SlideShare a Scribd company logo

Cyber Crime

Cyber Crime

1 of 49
Download to read offline
Avinash Rajput
Criminology 2nd Semester
Lok Nayak Jayprakesh Narayana National Institute of

Criminology and Forensic Science
Ministry of Home Affairs
 Harmful acts committed from or against a
computer or network
 Illegal computer-mediated activities that can be
conducted through global electronic networks

 unlawful acts wherein the computer is either a
tool or target or both
 Online or Internet-based illegal acts
 The first recorded cyber crime took place in the
year 1820
 In 1820, Joseph-Marie Jacquard, a textile
manufacturer in France, produced the loom

 This device allowed the repetition of a series of
steps in the weaving of special fabrics
 This resulted in a fear amongst Jacquard's
employees that their traditional employment and
livelihood were being threatened
 The employees committed acts of sabotage to
discourage Jacquard from further use of the new
technology.This is the first recorded cyber crime!
 The first spam email took place in 1978 when it
was sent over the Arpanet
 The first VIRUS was installed on an Apple
computer in 1982
 HACKING

 INTERNET FRAUD

 VIRUS DISSEMINATION

 CYBER TERRORISM

 CYBER THEFT

 PASSWORD
TRAFFICKING

 SOFTWARE PIRACY
 E-MAIL BOMBS
 LOGIC BOMBS

 IDENTITY THEFT

 CRADIT CARD FRAUD
 Activity is commonly referred as unauthorized
access to computer systems or network without
the permission of the computer owner/user
 Hackers write or use ready-made computer
programs to attack the target computer
 Computer hacking includes breaking into a
computer with the intent to steal, damage, modify
or monitor data or settings within the system

Recommended

More Related Content

What's hot

What's hot (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 

Viewers also liked

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Legal provisions for_senior_citizens
Legal provisions for_senior_citizensLegal provisions for_senior_citizens
Legal provisions for_senior_citizensAvinash Rajput
 
District court vsit report
District court vsit reportDistrict court vsit report
District court vsit reportAvinash Rajput
 
Sample power point
Sample power pointSample power point
Sample power pointEnLipas
 
CliqTags - Funktioner och fördelar
CliqTags - Funktioner och fördelarCliqTags - Funktioner och fördelar
CliqTags - Funktioner och fördelarCliqTags
 
【再放送】バスキュール発!UXデザイン学
【再放送】バスキュール発!UXデザイン学 【再放送】バスキュール発!UXデザイン学
【再放送】バスキュール発!UXデザイン学 schoowebcampus
 
Positive thinking attitudes_and_beliefs_final_ppt_29.09.2011
Positive thinking attitudes_and_beliefs_final_ppt_29.09.2011Positive thinking attitudes_and_beliefs_final_ppt_29.09.2011
Positive thinking attitudes_and_beliefs_final_ppt_29.09.2011Pallavi Jagtap
 
Dma Competencies 2011 12
Dma Competencies 2011 12Dma Competencies 2011 12
Dma Competencies 2011 12danikaolson
 
グローバル社会で活躍する人は押さえておくべき、世界のエリートが学ぶ“21世紀スキル”とは?【ディスカヴァービジネス書スクール4限目】
グローバル社会で活躍する人は押さえておくべき、世界のエリートが学ぶ“21世紀スキル”とは?【ディスカヴァービジネス書スクール4限目】グローバル社会で活躍する人は押さえておくべき、世界のエリートが学ぶ“21世紀スキル”とは?【ディスカヴァービジネス書スクール4限目】
グローバル社会で活躍する人は押さえておくべき、世界のエリートが学ぶ“21世紀スキル”とは?【ディスカヴァービジネス書スクール4限目】schoowebcampus
 
Open Geodemographics: Open Tools and the 2011 OAC
Open Geodemographics: Open Tools and the 2011 OACOpen Geodemographics: Open Tools and the 2011 OAC
Open Geodemographics: Open Tools and the 2011 OACChris
 
