SlideShare a Scribd company logo
1 of 11
1
A VIDEO CLIP ON CYBER CRIME MADE BY EUROPEAN 
COMMISSION
DEFINITION OF CYBER CRIME 
• Crime committed using a computer and the internet to steal a person's 
identity 
• It’s an unlawful act wherein the computer is used either as a tool or a 
target or both. 
FIRST OCCURENCE OF CYBER CRIME 
 Cyber crime was first recorded ever in 
France during 1820. 
The person involved was Joseph Marie 
Jacquard 
He was a textile manufacturer. He 
invented a loom that could store designs.
CATEGORIES OF CYBER CRIME 
AGAINST 
PERSON 
CYBER 
CRIME 
AGAINST 
PROPERT 
Y 
AGAINST 
GOVERN 
MENT 
AGAINST 
SOCIETY
WEAPONS OF CYBER CRIMES 
Hacking 
Harassment via E-Mails 
E-Mail / SMS Spoofing 
Assault by Threat 
Cyber Squatting 
Transmitting Virus 
Pornography 
Cyber Trafficking 
Forgery
CYBER TERRORISM 
 Ahmedabad Bomb Blast(26-07-08) 
o A mail with id alarbi_gujrat@ 
yahoo.com was being sent by a group 
of Terrorists. 
o Person named Kenneth Haywood’s 
unsecured WIFI router in his house 
was being misused by terrorists. 
o 3 more mails were sent after the blast 
with the same misuse of unsecured 
WIFI routers.
SAFETY TIPS TO AVOID CYBER CRIME 
5P mantra for 
online security 
Precaution 
Prevention 
Protection 
Preservation 
Perseverance 
• Use antivirus software and firewalls 
• Keep your operating systems up to date 
• Don’t open emails or attachments from unknown 
sources. 
• Frequently change the used passwords 
• Avoid downloading freeware 
• If attacked, disconnect the network. Do not turn off 
the computer
 User’s awareness is key to a secure computer/network 
 So we must pay attention to all those issues and protect the World from Cyber 
Crime 
 “If you spend more on coffee than on IT security, you will be hacked. What’s 
more, you deserve to be hacked. ” ─ Richard Clarke, White House Cybersecurity 
Advisor
10
ANY QUERY????

More Related Content

What's hot

What's hot (20)

Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Ppt
PptPpt
Ppt
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 

Similar to Cyber Crime - How to Prevent

Similar to Cyber Crime - How to Prevent (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Presentation1 1.pptx
Presentation1 1.pptxPresentation1 1.pptx
Presentation1 1.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Recently uploaded

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

Cyber Crime - How to Prevent

  • 1. 1
  • 2. A VIDEO CLIP ON CYBER CRIME MADE BY EUROPEAN COMMISSION
  • 3.
  • 4. DEFINITION OF CYBER CRIME • Crime committed using a computer and the internet to steal a person's identity • It’s an unlawful act wherein the computer is used either as a tool or a target or both. FIRST OCCURENCE OF CYBER CRIME  Cyber crime was first recorded ever in France during 1820. The person involved was Joseph Marie Jacquard He was a textile manufacturer. He invented a loom that could store designs.
  • 5. CATEGORIES OF CYBER CRIME AGAINST PERSON CYBER CRIME AGAINST PROPERT Y AGAINST GOVERN MENT AGAINST SOCIETY
  • 6. WEAPONS OF CYBER CRIMES Hacking Harassment via E-Mails E-Mail / SMS Spoofing Assault by Threat Cyber Squatting Transmitting Virus Pornography Cyber Trafficking Forgery
  • 7. CYBER TERRORISM  Ahmedabad Bomb Blast(26-07-08) o A mail with id alarbi_gujrat@ yahoo.com was being sent by a group of Terrorists. o Person named Kenneth Haywood’s unsecured WIFI router in his house was being misused by terrorists. o 3 more mails were sent after the blast with the same misuse of unsecured WIFI routers.
  • 8. SAFETY TIPS TO AVOID CYBER CRIME 5P mantra for online security Precaution Prevention Protection Preservation Perseverance • Use antivirus software and firewalls • Keep your operating systems up to date • Don’t open emails or attachments from unknown sources. • Frequently change the used passwords • Avoid downloading freeware • If attacked, disconnect the network. Do not turn off the computer
  • 9.  User’s awareness is key to a secure computer/network  So we must pay attention to all those issues and protect the World from Cyber Crime  “If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked. ” ─ Richard Clarke, White House Cybersecurity Advisor
  • 10. 10