SlideShare a Scribd company logo
1 of 19
Submitted to-
Mr.Neeraj Pratihar
Lecturer of I.T.
Presented by-
Miss Asha Mali
VIII Sem. I.T.
09eimit010
A
SEMINAR
ON
CYBER CRIME
CYBER CRIME
AGENDA
INTRODUCTION
WHAT IS CYBER CRIME ??
VARIOUS CYBERCRIME
WHO ARE CYBER CRIMINALS??
CONCLUSION.
REFERENCES.
INTRODUCTION
Cyber crime is a term used broadly to
describe activity in which computers or
networks are a tool, a target, or a place
of criminal activity.
The first recorded cyber crime took
place in the year 1820 by Joseph-Marie
Jacquard
WHAT IS CYBER CRIME ?
 It is a criminal activity committed on the internet.
This is a broad term that describes everything from
electronic cracking to denial of service attacks that
cause electronic commerce sites to lose money.
 Cyber crime is just a combination of crime and
computer.
 Any offence or crime in which a computer is used is
a cyber crime.
VARIOUS TYPES OF CYBERCRIME
HACKING PHISHING
DENIAL OF SERVICE ATTACK SPOOFING
VIRUS DISSEMINATION CYBER STALKING
SOFTWARE PIRACY CYBER DEFAMATION
PORNOGRAPHY THREATENING
IRC Crime SALAMI ATTACK
CREDIT CARD FRAUD NET EXTORTION
HACKING
The act of gaining unauthorized access to a computer system or
network (e.g., fraud, terrorism, etc.)
DENIAL OF SERVICE ATTACK:-
This is an act by the criminal, who floods the band width of
the victim’s network or fills his e-mail box with spam mail
depriving him of the services he is entitled to access or
provide.
VIRUS DISSEMINATION
Malicious software that attaches itself to other software.
(virus, worms, Trojan Horse, Time bomb, Logic
Bomb, Rabbit and Bacterium are the malicious soft wares)
SOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs
IRC CRIME
Internet Relay Chat (IRC) servers have chat rooms in which
people from anywhere the world can come together and chat
with each other
CREDIT CARD FRAUD:-
You simply have to type credit card number into www page off
the vendor for online transaction.
If electronic transactions are not secured the credit card
numbers can be stolen by the hackers who can
misuse this card by impersonating the credit card owner.
NET EXTORTION:-
Copying the company’s confidential data in order to extort
said company for huge amount.
SPOOFING
Getting one computer on a network to pretend to have the
identity of another computer, usually one with special access
privileges, so as to obtain access to the other computers on
the network.
PHISHING
It is technique of pulling out confidential
information from the bank/financial
institutional account holders by deceptive
means
CYBER STALKING
It refers to the use of the Internet, e-mail, or other
telecommunication technologies to harass or stalk another
person.
CYBER DEFAMATION:-
The criminals send e-mail containing defamatory
matters to all concerned of the victim or post the
defamatory matters on a website.
(divorced husband against wife)
THREATENING
The Criminal sends threatening email or comes
in contact in chat rooms with victim. (Any one
disgruntled may do this against boss, friend or
official
SALAMI ATTACK
In such crime criminal makes insignificant changes in such a
manner that such changes
would go unnoticed. Criminal makes such program that
deducts small amount like 2.50 per month from the account
of all the customer of the Bank and deposit the same in his
account. In this case no account holder will approach the
bank for such small amount but criminal gains huge amount.
WHO ARE CYBER CRIMINALS ??
Kids(age group 9-16)
Organized hackers
Disgruntled employees
Professional hackers
CONCLUSION:-
Technology is always a double-edged sword and can be used
for both the purposes – good or bad.
Hence, it should be the persistent efforts of rulers and law
makers to ensure that technology grows in a healthy manner
and is used for legal and ethical
business growth and not for committing crimes.
REFERNCES
 www.cisco.com
 www.berbee.com
 www.ibm.com
 www.microsoft.com
 www.rsa.com
 www.gocsi.com
 www.sans.org
 www.nist.gov
Various cyber crime

More Related Content

What's hot (19)

Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime liability report
Cyber crime liability reportCyber crime liability report
Cyber crime liability report
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cybe Crime & Its Type
Cybe Crime & Its TypeCybe Crime & Its Type
Cybe Crime & Its Type
 
Cyber safe girl e book
Cyber safe girl e bookCyber safe girl e book
Cyber safe girl e book
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Shilpa
ShilpaShilpa
Shilpa
 
Phishing
PhishingPhishing
Phishing
 
Impact of cybercrime
Impact of cybercrimeImpact of cybercrime
Impact of cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Internet trolls
Internet trollsInternet trolls
Internet trolls
 

Viewers also liked

Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"
Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"
Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"ООО "МедИнфоЦентр"
 
Advanced Multiplatform Strategy for Broadcasting Biz Stakeholders
Advanced Multiplatform Strategy for Broadcasting Biz StakeholdersAdvanced Multiplatform Strategy for Broadcasting Biz Stakeholders
Advanced Multiplatform Strategy for Broadcasting Biz StakeholdersAnjanette Delgado
 