高勝率是投資致勝的關鍵 0402
高勝率是投資致勝的關鍵 0402高勝率是投資致勝的關鍵 0402
高勝率是投資致勝的關鍵 0402ellen_cat0103
 
Zambia’s Faltering Multi-Party Politics
Zambia’s Faltering Multi-Party PoliticsZambia’s Faltering Multi-Party Politics
Zambia’s Faltering Multi-Party PoliticsNdangwa Noyoo
 
J groll ignite the culture cocktail party 0613
J groll ignite the culture cocktail party 0613J groll ignite the culture cocktail party 0613
J groll ignite the culture cocktail party 0613jgroll06
 
『留学実現!』1限目:カナダにオフィスを持ち数々の留学生をあサポートしてきた佐々木氏へ成功する留学の極意をインタビュー形式でひも解きます。留学のエッセンス...
『留学実現!』1限目:カナダにオフィスを持ち数々の留学生をあサポートしてきた佐々木氏へ成功する留学の極意をインタビュー形式でひも解きます。留学のエッセンス...『留学実現!』1限目:カナダにオフィスを持ち数々の留学生をあサポートしてきた佐々木氏へ成功する留学の極意をインタビュー形式でひも解きます。留学のエッセンス...
『留学実現!』1限目:カナダにオフィスを持ち数々の留学生をあサポートしてきた佐々木氏へ成功する留学の極意をインタビュー形式でひも解きます。留学のエッセンス...schoowebcampus
 

Viewers also liked (19)

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Legal provisions for_senior_citizens
Legal provisions for_senior_citizensLegal provisions for_senior_citizens
Legal provisions for_senior_citizens
 
District court vsit report
District court vsit reportDistrict court vsit report
District court vsit report
 
Sample power point
Sample power pointSample power point
Sample power point
 
CliqTags - Funktioner och fördelar
CliqTags - Funktioner och fördelarCliqTags - Funktioner och fördelar
CliqTags - Funktioner och fördelar
 
【再放送】バスキュール発!UXデザイン学
【再放送】バスキュール発!UXデザイン学 【再放送】バスキュール発!UXデザイン学
【再放送】バスキュール発!UXデザイン学
 
Positive thinking attitudes_and_beliefs_final_ppt_29.09.2011
Positive thinking attitudes_and_beliefs_final_ppt_29.09.2011Positive thinking attitudes_and_beliefs_final_ppt_29.09.2011
Positive thinking attitudes_and_beliefs_final_ppt_29.09.2011
 
Dma Competencies 2011 12
Dma Competencies 2011 12Dma Competencies 2011 12
Dma Competencies 2011 12
 
ClaireGentryRESUME1
ClaireGentryRESUME1ClaireGentryRESUME1
ClaireGentryRESUME1
 
Impl slpqp ev-sqp
Impl slpqp ev-sqpImpl slpqp ev-sqp
Impl slpqp ev-sqp
 
グローバル社会で活躍する人は押さえておくべき、世界のエリートが学ぶ“21世紀スキル”とは?【ディスカヴァービジネス書スクール4限目】
グローバル社会で活躍する人は押さえておくべき、世界のエリートが学ぶ“21世紀スキル”とは?【ディスカヴァービジネス書スクール4限目】グローバル社会で活躍する人は押さえておくべき、世界のエリートが学ぶ“21世紀スキル”とは?【ディスカヴァービジネス書スクール4限目】
グローバル社会で活躍する人は押さえておくべき、世界のエリートが学ぶ“21世紀スキル”とは?【ディスカヴァービジネス書スクール4限目】
 
Cerveza programa
Cerveza programaCerveza programa
Cerveza programa
 
Open Geodemographics: Open Tools and the 2011 OAC
Open Geodemographics: Open Tools and the 2011 OACOpen Geodemographics: Open Tools and the 2011 OAC
Open Geodemographics: Open Tools and the 2011 OAC
 
高勝率是投資致勝的關鍵 0402
高勝率是投資致勝的關鍵 0402高勝率是投資致勝的關鍵 0402
高勝率是投資致勝的關鍵 0402
 
Zambia’s Faltering Multi-Party Politics
Zambia’s Faltering Multi-Party PoliticsZambia’s Faltering Multi-Party Politics
Zambia’s Faltering Multi-Party Politics
 
