SlideShare a Scribd company logo
1 of 9
WHAT IS COMPUTER CRIMES? 
Computer crime is an unauthorized use of a computer for personal 
gain, as in illegal transfer of funds or to alter the data or property 
of others.
THE TOP FIVE 
COMPUTER CRIMES 
 Malware 
 Identity theft 
 Cyber stalking 
 Child pornography 
 Spam
MALWARE 
Malware refers to viruses, 
trojans,worms and other 
software that gets onto 
your computer without you 
being aware it is there 
without you even knowing.
IDENTIFTY THEFT 
Someone gains access to your 
personal information and uses for 
there own benefit 
Identity theft ranges from black-hat- 
hacker, stealing your online 
banking account log in and 
password to getting access to your 
social security number and using it 
to pretend to be you
CYBER STALKING 
 Cyber stalking is using the internet to 
repeatedly harass another person 
 The harassment could be sexual in nature 
or it could have other motivations 
including anger or out right hostility
CHILD PORNOGRAPHY 
 Child pornography is when a child is 
being exploited in a sexual way 
 Child pornography is an illegal money 
making industry
SPAM 
 Spam is known as junk email 
or unsolicited bulk email 
 If a user open spam email, 
they are in jeopardy on linking 
onto sites that hos malware 
(virus)
STATISTICS ON COMPUTER CRIMES 
YEARLY CYBER CRIME VICTIM COUNT 
ESTIMATE: 
VICTIMS PER YEAR 556 MILLION 
Victims per day Over 1.5 Million 
Victims per second 18 
Identities exposed More than 232.4 Million 
COMMON TYPES OF CYBER 
ATTACKS: 
ATTACKS % 
Viruses, malware, worms 50% 
Criminal insider 33% 
Theft of data-bearing deices 28% 
Phishing 22%

More Related Content

What's hot

What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attackAariyaRathi
 
Surf smart
Surf smartSurf smart
Surf smart-
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackersRoman Antonov
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrimeravikanthh
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavierMo Han
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Preventionsonalikharade3
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]justin johnson
 

What's hot (19)

Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Surf smart
Surf smartSurf smart
Surf smart
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Phishing
PhishingPhishing
Phishing
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Computersecurity
ComputersecurityComputersecurity
Computersecurity
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Information security
Information securityInformation security
Information security
 
Unit 1
Unit 1Unit 1
Unit 1
 
Phishing
PhishingPhishing
Phishing
 

Viewers also liked

High tech (cyber) crimes
High tech (cyber) crimesHigh tech (cyber) crimes
High tech (cyber) crimesElizabeth Hall
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiShreedeep Rayamajhi
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementRicardo Reis
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power pointjessicafay2010
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Project synopsis
Project synopsisProject synopsis
Project synopsisgirija12345
 

Viewers also liked (20)

High tech (cyber) crimes
High tech (cyber) crimesHigh tech (cyber) crimes
High tech (cyber) crimes
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency Management
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Project synopsis
Project synopsisProject synopsis
Project synopsis
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
SYNOPSIS WRITING
SYNOPSIS WRITINGSYNOPSIS WRITING
SYNOPSIS WRITING
 

Similar to Computer crimes(1)

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptxKoukiGaz
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdfgaherwarsaloni1234
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxMelanie Nava
 

Similar to Computer crimes(1) (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptx
 

Recently uploaded

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Recently uploaded (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 

Computer crimes(1)

  • 1.
  • 2. WHAT IS COMPUTER CRIMES? Computer crime is an unauthorized use of a computer for personal gain, as in illegal transfer of funds or to alter the data or property of others.
  • 3. THE TOP FIVE COMPUTER CRIMES  Malware  Identity theft  Cyber stalking  Child pornography  Spam
  • 4. MALWARE Malware refers to viruses, trojans,worms and other software that gets onto your computer without you being aware it is there without you even knowing.
  • 5. IDENTIFTY THEFT Someone gains access to your personal information and uses for there own benefit Identity theft ranges from black-hat- hacker, stealing your online banking account log in and password to getting access to your social security number and using it to pretend to be you
  • 6. CYBER STALKING  Cyber stalking is using the internet to repeatedly harass another person  The harassment could be sexual in nature or it could have other motivations including anger or out right hostility
  • 7. CHILD PORNOGRAPHY  Child pornography is when a child is being exploited in a sexual way  Child pornography is an illegal money making industry
  • 8. SPAM  Spam is known as junk email or unsolicited bulk email  If a user open spam email, they are in jeopardy on linking onto sites that hos malware (virus)
  • 9. STATISTICS ON COMPUTER CRIMES YEARLY CYBER CRIME VICTIM COUNT ESTIMATE: VICTIMS PER YEAR 556 MILLION Victims per day Over 1.5 Million Victims per second 18 Identities exposed More than 232.4 Million COMMON TYPES OF CYBER ATTACKS: ATTACKS % Viruses, malware, worms 50% Criminal insider 33% Theft of data-bearing deices 28% Phishing 22%