мовленнєвий розвиток 1клас копия
мовленнєвий розвиток 1клас   копиямовленнєвий розвиток 1клас   копия
мовленнєвий розвиток 1клас копияlyuda_p
 
Annotating the script
Annotating the scriptAnnotating the script
Annotating the scriptMica Brown
 
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. Gallen
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. GallenWorkshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. Gallen
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. GallenPenny Schiffer
 

Viewers also liked (13)

Webspoofing
WebspoofingWebspoofing
Webspoofing
 
Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"
Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"
Учет коечного фонда - программное решение для медицины от ООО "МедИнфоЦентр"
 
Advanced Multiplatform Strategy for Broadcasting Biz Stakeholders
Advanced Multiplatform Strategy for Broadcasting Biz StakeholdersAdvanced Multiplatform Strategy for Broadcasting Biz Stakeholders
Advanced Multiplatform Strategy for Broadcasting Biz Stakeholders
 
Presentation1
Presentation1Presentation1
Presentation1
 
Op art 1
Op art 1Op art 1
Op art 1
 
мовленнєвий розвиток 1клас копия
мовленнєвий розвиток 1клас   копиямовленнєвий розвиток 1клас   копия
мовленнєвий розвиток 1клас копия
 
Annotating the script
Annotating the scriptAnnotating the script
Annotating the script
 
Foundations seminar
Foundations seminarFoundations seminar
Foundations seminar
 
Bss552 lect 1
Bss552 lect 1Bss552 lect 1
Bss552 lect 1
 
Op art
Op artOp art
Op art
 
Pointilism
PointilismPointilism
Pointilism
 
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. Gallen
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. GallenWorkshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. Gallen
Workshop "How to pitch to a corporate VC" @ Start Summit 2013 in St. Gallen
 
Natural forms
Natural formsNatural forms
Natural forms
 

Similar to Various cyber crime

Similar to Various cyber crime (20)

Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Unit 1
Unit 1Unit 1
Unit 1
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Internet
InternetInternet
Internet
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Various cyber crime

  • 1. Submitted to- Mr.Neeraj Pratihar Lecturer of I.T. Presented by- Miss Asha Mali VIII Sem. I.T. 09eimit010 A SEMINAR ON CYBER CRIME
  • 3. AGENDA INTRODUCTION WHAT IS CYBER CRIME ?? VARIOUS CYBERCRIME WHO ARE CYBER CRIMINALS?? CONCLUSION. REFERENCES.
  • 4. INTRODUCTION Cyber crime is a term used broadly to describe activity in which computers or networks are a tool, a target, or a place of criminal activity. The first recorded cyber crime took place in the year 1820 by Joseph-Marie Jacquard
  • 5. WHAT IS CYBER CRIME ?  It is a criminal activity committed on the internet. This is a broad term that describes everything from electronic cracking to denial of service attacks that cause electronic commerce sites to lose money.  Cyber crime is just a combination of crime and computer.  Any offence or crime in which a computer is used is a cyber crime.
  • 6. VARIOUS TYPES OF CYBERCRIME HACKING PHISHING DENIAL OF SERVICE ATTACK SPOOFING VIRUS DISSEMINATION CYBER STALKING SOFTWARE PIRACY CYBER DEFAMATION PORNOGRAPHY THREATENING IRC Crime SALAMI ATTACK CREDIT CARD FRAUD NET EXTORTION
  • 7. HACKING The act of gaining unauthorized access to a computer system or network (e.g., fraud, terrorism, etc.)
  • 8. DENIAL OF SERVICE ATTACK:- This is an act by the criminal, who floods the band width of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.
  • 9. VIRUS DISSEMINATION Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious soft wares)
  • 10. SOFTWARE PIRACY Theft of software through the illegal copying of genuine programs IRC CRIME Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other CREDIT CARD FRAUD:- You simply have to type credit card number into www page off the vendor for online transaction. If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
  • 11. NET EXTORTION:- Copying the company’s confidential data in order to extort said company for huge amount. SPOOFING Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges, so as to obtain access to the other computers on the network.
  • 12. PHISHING It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means
  • 13. CYBER STALKING It refers to the use of the Internet, e-mail, or other telecommunication technologies to harass or stalk another person. CYBER DEFAMATION:- The criminals send e-mail containing defamatory matters to all concerned of the victim or post the defamatory matters on a website. (divorced husband against wife)
  • 14. THREATENING The Criminal sends threatening email or comes in contact in chat rooms with victim. (Any one disgruntled may do this against boss, friend or official
  • 15. SALAMI ATTACK In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed. Criminal makes such program that deducts small amount like 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
  • 16. WHO ARE CYBER CRIMINALS ?? Kids(age group 9-16) Organized hackers Disgruntled employees Professional hackers
  • 17. CONCLUSION:- Technology is always a double-edged sword and can be used for both the purposes – good or bad. Hence, it should be the persistent efforts of rulers and law makers to ensure that technology grows in a healthy manner and is used for legal and ethical business growth and not for committing crimes.
  • 18. REFERNCES  www.cisco.com  www.berbee.com  www.ibm.com  www.microsoft.com  www.rsa.com  www.gocsi.com  www.sans.org  www.nist.gov