TYPO3 47 release
TYPO3 47 releaseTYPO3 47 release
TYPO3 47 release
 
J groll ignite the culture cocktail party 0613
J groll ignite the culture cocktail party 0613J groll ignite the culture cocktail party 0613
J groll ignite the culture cocktail party 0613
 
『留学実現!』1限目:カナダにオフィスを持ち数々の留学生をあサポートしてきた佐々木氏へ成功する留学の極意をインタビュー形式でひも解きます。留学のエッセンス...
『留学実現!』1限目:カナダにオフィスを持ち数々の留学生をあサポートしてきた佐々木氏へ成功する留学の極意をインタビュー形式でひも解きます。留学のエッセンス...『留学実現!』1限目:カナダにオフィスを持ち数々の留学生をあサポートしてきた佐々木氏へ成功する留学の極意をインタビュー形式でひも解きます。留学のエッセンス...
『留学実現!』1限目:カナダにオフィスを持ち数々の留学生をあサポートしてきた佐々木氏へ成功する留学の極意をインタビュー形式でひも解きます。留学のエッセンス...
 

Similar to Cyber Crime

Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism Accenture
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01Nelito Systems Ltd
 

Similar to Cyber Crime (20)

Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01Sahilmod 120315100301-phpapp01
Sahilmod 120315100301-phpapp01
 

More from Avinash Rajput

Victimization of senior_citizens-_a_study_in_Delhi_Metropolis_city_from_Human...
Victimization of senior_citizens-_a_study_in_Delhi_Metropolis_city_from_Human...Victimization of senior_citizens-_a_study_in_Delhi_Metropolis_city_from_Human...
Victimization of senior_citizens-_a_study_in_Delhi_Metropolis_city_from_Human...Avinash Rajput
 
Report on National_Human_Rights_Commission
Report on National_Human_Rights_CommissionReport on National_Human_Rights_Commission
Report on National_Human_Rights_CommissionAvinash Rajput
 
Human rights violation_in_custodial_torture
Human rights violation_in_custodial_tortureHuman rights violation_in_custodial_torture
Human rights violation_in_custodial_tortureAvinash Rajput
 
Criminal Justice System
Criminal Justice SystemCriminal Justice System
Criminal Justice SystemAvinash Rajput
 
Children protection from sexual assault or harassement act,2012
Children protection from sexual assault or harassement  act,2012Children protection from sexual assault or harassement  act,2012
Children protection from sexual assault or harassement act,2012Avinash Rajput
 
Justice JS Verma Committee Report
Justice JS Verma Committee ReportJustice JS Verma Committee Report
Justice JS Verma Committee ReportAvinash Rajput
 

More from Avinash Rajput (16)

Jail Visit Report
Jail Visit ReportJail Visit Report
Jail Visit Report
 
Women Trafficking
Women TraffickingWomen Trafficking
Women Trafficking
 
Victim's Rights
Victim's RightsVictim's Rights
Victim's Rights
 
Victimization of senior_citizens-_a_study_in_Delhi_Metropolis_city_from_Human...
Victimization of senior_citizens-_a_study_in_Delhi_Metropolis_city_from_Human...Victimization of senior_citizens-_a_study_in_Delhi_Metropolis_city_from_Human...
Victimization of senior_citizens-_a_study_in_Delhi_Metropolis_city_from_Human...
 
Terrorism
TerrorismTerrorism
Terrorism
 
Report on National_Human_Rights_Commission
Report on National_Human_Rights_CommissionReport on National_Human_Rights_Commission
Report on National_Human_Rights_Commission
 
Prayas visit report
Prayas visit reportPrayas visit report
Prayas visit report
 
Police station report
Police station reportPolice station report
Police station report
 
Organized crime
Organized crimeOrganized crime
Organized crime
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 
Human rights violation_in_custodial_torture
Human rights violation_in_custodial_tortureHuman rights violation_in_custodial_torture
Human rights violation_in_custodial_torture
 
Human rights in_india
Human rights in_indiaHuman rights in_india
Human rights in_india
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 
Criminal Justice System
Criminal Justice SystemCriminal Justice System
Criminal Justice System
 
