SlideShare a Scribd company logo
1 of 29
CYBERCRIME
SUBMITTED TO

COMPILED BY:
1.) AJEETH.M.RAMANAN

MS.ANKITA DEVNATH
ASSISTANT PROFESSOR

2.) BHAVNA BANSAL
3.)GURPINDER KAUR GILL

4.) CHETAN SHANDILYA
CYBER CRIME !!
The expression ‘Crime’ is defined as an act, which subjects the doer to
legal punishment or any offence against morality, social order or any
unjust or shameful act. The “Offence" is defined in the Code of
Criminal Procedure to mean as an act or omission made punishable by
any law for the time being in force.

Cyber Crime is emerging as a serious threat. World wide
governments, police departments and intelligence units have started
to react.
“Cybercrime is criminal activity done using computers and the Internet.”
-Wikipedia
“Any criminal activity that uses a computer either as an instrumentality,
target or a means for perpetuating further crimes comes within the ambit
of cyber crime”(12)
-Indian Penal Code

One way of viewing cybercrimes is that they may be digital versions of
traditional, real world offenses. They could be considered traditional, or
“real world” crimes if not for the incorporated element of virtual or
cyberspace
-US Congressional View
TYPES OF CYBERCRIME
HACKING
I.

Practice of modifying computer
hardware and software to
accomplish a goal outside of the
creator’s original purpose.

II. Modification of code intended by
the original programmer.

III. Identity Theft
Phishing is a fraudulent
attempt, usually made through
email, to steal personal
information.

In order for Internet criminals
to successfully “phish” a
personal information, they
must go from an email to a
website.
EXAMPLE OF PHISHING
It is the use of the Internet or
other electronic means to
stalk someone.
This term is used
interchangeably with online
harassment and online
abuse.
SOFTWARE PIRACY
Theft of software
through the illegal
copying of genuine
programs or the
counterfeiting and
distribution of
products intended to
pass for the original
SOFTWARE PIRACY
Software Piracy is done by:
I. End user copying
II. Hard disk loading
III.Counterfeiting
IV.Illegal downloads from the
internet etc
COMPUTER VIRUS
A. A computer virus is a computer program that
can copy itself and infect a computer without
permission or knowledge of the user.
B. The original may modify the copies or the copies
may modify themselves.
C. It can spread to other computers by infecting
files on a network file system or a file system
that is accessed by another computer.
WAYS TO PREVENT CYBER CRIME
ANTIVIRUS AND ANTISPYWARE PROGRAMS
Antivirus software consists of
computer programs that
attempt to identify and
eliminate computer viruses and
other malicious software. Anti
spy wares are used to restrict
backdoor program, Trojans and
other spy wares to be installed
on the computer.
FIREWALLS
 A firewall protects a
computer network from
unauthorized access.
A firewall establishes a
barrier between a
trusted, secure internal
network and another
network (e.g., the
Internet) that is not
assumed to be secure
and trusted
CYBER LAWS
Cyber laws are being formulated to stop
cyber crimes.
Internet Service Providers should also
provide high level of security at their servers
in order to keep their clients secure from all
types of viruses and malicious programs.
If a computer virus or an invading hacker deletes
our files, or either one corrupts our files, the easiest
way to restore our computer may be to reformat the
hard drive(s) and then copy files from a recent
backup.

Backups also offer protection from more common
(and less exotic) threats such as accidental deletion
of a file by an authorized user or failure of a hard
disk drive.
The most popular form
of security which
people rely on is
ENCRYPTION , the
process of encoding
information in such a
way that only the
person (or computer)
with the key can
decode it.
AWARENESS
Always keep a check that you do secure browsing
For example:

While browsing on some website, if “https” is written
in address bar instead of “http” that website
provides secure browsing.
Awareness should be very important. We should treat very
cautiously when we use the public domain such as internet.
We should keep a check on how much we share on the new
to keep our self safe.
We should not fall for phishing schemes.
Its always good to remember the old saying --

“If its too good to be true, it probably is”
Cyber crime

More Related Content

What's hot

Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
Ahtasham Ali
 

What's hot (19)

Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Presentation
 Presentation Presentation
Presentation
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
1358619756 cyber terrorism
1358619756 cyber terrorism1358619756 cyber terrorism
1358619756 cyber terrorism
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Marwan alsuwaidi
Marwan alsuwaidiMarwan alsuwaidi
Marwan alsuwaidi
 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Cyber Security for Babies
Cyber Security for BabiesCyber Security for Babies
Cyber Security for Babies
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Similar to Cyber crime

4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
richarddxd
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
Ardit Meti
 

Similar to Cyber crime (20)

2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crime
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet security
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation1
Presentation1Presentation1
Presentation1
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
 
Cyber security
Cyber security Cyber security
Cyber security
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 

Cyber crime

  • 1. CYBERCRIME SUBMITTED TO COMPILED BY: 1.) AJEETH.M.RAMANAN MS.ANKITA DEVNATH ASSISTANT PROFESSOR 2.) BHAVNA BANSAL 3.)GURPINDER KAUR GILL 4.) CHETAN SHANDILYA
  • 2. CYBER CRIME !! The expression ‘Crime’ is defined as an act, which subjects the doer to legal punishment or any offence against morality, social order or any unjust or shameful act. The “Offence" is defined in the Code of Criminal Procedure to mean as an act or omission made punishable by any law for the time being in force. Cyber Crime is emerging as a serious threat. World wide governments, police departments and intelligence units have started to react.
  • 3. “Cybercrime is criminal activity done using computers and the Internet.” -Wikipedia “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”(12) -Indian Penal Code One way of viewing cybercrimes is that they may be digital versions of traditional, real world offenses. They could be considered traditional, or “real world” crimes if not for the incorporated element of virtual or cyberspace -US Congressional View
  • 5.
  • 6. HACKING I. Practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. II. Modification of code intended by the original programmer. III. Identity Theft
  • 7.
  • 8. Phishing is a fraudulent attempt, usually made through email, to steal personal information. In order for Internet criminals to successfully “phish” a personal information, they must go from an email to a website.
  • 10.
  • 11. It is the use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse.
  • 12.
  • 13. SOFTWARE PIRACY Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original
  • 14.
  • 15. SOFTWARE PIRACY Software Piracy is done by: I. End user copying II. Hard disk loading III.Counterfeiting IV.Illegal downloads from the internet etc
  • 16. COMPUTER VIRUS A. A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. B. The original may modify the copies or the copies may modify themselves. C. It can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer.
  • 17. WAYS TO PREVENT CYBER CRIME
  • 18. ANTIVIRUS AND ANTISPYWARE PROGRAMS Antivirus software consists of computer programs that attempt to identify and eliminate computer viruses and other malicious software. Anti spy wares are used to restrict backdoor program, Trojans and other spy wares to be installed on the computer.
  • 19.
  • 20. FIREWALLS  A firewall protects a computer network from unauthorized access. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted
  • 21.
  • 22. CYBER LAWS Cyber laws are being formulated to stop cyber crimes. Internet Service Providers should also provide high level of security at their servers in order to keep their clients secure from all types of viruses and malicious programs.
  • 23. If a computer virus or an invading hacker deletes our files, or either one corrupts our files, the easiest way to restore our computer may be to reformat the hard drive(s) and then copy files from a recent backup. Backups also offer protection from more common (and less exotic) threats such as accidental deletion of a file by an authorized user or failure of a hard disk drive.
  • 24.
  • 25. The most popular form of security which people rely on is ENCRYPTION , the process of encoding information in such a way that only the person (or computer) with the key can decode it.
  • 26. AWARENESS Always keep a check that you do secure browsing For example: While browsing on some website, if “https” is written in address bar instead of “http” that website provides secure browsing.
  • 27.
  • 28. Awareness should be very important. We should treat very cautiously when we use the public domain such as internet. We should keep a check on how much we share on the new to keep our self safe. We should not fall for phishing schemes. Its always good to remember the old saying -- “If its too good to be true, it probably is”