样
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
 
HUMANIZE YOUR BRAND - FREE E-WORKBOOK Download Now
HUMANIZE YOUR BRAND - FREE E-WORKBOOK Download NowHUMANIZE YOUR BRAND - FREE E-WORKBOOK Download Now
HUMANIZE YOUR BRAND - FREE E-WORKBOOK Download Now
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
 
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
 
Washington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers ShirtWashington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers Shirt
 
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
VIP ℂall Girls Bangalore 8250077686 WhatsApp: Me All Time Serviℂe Available D...
VIP ℂall Girls Bangalore 8250077686 WhatsApp: Me All Time Serviℂe Available D...VIP ℂall Girls Bangalore 8250077686 WhatsApp: Me All Time Serviℂe Available D...
VIP ℂall Girls Bangalore 8250077686 WhatsApp: Me All Time Serviℂe Available D...
 
原版定制(Glasgow毕业证书)英国格拉斯哥大学毕业证原件一模一样
原版定制(Glasgow毕业证书)英国格拉斯哥大学毕业证原件一模一样原版定制(Glasgow毕业证书)英国格拉斯哥大学毕业证原件一模一样
原版定制(Glasgow毕业证书)英国格拉斯哥大学毕业证原件一模一样
 

Cyber crime ppt

  • 2. Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where the computer used as an object or subject of crime
  • 3. The first recorded cyber crime took place in the year 1820 That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C.
  • 4.  HACKING  CHILD PORNOGRAPHY  DENIAL OF SERVICE ATTACK  VIRUS DISSEMINITION  COMPUTER VANDALISM  CYBER TERRORISM  SOFTWARE PIRACY
  • 5.
  • 6. Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.
  • 7. The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles.
  • 8.  This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide
  • 9. Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate .
  • 10. Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc)
  • 11. Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 12. Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 13. Five hackers have been charged in what’s being called the biggest data breach in U.S. history. Yesterday, federal prosecutors announced that they’ve indicted five cyber criminals responsible for a hack that cost targeted companies more than $300 million. Prosecutors say the five men, who are from Russia and Ukraine, stole and sold at least 160 credit card numbers. Two of the suspects are in custody. The hacked companies include Nasdaq, Visa Inc., J.C. Penney Co., JetBlue Airways Corp. and Carrefour SA. According to authorities, each of the men had specialized tasks—two hacked into networks, another mined them for data, another provided anonymous web-hosting services to hide the group’s activities, and another sold the stolen data and distributed the profits. “This type of crime is the cutting edge,” New Jersey U.S. Attorney Paul J. Fishman said in a statement. “Those who have the expertise and the inclination to break into our computer networks threaten our economic wellbeing, our privacy and our national security.
  • 15. Internet security is a branch of computer security specifically related to the Internet. It's objective is to establish rules and measure to use against attacks over the Internet.
  • 16.  Use antivirus software’s  insert firewalls  uninstall unnecessary software  maintain backup  check security settings  Stay anonymous - choose a genderless screen name  Never give your full name or address to strangers
  • 17.  The cyber security will defend us from critical attacks.  It helps us to browse the safe website.  Internet security process all the incoming and outgoing data on our computer.