Children protection from sexual assault or harassement act,2012
Children protection from sexual assault or harassement  act,2012Children protection from sexual assault or harassement  act,2012
Children protection from sexual assault or harassement act,2012
 
Justice JS Verma Committee Report
Justice JS Verma Committee ReportJustice JS Verma Committee Report
Justice JS Verma Committee Report
 

Recently uploaded

ACTIVIDAD DE CLASE No 1 - SOPA DE LETRAS
ACTIVIDAD DE CLASE No 1 - SOPA DE LETRASACTIVIDAD DE CLASE No 1 - SOPA DE LETRAS
ACTIVIDAD DE CLASE No 1 - SOPA DE LETRASMaria Lucia Céspedes
 
LIPIDS UNIT ONE BIOMOLECULE PRESENTATION
LIPIDS UNIT ONE BIOMOLECULE PRESENTATIONLIPIDS UNIT ONE BIOMOLECULE PRESENTATION
LIPIDS UNIT ONE BIOMOLECULE PRESENTATIONSayali Powar
 
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptxCapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptxCapitolTechU
 
Food Web SlideShare for Ecology Notes Quiz in Canvas
Food Web SlideShare for Ecology Notes Quiz in CanvasFood Web SlideShare for Ecology Notes Quiz in Canvas
Food Web SlideShare for Ecology Notes Quiz in CanvasAlexandraSwartzwelde
 
Introduction of General Pharmacology PPT.pptx
Introduction of General Pharmacology PPT.pptxIntroduction of General Pharmacology PPT.pptx
Introduction of General Pharmacology PPT.pptxRenuka N Sunagad
 
Unleashing the Power of AI Tools for Enhancing Research, International FDP on...
Unleashing the Power of AI Tools for Enhancing Research, International FDP on...Unleashing the Power of AI Tools for Enhancing Research, International FDP on...
Unleashing the Power of AI Tools for Enhancing Research, International FDP on...Dr. Vinod Kumar Kanvaria
 
Chromatography-Gas chromatography-Principle
Chromatography-Gas chromatography-PrincipleChromatography-Gas chromatography-Principle
Chromatography-Gas chromatography-Principleblessipriyanka
 
UNIT 1 BIOMOLECULE_CARBOHYDRATES PRESENTATION
UNIT 1 BIOMOLECULE_CARBOHYDRATES PRESENTATIONUNIT 1 BIOMOLECULE_CARBOHYDRATES PRESENTATION
UNIT 1 BIOMOLECULE_CARBOHYDRATES PRESENTATIONSayali Powar
 
BTKi in Treatment Of Chronic Lymphocytic Leukemia
BTKi in Treatment Of Chronic Lymphocytic LeukemiaBTKi in Treatment Of Chronic Lymphocytic Leukemia
BTKi in Treatment Of Chronic Lymphocytic LeukemiaFaheema Hasan
 
CONCEPTS OF ENVIRONMENT & ECOSYSTEM.pptx
CONCEPTS OF ENVIRONMENT & ECOSYSTEM.pptxCONCEPTS OF ENVIRONMENT & ECOSYSTEM.pptx
CONCEPTS OF ENVIRONMENT & ECOSYSTEM.pptxAnupkumar Sharma
 
2.20.24 Asian Americans and the Myth of the Model Minority.pptx
2.20.24 Asian Americans and the Myth of the Model Minority.pptx2.20.24 Asian Americans and the Myth of the Model Minority.pptx
2.20.24 Asian Americans and the Myth of the Model Minority.pptxMaryPotorti1
 
mean stack mean stack mean stack mean stack
mean stack mean stack  mean stack  mean stackmean stack mean stack  mean stack  mean stack
mean stack mean stack mean stack mean stackNuttavutThongjor1
 
IR introduction Introduction, Principle & Theory
IR introduction Introduction, Principle & TheoryIR introduction Introduction, Principle & Theory
IR introduction Introduction, Principle & Theorynivedithag131
 
Bayesian Analysis Fundamentals with Examples
Bayesian Analysis Fundamentals with ExamplesBayesian Analysis Fundamentals with Examples
Bayesian Analysis Fundamentals with ExamplesTushar Tank
 
Practical Research 1: Qualitative Research and Its Importance in Daily Life.pptx
Practical Research 1: Qualitative Research and Its Importance in Daily Life.pptxPractical Research 1: Qualitative Research and Its Importance in Daily Life.pptx
Practical Research 1: Qualitative Research and Its Importance in Daily Life.pptxKatherine Villaluna
 
Barrow Motor Ability Test - TEST, MEASUREMENT AND EVALUATION IN PHYSICAL EDUC...
Barrow Motor Ability Test - TEST, MEASUREMENT AND EVALUATION IN PHYSICAL EDUC...Barrow Motor Ability Test - TEST, MEASUREMENT AND EVALUATION IN PHYSICAL EDUC...
Barrow Motor Ability Test - TEST, MEASUREMENT AND EVALUATION IN PHYSICAL EDUC...Rabiya Husain
 
UniSC Fraser Coast library self-guided tour
UniSC Fraser Coast library self-guided tourUniSC Fraser Coast library self-guided tour
UniSC Fraser Coast library self-guided tourUSC_Library
 
Exit Essay - Save the Filipino Language by Renz Perez.docx
Exit Essay - Save the Filipino Language by Renz Perez.docxExit Essay - Save the Filipino Language by Renz Perez.docx
Exit Essay - Save the Filipino Language by Renz Perez.docxMYDA ANGELICA SUAN
 
Website Fixer-Upper Series to Boost your Online Presence
Website Fixer-Upper Series to Boost your Online PresenceWebsite Fixer-Upper Series to Boost your Online Presence
Website Fixer-Upper Series to Boost your Online PresenceSamantha Russell
 

Recently uploaded (20)

ACTIVIDAD DE CLASE No 1 - SOPA DE LETRAS
ACTIVIDAD DE CLASE No 1 - SOPA DE LETRASACTIVIDAD DE CLASE No 1 - SOPA DE LETRAS
ACTIVIDAD DE CLASE No 1 - SOPA DE LETRAS
 
LIPIDS UNIT ONE BIOMOLECULE PRESENTATION
LIPIDS UNIT ONE BIOMOLECULE PRESENTATIONLIPIDS UNIT ONE BIOMOLECULE PRESENTATION
LIPIDS UNIT ONE BIOMOLECULE PRESENTATION
 
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptxCapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
 
Food Web SlideShare for Ecology Notes Quiz in Canvas
Food Web SlideShare for Ecology Notes Quiz in CanvasFood Web SlideShare for Ecology Notes Quiz in Canvas
Food Web SlideShare for Ecology Notes Quiz in Canvas
 
Introduction of General Pharmacology PPT.pptx
Introduction of General Pharmacology PPT.pptxIntroduction of General Pharmacology PPT.pptx
Introduction of General Pharmacology PPT.pptx
 
Unleashing the Power of AI Tools for Enhancing Research, International FDP on...
Unleashing the Power of AI Tools for Enhancing Research, International FDP on...Unleashing the Power of AI Tools for Enhancing Research, International FDP on...
Unleashing the Power of AI Tools for Enhancing Research, International FDP on...
 
Chromatography-Gas chromatography-Principle
Chromatography-Gas chromatography-PrincipleChromatography-Gas chromatography-Principle
Chromatography-Gas chromatography-Principle
 
UNIT 1 BIOMOLECULE_CARBOHYDRATES PRESENTATION
UNIT 1 BIOMOLECULE_CARBOHYDRATES PRESENTATIONUNIT 1 BIOMOLECULE_CARBOHYDRATES PRESENTATION
UNIT 1 BIOMOLECULE_CARBOHYDRATES PRESENTATION
 
BTKi in Treatment Of Chronic Lymphocytic Leukemia
BTKi in Treatment Of Chronic Lymphocytic LeukemiaBTKi in Treatment Of Chronic Lymphocytic Leukemia
BTKi in Treatment Of Chronic Lymphocytic Leukemia
 
CONCEPTS OF ENVIRONMENT & ECOSYSTEM.pptx
CONCEPTS OF ENVIRONMENT & ECOSYSTEM.pptxCONCEPTS OF ENVIRONMENT & ECOSYSTEM.pptx
CONCEPTS OF ENVIRONMENT & ECOSYSTEM.pptx
 
2.20.24 Asian Americans and the Myth of the Model Minority.pptx
2.20.24 Asian Americans and the Myth of the Model Minority.pptx2.20.24 Asian Americans and the Myth of the Model Minority.pptx
2.20.24 Asian Americans and the Myth of the Model Minority.pptx
 
mean stack mean stack mean stack mean stack
mean stack mean stack  mean stack  mean stackmean stack mean stack  mean stack  mean stack
mean stack mean stack mean stack mean stack
 
IR introduction Introduction, Principle & Theory
IR introduction Introduction, Principle & TheoryIR introduction Introduction, Principle & Theory
IR introduction Introduction, Principle & Theory
 
Bayesian Analysis Fundamentals with Examples
Bayesian Analysis Fundamentals with ExamplesBayesian Analysis Fundamentals with Examples
Bayesian Analysis Fundamentals with Examples
 
Practical Research 1: Qualitative Research and Its Importance in Daily Life.pptx
Practical Research 1: Qualitative Research and Its Importance in Daily Life.pptxPractical Research 1: Qualitative Research and Its Importance in Daily Life.pptx
Practical Research 1: Qualitative Research and Its Importance in Daily Life.pptx
 
Barrow Motor Ability Test - TEST, MEASUREMENT AND EVALUATION IN PHYSICAL EDUC...
Barrow Motor Ability Test - TEST, MEASUREMENT AND EVALUATION IN PHYSICAL EDUC...Barrow Motor Ability Test - TEST, MEASUREMENT AND EVALUATION IN PHYSICAL EDUC...
Barrow Motor Ability Test - TEST, MEASUREMENT AND EVALUATION IN PHYSICAL EDUC...
 
Time-Honored Wisdom: African Teachings for VUCA Leaders
Time-Honored Wisdom: African Teachings for VUCA LeadersTime-Honored Wisdom: African Teachings for VUCA Leaders
Time-Honored Wisdom: African Teachings for VUCA Leaders
 
UniSC Fraser Coast library self-guided tour
UniSC Fraser Coast library self-guided tourUniSC Fraser Coast library self-guided tour
UniSC Fraser Coast library self-guided tour
 
Exit Essay - Save the Filipino Language by Renz Perez.docx
Exit Essay - Save the Filipino Language by Renz Perez.docxExit Essay - Save the Filipino Language by Renz Perez.docx
Exit Essay - Save the Filipino Language by Renz Perez.docx
 
Website Fixer-Upper Series to Boost your Online Presence
Website Fixer-Upper Series to Boost your Online PresenceWebsite Fixer-Upper Series to Boost your Online Presence
Website Fixer-Upper Series to Boost your Online Presence
 

Cyber Crime

  • 1. Avinash Rajput Criminology 2nd Semester Lok Nayak Jayprakesh Narayana National Institute of Criminology and Forensic Science Ministry of Home Affairs
  • 2.  Harmful acts committed from or against a computer or network  Illegal computer-mediated activities that can be conducted through global electronic networks  unlawful acts wherein the computer is either a tool or target or both  Online or Internet-based illegal acts
  • 3.  The first recorded cyber crime took place in the year 1820  In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom  This device allowed the repetition of a series of steps in the weaving of special fabrics  This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened
  • 4.  The employees committed acts of sabotage to discourage Jacquard from further use of the new technology.This is the first recorded cyber crime!  The first spam email took place in 1978 when it was sent over the Arpanet  The first VIRUS was installed on an Apple computer in 1982
  • 5.  HACKING  INTERNET FRAUD  VIRUS DISSEMINATION  CYBER TERRORISM  CYBER THEFT  PASSWORD TRAFFICKING  SOFTWARE PIRACY  E-MAIL BOMBS  LOGIC BOMBS  IDENTITY THEFT  CRADIT CARD FRAUD
  • 6.  Activity is commonly referred as unauthorized access to computer systems or network without the permission of the computer owner/user  Hackers write or use ready-made computer programs to attack the target computer  Computer hacking includes breaking into a computer with the intent to steal, damage, modify or monitor data or settings within the system
  • 7.  Malicious software that attaches itself to other software  Circulate themselves to other files and to other computers on a network  Affect the data on a computer, either by altering or deleting it
  • 8.  In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed  Criminals makes such program thatdeducts small amount like Rs. 2.50 per month from the account of all the customer of the bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount
  • 9.  Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original  Copying and using computer programs violation of copyrights and trade secret laws  Retail revenue losses worldwide increasing due to this crime are in ever
  • 10.  It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing.  E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address
  • 11.  Programs are created to do something only when a certain event (known as a trigger event) occurs  Secretly attaches another company‟s computer system program to a  Even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date
  • 12.  Any type of fraud scheme that uses one or more components of the internet such as chat rooms, e-mail, message boards, or Web sites - to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to other connected with the scheme
  • 13.  It is the actual use of computers and Internet technology to cause intimidation and destruction  uses the Internet or network to destroy or damage computers for political reasons  Cyber terrorist could hack into a pharmaceutical company‟s computers, changing the formula of some essential medication and causing thousands to die
  • 14.  Misuse and illegal selling of other people‟s passwords  Break a company‟s password and misuse the password or sale that password to another company or an individual
  • 15.  Identity theft occurs when somebody steals a personal name and other personal information for fraudulent purposes  Identity theft is a form of identity crime where somebody uses a false identity to commit a crime  It involves stealing victims‟ personal information and credentials, often to make purchases
  • 16.  You simply have to type cradit card number into www page of the vendor for online transaction  If electronic transaction are not secured the cradit card numbers can be stolen by the hackers who can misuse this card by impersonating the cradit card owner
  • 17.  Silent in Nature  Global in character  Non existence of Physical Evidence  Creates high Impact  Gain Benefit
  • 18.  Computer crime could be committed in privacy without reaching to scene of crime physically i.e. no eye witnesses. There is no signs of physical violence or struggle
  • 19.  No national borders. By sitting comfortably far away from the country the entire economy of the country could be destroyed. As digital evidences are fragile in nature one has to respond quickly
  • 20.  No physical evidence to indicate that crime has been committed. Only on a closer look the trained person could find out the evidences which are not in the traditional format but are in digital format
  • 21.  Impact is severe and may be long term. It can damage the victim system permanently. Loss of good will
  • 22.  A software developer who did not get enough money or good job would turn to criminal world for their survival. Therefore, the computer crimes have a potential to increase. Hence organized mafia may enter into this sector
  • 23.  Computer as Target  Computer as Tool  Computer as incidental to Offence
  • 24.  Crimes which compromise the confidentiality of a system, resulting in theft of services or the release of viruses  A computer virus is a self-replicating computer program written to alter the way a computer operates, without the permission or knowledge of the user  Example: Hacking/cracking, computer trespass
  • 25.  Crimes migrated from the physical world into cyberspace such as child pornography, fraud, illegal online sales  This category include such crimes were either computers or their contents bare used in furtherance of crime or those offences which are committed by manipulating contents of computer systems  Example: sending e-mails, credit card frauds telecommunication frauds, identity theft
  • 26.  Computer used to facilitate or execute a crime such as the storing of child pornography or illicit drug records  This category includes conventional crimes, and with the advent of computer the criminal have started using the technology as an aid for its perpetuation  Example: Aid for drug trafficking, money laundering, child pornography etc
  • 27.  “Hackers” is a term that is currently used to identify individuals who break into computers  Hackers can be any age, creed or nationality  Hackers have gained a negative image due to their exploits in the past few years  Hackers may commit their criminal activity for excitement, the challenge or monetary reasons
  • 28.  Hackers tend to be young males who have extremely high intelligence and curiosity  There has been an increase in the number of females that have acquired the skills to break into computer systems
  • 29.  The process is based on their experience acquired through attempting to break into, and subsequently breaking into computer systems  What this provides law enforcement is a Modus Operandi (MO) with patterns that prosecutors and police can use to build their case  Law enforcement officials should establish databases on the MO of cyber criminals in their sectors
  • 30.  Cyber criminals will typically need to use a computer network that is difficult if not impossible to identify  This is done to make it difficult for law enforcement to identify the perpetrator of the cyber crime  Cyber criminals will “hack” into a victim computer or will use cyber café‟s to commit their illegal activity
  • 31.  Hackers will initially conduct intelligence gathering during the first phase of their illegal activity  They want to learn network range, extranet connections, etc  Hackers next conduct network discovery to identify the number and operating systems of the target victim‟s computer network
  • 32.  Hackers will also conduct host enumeration in order to identify vulnerabilities that exist of the system  The computer‟s vulnerabilities will then be exploited by the criminal  Cyber criminals will also install password crackers on the network. These “crackers” will allow them to “break” the passwords of the authorized users
  • 33.  Once the network has been compromised, cyber criminals will usually install “sniffers” that allow them to capture user id/passwords and other sensitive information  Hackers may use stegonagraphy in order to hide important data from law enforcement personnel  Stegonagraphy is very automated software easy to use with
  • 34.  Computer forensic is evidence produced by a computer which is supported,conclusive (convincing), and sufficient to be accepted by the court  Computer forensics is the discipline of acquiring, preserving, identifying and examining digital media
  • 35.  It involves retrieving computer data in order to meet standards for admissibility as evidence in legal proceedings  Computer forensic data recovery is the basis for seizure of evidence in all computer-based investigations
  • 36.  Imagine the following  You didn‟t information recognize critical evidence or  You could not locate vital data  You could not use any documents or records  You accidentally destroyed evidence  You now needed to resolve an allegation or an issue
  • 37.  Removable Media: Floppy Disk; Zip Disk  Hard Drive: IDE; SCSI  CDROM  Magnetic Tape  Electronic Organizers
  • 38.  Reliability of evidence  Adherence to accepted protocols and practices  Use of proven / accepted software  Ability to testify as to methods and results of analysis  Trained and examiners certified computer forensics  Proper training is crucial for testimonial purposes
  • 39.  Separating pertinent evidence from non-pertinent  There then must be an evaluation of the evidence for criticality and usability in judicial environment  There must always be a documentation of actions taken by the examiner
  • 40.  Governments have passed a variety of laws to address the increase of computer crimes  The first computer crime statutes were passed in 1986  Local and regional areas have also passed laws to address cyber crime at their level  Local and regional laws generally mirror the national laws
  • 41.  One nation created a Computer Crime & Intellectual Property Section (CCIPS) to formulate policy on computer crime  CCIPS is responsible for issuing country-wide guidelines on the search and seizure of digital data  Each individual Attorney General‟s Office has a specially trained prosecutor that is responsible for the prosecution of crimes where a computer is utilized
  • 42.  The Computer Misuse Act (1990)  The Data Protection Act (1998)  Information Technology Act, 2000
  • 43.  Use the latest version of anti-virus  Use the latest version of the operating system  Don‟t open e-mail attachments unless you know the source  Confirm the site you are doing business with  Create passwords containing atleast 8 digits
  • 44.  Use different passwords for different websites  Send credit card information only to secure sites  Use a security program that gives you control over "Cookies" that send information back to websites
  • 45.  Use antivirus software‟s  insert firewalls  uninstall unnecessary software  maintain backup  check security settings  Stay anonymous - choose a genderless screen name  Never give your full name or address to strangers
  • 46.  Learn „inetiquette' - follow it and expect it from others  Don't respond to harassing or negative messages (flames)  Get out of uncomfortable or hostile situations quickly  Save offending messages  Learn more about Internet privacy
  • 47.  Spam Blocker  Anti-Virus Software  Firewall Protection  Caution in providing personal information  Secure shoping  Avoidence of Scam
  • 48.  Avast Free Antivirus  AVG Free Antivirus  Avira AntiVir Personal  Kaspersky Antivirus  Mcafee Antivirus  Symantec Norton Antivirus  Quick Heal Antivirus